Uploaded by jennadams913

Internet Safety: Strong Passwords & Browser Security

advertisement
https://edu.gcfglobal.org/en/internetsafety/
Creating strong passwords
You'll need to create a password to do just about everything on the Web, from
checking your email to online banking. And while it's simpler to use a short, easy-toremember password, this can also pose serious risks to your online security. To
protect yourself and your information, you'll want to use passwords that are long,
strong, and difficult for someone else to guess while still keeping them relatively
easy for you to remember.
Why do I need a strong password? - At this point, you may be wondering, why do I
even need a strong password anyway? The truth is that even though most websites
are secure, there's always a small chance someone may try to access or steal your
information. This is commonly known as hacking. A strong password is one of the best
ways to defend your accounts and private information from hackers.
A strong password is one that's easy for you to remember but difficult for others to
guess. Let's take a look at some of the most important things to consider when creating
a password.
● Never use personal information such as your name, birthday, user name, or
●
●
●
●
●
email address. This type of information is often publicly available, which makes it
easier for someone to guess your password.
Use a longer password. Your password should be at least six characters
long, although for extra security it should be even longer.
Don't use the same password for each account. If someone discovers your
password for one account, all of your other accounts will be vulnerable.
Try to include numbers, symbols, and both uppercase and lowercase letters.
Avoid using words that can be found in the dictionary. For example,
swimming1 would be a weak password
Some of the most commonly used passwords are based on family names,
hobbies, or just a simple pattern. While these types of passwords are easy to
remember, they're also some of the least secure.
Using password managers - As an alternative to writing your passwords on paper,
you can use a password manager to store them securely online. Password managers
can remember and enter your password on different websites, which means you won't
have to remember longer passwords. Examples of password managers include
LastPass, 1Password, and Google Chrome's password manager.
Example: m#P52s@ap$V - This is a great example of a strong password. It's strong,
long, and difficult for someone else to guess. It uses more than 10 characters with
letters (both uppercase and lowercase), numbers, and symbols, and includes no
obvious personal information or common words. This password might even be a bit too
complicated to remember without a password manager, which underscores why
they're so helpful when creating a strong password.
Your Browser's Security Features
Your computer faces different threats whenever you browse the Web, including
viruses, malware, and spyware. The good news is your web browser has a lot of
built-in security features to help protect your computer. Let's take a look at some of
the most important features you should know about, as well as some simple tips you
can use to stay safe online.
Watch the video below to learn more about your browser's built-in security features.
Check the web address
Malicious websites often use deceptive web addresses to trick users. For example,
www.wellfargo.com looks similar to www.wellsfargo.com, but it's missing the s in the
middle.
Double-checking the domain name is a good way to ensure you're going to the real,
trusted site—not a phony site with a similar web address. Some web browsers will even
try to make the domain name easier to read. In the example below, you can see that
wellsfargo.com uses a darker color in the address bar.
Look at the security symbol
Some websites will display a lock symbol in the address bar. This is most commonly
seen with certain types of websites, like online stores and banking sites. This means the
website is using an HTTPS connection, which makes it safe to enter your personal
information. You'll also see https at the beginning of the URL.
You won't see this symbol on all websites, and that's OK—not all websites need this
extra layer of security. However, you should avoid entering any sensitive information,
such as your credit card number, if you don't see this symbol in the address bar.
Update your browser regularly
New viruses and malware are created all the time, so it's important to update your
browser regularly. Your browser will usually notify you when it has an update available,
but you always have the option to update manually. In this example, we're updating
Google Chrome to the most recent version, but the exact update procedure will vary
depending on your browser.
Avoiding Spam and Phishing
Dealing with spam
If you've ever received unwanted email advertisements, you may already be familiar
with spam, also known as junk email. Spam messages can clutter your inbox and
make it more difficult to find the emails you actually want to read. Even worse, spam
often includes phishing scams and malware, which can pose a serious risk to your
computer. Fortunately, most email services now include several features to help you
protect your inbox from spam.
Spam filters
Whenever you receive an email, most email providers will check to see if it's a real
message or spam. Any likely spam messages will be placed in the spam folder so you
don’t accidentally open them when checking your email.
Spam-blocking systems aren’t perfect, though, and there may be times when legitimate
emails end up in your spam folder. We recommend checking your spam folder regularly
to make sure you aren’t missing any important emails.
Many email services also have a feature you can use to mark emails as spam. In
Gmail, for example, you can select the message and click the Mark as Spam button.
This helps your email provider filter out these types of messages in the future.
Phishing
Phishing scams are messages that try to trick you into providing sensitive
information. These often appear to come from a bank or another trusted source, and
they'll usually want you to re-enter a password, verify a birth date, or confirm a credit
card number. Phishing messages may look real enough at first glance, but it’s
surprisingly easy for scammers to create convincing details.
Even though this email has the Bank of America logo, you can see that the email
address it comes from is misspelled. If you receive something like this, instead of
clicking any of the links in your email, always access your account directly from the
official secure site or by calling the number directly on your bank card.
Other common email scams
Spam and phishing are common problems, but there are many other types of email
scams you may encounter. Some will promise to give you a lot of money if you advance
a small amount upfront. Others may pretend to be from people you know in real life, and
they'll often ask you to send money or download an attached file.
Remember to trust your best judgment. You should never send someone money
just because you've received an email request. You should also never download email
attachments you weren't expecting because they might contain malware that could
damage your computer and steal your personal information.
How to Avoid Malware
How to avoid malware
Malware is one of the most common hazards to your computer when you're online, but
it's easy to avoid. Developing safe and smart browsing habits can protect you from
malware and other threats, like viruses. Securing your computer and learning how to
identify and avoid suspicious links are the fundamentals of safe browsing habits.
Secure your computer
Limiting your computer's vulnerability to malware is a crucial safe browsing habit. You
can protect your computer by running antivirus and antimalware software like
Bitdefender or Norton. These programs can block malware from being installed and
can remove it if it does get onto your computer. Even if you don't see signs of malware
on your computer, running regular scans can catch any malware that has escaped
notice.
Many malware programs take advantage of security flaws in Windows and other
software. Keeping your OS, browser, and other programs updated is an important
step in protecting your computer. The security patches in these updates make your
computer immune to many threats.
Avoid suspicious links
Most malware requires you to click something to download and install it. These links are
often disguised as something they are not. If you are aware of what suspicious links can
look like, you can avoid them. Here are some examples of misleading links concealing
malware downloads.
● Ads on websites can look like system messages or diagnostics warning you
that something is wrong with your computer, like the image below.
● Ads can look like messages saying you have won a prize and instructing you to
●
●
●
●
click to claim it.
Pop-up windows frequently contain malware or attempt to lead you to a less
secure site. Most reputable sites don't use pop-up windows. Many browsers
block pop-up windows by default.
If you are prompted to download something you weren't expecting—or if it seems
to be unrelated to the page you were on—it's probably malware.
Headlines that are ambiguous and sensational that encourage you to click to
read more are called clickbait. Sites that use lots of clickbait headlines are more
likely to contain links to malware.
If you're ever unsure whether a website or download is safe, close it and
investigate the site before returning to it. It's always a good idea to be cautious
when browsing unfamiliar sites.
Safe Online Shopping
To protect sensitive information like credit card numbers, you'll want to shop from your
home Internet connection if possible. Try to avoid shopping when connected to a
public Wi-Fi network or when using a public computer, such as a library computer.
Public computers and Wi-Fi networks are at a slightly greater risk for hacking, which
could put your information at risk.
Look for HTTPS
Many websites will display a lock symbol in the address bar. This is most commonly
seen on the payment page of an online store. This means the website is using an
HTTPS connection, which makes it safe to enter your information.
You won't see this symbol on every page of an online store, and that's OK—not all
pages really need this extra layer of security. However, you should avoid entering your
credit card number or other financial information if you don't see this symbol.
Research the company or seller
Anyone can set up a shop online, so it's important to research a company or seller
before buying from the site. Make sure the business has a physical address and
phone number you can contact if there's a problem. You can also check for reviews on
sites like Yelp and Google.
Use secure payment methods
Credit cards are generally the safest way to pay for items online. Avoid options like
direct wire transfer, bank transfers, or sending cash or checks through the mail. And if
you don't like the idea of giving your credit card information to different retailers, you
could try an online payment service like PayPal or Google Wallet.
Keep a record
Always save records of your online transactions, which should include the receipt,
order number, product description, and price. You will also want to save any emails
you send or receive from a seller, which may come in handy if there's a problem later
on.
Understanding Browser Tracking
Whenever you use the Internet, you leave a record of the websites you visit, along with
each and every thing you click. To track this information, many websites save a small
piece of data—known as a cookie—to your web browser. In addition to cookies, many
websites can use your user accounts to track browsing activity. While this type of
browser tracking doesn't pose a serious risk to your online security, it's important to
understand how your online data is tracked and used.
Why do websites track browsing activity?
There are many reasons a website might track your browsing activity. In some cases,
it's simply to make your browsing experience faster and more convenient. But this data
can also be used to determine your browsing habits and preferences—information that
is frequently used by advertisers in determining what ads to show you online.
How do cookies work?
Cookies can store specific information on the websites you visit and the things you click
on different sites. If you don't have an account on a particular site, this information is
typically saved in a cookie to your web browser. For example, a news website might use
cookies to see if you've previously visited its site—and what articles you read on your
last visit—so it can suggest more articles based on your previous choices.
Should I be worried about cookies?
Generally speaking, cookies don't pose a serious risk to your online security—you're
unlikely to acquire malware or expose sensitive financial information by using cookies.
Still, if you don't like the idea of websites collecting information about you this way, there
are options for limiting cookie tracking on your computer.
How to avoid cookie tracking
There are a few different ways to avoid cookie tracking. Some websites actually give
you the option to disable cookie tracking on their site, although this may also disable
certain site features.
If you want to opt out of cookies entirely, you could try enabling the Do Not Track
setting in your browser. Most web browsers disable this feature by default, but it can
usually be activated from the privacy settings.
Note that participation in the Do Not Track program is voluntary, so some sites may not
honor this request. If you'd prefer to avoid cookies altogether, you could use a private
browsing mode whenever you go online. This will prevent any cookies from being
saved to your web browser.
Private browsing mode won't protect against every kind of browser tracking.
Account tracking
Even if you never allow websites to store cookies, there are other ways your browsing
habits can be tracked. For example, when you create an account with a site like
Facebook or Google, you're also giving them permission to track and save information
on your activity. Instead of saving this information in a cookie, it's stored by the
company and associated with your account.
In many cases, this information is then provided to third-party advertisers, who can use
this information to deliver personalized ads across the Internet. And while you can
usually disable these tracking settings, they will be enabled by default.
What To Do if Your Computer Gets a Virus
Computer viruses can be dangerous and should be taken seriously, but there are
ways to remove them before serious damage is done. We'll go through the basic steps
of virus scanning and removal, but keep in mind that it may still be necessary to hire a
technical support professional to completely remove the virus and repair your computer.
Antivirus software
First, if you don't already have an antivirus program, install one. Be sure you only have
one antivirus program installed because having more than one can cause significant
problems. Examples of antivirus software include Bitdefender and Norton.
Run a system scan
Once you've verified that your antivirus program is running, begin a scan. If you're
unsure how to do this, review the documentation for your antivirus program, which
usually can be found on the developer's website. Some programs offer several types of
scans, and you may want to run the most thorough type, usually called a full system
scan. This may take several hours. Usually, you do not need to remain at the computer
during the scan.
Review discovered threats and recommended action
Either during the course of the scan or when it's complete, the antivirus program will
notify you of discovered threats and recommend various courses of action. Usually, the
recommended action for each threat is the best choice. If the antivirus is unable to
remove any threat, don't ignore it. Investigate how to proceed with some Internet
searches or by contacting a professional, like the support team for the antivirus
program.
Malware
Your antivirus program may be bundled with an anti-malware program. Antivirus and
anti-malware programs scan for slightly different things but they work similarly, so you
can follow the same steps in this tutorial.
If you are unable to remove the virus—or if your programs or operating system are
damaged beyond repair—it may be necessary for you to erase the hard drive and
reinstall your operating system and programs. At this point, you would want to hire a
technical support professional,
I Have to Provide My Phone Number? Using Phone Verification
Using phone verification
If you've used a webmail service like Gmail, Outlook.com, or Yahoo! Mail in the past
few years, you may have been asked to provide a phone number to help verify your
account. As we start to conduct more and more of our everyday tasks online—like
paying bills and shopping from online stores—it's become increasingly important for
many web providers to verify your identify and prevent others from abusing your
account. Your phone number is one of the easiest ways to verify your identity with an
online service provider.
How does phone verification work?
When you're creating an account or trying to recover a lost password, you may be
asked to enter your phone number. Your provider will send you a text message (or call
your phone) with a verification code, which you can then enter online. This lets them
know that you're a real person and not someone else trying to gain access to your
account—basically, it's an easy way to prove that you are who you say you are.
Does phone verification pose a risk to my privacy?
Not everyone feels comfortable sharing their phone numbers with large companies like
Google and Microsoft. And while it may seem like a lot of personal information to give
away, it's important to realize that phone verification mainly exists to protect your
account. It's very unlikely that your phone number would be used for any other reason.
It may help to think of phone verification like providing an emergency contact
number—if something goes wrong with your account, it will be easier for the online
service provider to contact you directly.
Some services, like Google and Facebook, even let you use a phone number as part of
a two-step verification program. Basically, whenever you sign in to your account from
a new computer, you'll need to use your phone to enter a verification code. This makes
it much more difficult for someone else to hack into your account.
Wi-Fi Security
If you are using a home Wi-Fi network to access the Internet, you should make sure it
is secure; otherwise, your activity and information could be accessible to hackers and
cybercriminals. Securing a wireless network can get technical, so beginners may prefer
to get help from their Internet service providers (ISPs).
Public Wi-Fi safety tips
Being able to access the Internet through Wi-Fi hotspots in coffee shops, hotels,
airports, and other public spots can be quite convenient. However, these Wi-Fi hotspots
are often not as secure as your home network. Review the following tips to learn how to
stay safe when connecting to a public network.
● Make sure you are on a legitimate network. Cybercriminals sometimes set up
rogue networks with common names like Free Wi-Fi or Public Wi-Fi to get you
to connect to illegitimate networks. Ask the hotspot owner for the name and login
information for the hotspot you are visiting before you connect.
● Protect your computer by making sure your firewall is turned on and your
antivirus software is up to date.
● Make sure you are aware of the people around you when using a hotspot.
●
Keep an eye out for anyone who may be glancing over your shoulder and
viewing your private information and activity. Never leave your laptop or mobile
device unattended in a public space.
Do not conduct financial transactions like banking or shopping with a credit
card while using public hotspots.
Download