Connect with us

Technology

Hacked, scammed, exposed: Why you're 1 step away from disaster online

Published

on

Hacked, scammed, exposed: Why you're 1 step away from disaster online

Chances are, you are a lot closer to an online security disaster than you think. Information about you is spread out far and wide online, and losing control of this digital identity can be incredibly embarrassing at best and financially devastating or personally dangerous at worst.

While it may initially seem overwhelming, we’re here to help you stay protected online. We’ve created a list of all the steps to stay safe online. Since there is a lot of information, we suggest you work through it at your own pace.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

A woman stressed about an online disaster (Kurt “CyberGuy” Knutsson)

Advertisement

Step 1 – Enable automatic updates

Keeping your software up to date is one of the easiest ways to keep yourself safe online. Whether you are using a Windows machine, a Mac, an iPhone or an Android smartphone, all these devices are routinely updated with new security fixes. It’s a good idea to double-check and ensure your device’s automatic updates are turned on. Here’s how:

Windows 10 automatic updates

From the start menu, go to Settings > Update & Security > Windows Update. From the Windows Update section, you’ll see a range of options for updating Windows. Here you can set up your “active hours” to make sure that Windows reboots and installs automatic updates outside of your waking or working hours.

Windows 11 automatic updates

Windows 11 users will click the Windows icon and proceed to Settings > Windows Update > Advanced options. From here, you can control when Windows Update will run, similar to the “active hours” control in Windows 10.

macOS

Mac users can open System Preferences > Software Update and click the “Advanced” button. While in the “Advanced” section, make sure every box is checked, as this will ensure they receive timely OS updates.

iOS

If you want to turn on automatic updates with an iPhone, open Settings > General > Software Update and make sure that Automatic Updates is turned on.

Advertisement

Android

If you have an Android device, open Settings > System > Advanced > System Update and ensure the System Update setting is turned on.

AUTO PARTS GIANT EXPOSED: 2.3 CUSTOMERS AT RISK IN MASSIVE DATA BREACH

Step 2 – Use strong passwords

Reusing the same password on multiple websites or applications is one of the most common cybersecurity mistakes. If you use the same password for multiple things, it only takes one service breach to expose your other accounts. Using a password manager is an easy solution to creating strong passwords for multiple accounts.

Hacked, scammed, exposed: Why you're one step away from disaster online

Illustration of securing your device (Kurt “CyberGuy” Knutsson)

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

Step 3 – Set up and use two-factor authentication

Two-factor authentication is a great way to add an extra layer of security to your online accounts. Enabling two-factor authentication makes it harder for hackers to access your account, as your account will require a one-time code in addition to the password to log in.

Advertisement
Hacked, scammed, exposed: Why you're one step away from disaster online

Two-factor authentication being displayed on Apple devices (Apple) (Kurt “CyberGuy” Knutsson)

Step 4 – Encrypt your computer’s storage

If you were to lose your laptop, tablet or phone, all of the personal information on those devices may be accessible to whoever finds it. An easy way to keep yourself safe in this scenario is to have your devices encrypted beforehand. Encryption makes the data hard for hackers to read, and while it sounds complicated, the actual process is easy to set up.

Hacked, scammed, exposed: Why you're one step away from disaster online

Illustration of data on a computer screen (Kurt “CyberGuy” Knutsson)

Step 5 – Locate or erase a lost device

If you’ve lost your device before you could encrypt it, there’s no need to worry too much. It’s easier than ever to locate a lost smartphone or to wipe it remotely. We have a great guide on what to do if you’ve lost your phone for both Androids and iPhones.

You can also use a similar process to locate a lost Windows laptop or MacBook. As operating systems have moved to storing information in the cloud, it’s easy to wipe a lost laptop. If you lose a laptop in public, we recommend remotely wiping it as soon as possible to ensure your data isn’t taken by a malicious actor.

Step 6 – Have strong antivirus software

The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Step 7 – Secure your web browser

We use our web browsers daily. Whether from a laptop, a desktop or a smartphone, you probably use your web browser more than most other apps. Taking a few minutes to regularly update your browser to the latest version, being cautious about the websites you visit and avoiding suspicious downloads are all crucial practices that complement your browser’s security features.

Advertisement

By implementing these security measures, you’re protecting your browser, personal information, financial data and overall digital identity from being exposed to a security risk by potential hackers and cybercriminals.

Step 8 – Secure your smartphone

Smartphones now act as extensions of our personal lives, used for everything from banking to scheduling doctor appointments. It’s more important than ever to keep your smartphone secure, and fortunately, both Android and iOS feature a wide range of built-in features to help protect your personal information.

To enhance your iPhone or Android’s security, start by enabling a strong lock screen method such as a complex passcode, fingerprint recognition or facial recognition. Exercise caution when using public Wi-Fi networks and consider using a VPN for added security.

Hacked, scammed, exposed: Why you're one step away from disaster online

A person holding an Android phone (Kurt “CyberGuy” Knutsson)

10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE’S SECURITY AND PRIVACY

Step 9 – Protect your wireless network

Your home Wi-Fi network can power your smart home devices, but it can also leave you vulnerable to hackers. Luckily, it’s easy to tweak your home wireless settings to keep yourself more protected. Similar to our previous steps, you’ll want to make sure your router has the most recent updated firmware and that you use two-factor authentication and a strong password for your wireless connection.

Advertisement
Hacked, scammed, exposed: Why you're one step away from disaster online

People on their computers using a wireless network (Kurt “CyberGuy” Knutsson)

Step 10 – Regularly back up your data

Regularly backing up your data protects your digital life from hardware failures, theft or cyberattacks. Choose a reliable backup method that suits your needs, such as cloud storage or external hard drives. Set up automatic backups to run consistently, ensuring all your devices, including smartphones and tablets, are covered. Secure your backups by using strong passwords, enabling two-factor authentication for cloud storage or encrypting physical backups.

Periodically, test your backups by restoring files to ensure the system works correctly. Remember, a solid backup strategy is an essential component of your overall cybersecurity plan, providing both protection and peace of mind.

Step 11 – Invest in personal data removal services 

In today’s digital landscape, your personal information can end up in numerous online databases and people search sites without your knowledge or consent. These data aggregators collect and sell your information, potentially exposing you to privacy risks and unwanted solicitations. Using a data removal service can help mitigate these risks by systematically removing your personal information from these databases.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. 

By reducing your digital footprint, you decrease the chances of your personal information being misused for identity theft, targeted advertising or other privacy-invading practices. While it’s challenging to completely erase your online presence, using a data removal service is an effective step towards regaining control over your personal information and enhancing your overall online privacy and security. Check out my top picks for data removal services here.

Advertisement

Kurt’s key takeaways

Protecting your online presence might seem daunting, but remember, it’s all about taking small, consistent steps. Think of it as building a digital fortress: each measure you implement is another brick in your wall of cybersecurity. Don’t feel pressured to tackle everything at once. Start with the basics, like enabling automatic updates and using strong passwords, then gradually work your way through the more steps. The digital world is constantly evolving and so should our security practices.

How has your approach to online security changed over the years and what prompted those changes? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Safari’s new ‘Distraction Control’ feature lets you hide annoying cookie pop-ups

Published

on

Safari’s new ‘Distraction Control’ feature lets you hide annoying cookie pop-ups

Apple is adding a new feature to Safari called “Distraction Control” that lets you remove distracting things like cookie preference pop-ups while you’re browsing, MacRumors reports. The new feature is available with the fifth iOS 18, iPadOS 18, and macOS Sequoia developer betas that launched on Monday.

You can get an idea of how Distraction Control works thanks to a video from MacRumors. From a menu, you can choose an option to “Hide Distracting Items” and then select items you want to hide from the page you’re looking at. When items are hidden, they dissipate away with a very slick animation.

In a pop-up shown in the video, Apple notes that “hiding distracting items will not permanently remove ads and other content that updates frequently,” so you won’t be able to use this feature to hide every ad you see for good. Parts of a website that you hide also don’t sync across your devices, MacRumors says.

Continue Reading

Technology

Elon Musk is suing OpenAI and Sam Altman again

Published

on

Elon Musk is suing OpenAI and Sam Altman again

Elon Musk has revived his complaint against OpenAI after dropping a previous lawsuit, again alleging that the ChatGPT maker and two of its founders — Sam Altman and Greg Brockman — breached the company’s founding mission to develop artificial intelligence technology to benefit humanity.

The new lawsuit filed in federal court in Northern California on Monday says that Altman and Brockman “assiduously manipulated Musk into co-founding their spurious non-profit venture” by promising that OpenAI would be safer and more transparent than profit-driven alternatives. The suit claims that assurances about OpenAI’s non-profit structure were “the hook for Altman’s long con.”

Musk made similar accusations in a “hilariously bad” lawsuit that he withdrew in June without explanation, which focused on claims that OpenAI breached its founding agreement between Musk and other co-founders to keep the company’s technology open source.

“This is a much more forceful lawsuit,” Musk’s lawyer, Marc Toberoff, said to The New York Times. The new suit argues that OpenAI broke federal racketeering laws in a conspiracy to defraud Musk and that its contract with Microsoft would revoke the tech giant’s rights to OpenAI’s technology once artificial general intelligence (AGI) had been achieved.

This story is developing…

Advertisement
Continue Reading

Technology

A helmet using a curtain of air could make face masks obsolete

Published

on

A helmet using a curtain of air could make face masks obsolete

In an era where airborne health threats remain a constant concern, a groundbreaking innovation has emerged from the University of Michigan that could revolutionize how we protect ourselves from viruses and other harmful particles. Let’s explore this development and its potential impact on worker safety and beyond.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Worker Wearable Protection Device (University of Michigan) (Kurt “CyberGuy” Knutsson)

The ‘Worker Wearable Protection Device’

Imagine a device that shields you from airborne viruses without covering your face. That’s exactly what the “Worker Wearable Protection Device” does. Created by a team led by associate professor Herek Clack at the University of Michigan, this ingenious gadget uses an invisible curtain of air to keep harmful particles at bay.

A helmet using a curtain of air could make face masks obsolete

Worker Wearable Protection Device (University of Michigan) (Kurt “CyberGuy” Knutsson)

SKYROCKET TO A HEALTHIER LIFESTYLE WITH THIS GEAR IN 2024

Advertisement

How does the shield work?

The device consists of a hard hat equipped with a visor that houses downward-facing air nozzles. These nozzles create a curtain of air that curves around the wearer’s face, effectively blocking 99.8% of aerosols, including viruses. But here’s the interesting part: The air itself is pre-treated to kill any viruses present, pushing that protection level to nearly 100%.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

A helmet using a curtain of air could make face masks obsolete

Worker Wearable Protection Device (University of Michigan) (Kurt “CyberGuy” Knutsson)

5 BEST TELEMEDICINE APPS FOR VIRTUAL HEALTH CARE

The science behind the shield

The magic happens in a 10-pound backpack that houses the device’s brain. This backpack contains several crucial components: a battery to power the system, electronics to control the operations, an air handling system to manage airflow, and a nonthermal plasma module. The nonthermal plasma module is the star of the show. It creates ionized gas at low temperatures, effectively killing airborne viruses before they reach the air curtain.

A helmet using a curtain of air could make face masks obsolete

Worker Wearable Protection Device (University of Michigan) (Kurt “CyberGuy” Knutsson)

HOW GENERATIVE AI COULD CUT HEALTH CARE COSTS, DEVELOP NEW CANCER DRUGS

Advertisement

Real-world testing of the shield

The Worker Wearable Protection Device is currently being tested at Michigan Turkey Producers, a poultry-processing plant. Here, workers face constant risk of respiratory viruses from both their colleagues and the birds they handle. Previously, these workers relied on paper masks, which came with a host of problems. They found it difficult to communicate effectively, their safety goggles would often fog up, and the masks couldn’t maintain a consistent facial seal throughout the workday. Moreover, workers had to remove their masks when eating or drinking, leaving them temporarily unprotected. The new device solves all these issues while providing superior protection.

A helmet using a curtain of air could make face masks obsolete

Worker Wearable Protection Device (University of Michigan) (Kurt “CyberGuy” Knutsson)

Looking to the future of the shield

While the current model is designed for industrial settings, Taza Aya, the company commercializing the technology, has plans for a smaller, sleeker consumer version. CEO Alberto Elli expressed excitement about the initial results and anticipates launching the Worker Wearable in 2025.

A helmet using a curtain of air could make face masks obsolete

Woman at Michigan Turkey Producers wearing Worker Wearable Protection Device (University of Michigan) (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

As we continue to face challenges from airborne pathogens, innovations like this give us hope for a future where we can work and interact safely without the limitations of traditional face masks. While there’s still work to be done before this technology becomes widely available, the early results are promising. As we look forward to 2025 and beyond, the Worker Wearable Protection Device may well become a common sight in workplaces and public spaces, offering an invisible but powerful shield against airborne threats.

In what other industries or settings do you think this technology could be applied? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Trending