Basic principles of digital hygiene
Basic principles of digital hygiene
Personal data is becoming more common and commonplace by companies and hackers. Therefore, let us create a “self-defense” checklist. The following is our homemade checklist.
The checkpoint answers a simple question, just if you don’t want others to know your personal information and hurt you, then what should you do?
This article is not guiding network security. The following checklists are not thorough, but a small rule set. However, there is nothing more easily than everyone who is confident that you know. Thinking of this, we will mention some comments about helping users protect personal sensitive information, avoiding information being invaded by unwilling to make others.
Do not ignore the basic principle
You may brush your teeth twice a day, often take a shower. This makes you feel comfortable with your own people. Here we want to point out, we want people to agree to the basic principles of digital hygiene. Please also pay attention to online data health, that is, at least in very important websites and services to change your password. Important websites and services include the right to access user financial information, positioning a daily route, residence and work address, health information and other websites. But how do you choose a new password?
1.1. Basic principle of good password:
powerful. Contains 12 uppercase and lowercase characters and numbers.
unique. do not be afraid. There are specialized services for generating and store unique passwords. These services also have password or biological identification protection to improve the level of security.
Don’t remember anywhere. Yes, please don’t be the young man of the “Silicon Valley” American drama. He posted a small post containing all passwords on the computer screen. As a result, his company’s system was invaded by the “Magic Skill” staff, stealing the company information.
In addition to being made, don’t enter any other place. All “View Password Power” website is a fraud website. All “Viewing your password is leaking” service is most likely to be fraud. The fake pages that imitate the real site are fraud (they are called cyplicat or have caused). Use email or mobile phone number to see the password leakage service is line. for example .
2. Use two-step verification
Rest assured, this is not a long time. Big company promised that we will have “no password” future, biometric and unable to lose or stolen block-based digital currency (not confusing with encrypted currency). This is our future but not tomorrow. And now users have a lot of possibilities before that fail, you will be hurt in many ways. Don’t be the last user who is robbed by a hacker on the earth. Use two step validations on services that contain privacy information.
3. Use a password to protect the equipment, remember to lock
Mobile phone, tablet, notebook, desktop computer – people can do it without locking the equipment? Most of the equipment can unlock the screen within a minute in a fingerprint or facial recognition. Yes, even if you decide to go to the water drinker to take a cup of hot water, you should also remember to lock the computer. It is possible, there is no malicious hacker around, but you can become a curiosity victim of colleagues. Of course, I have to remember to set the automatic lock function after one minute.
4. Update the application and system
Most people let software update their mysterious life, but advanced users often optimize updates to save batteries, traffic or their own nerves to avoid Windows in Zoom conference (or mine games, if they are very slow). Requires the restart. Some people are more willing to update manually, then forget to operate. They often become victims of vulnerabilities found by hackers and spam senders, and these vulnerabilities can be repaired by postponed updates. You don’t want to belong to these people.
5. Don’t insert a strange U disk into your computer
Personal computers, company computers, friends computers, or enemy computers.
I seem to hear everyone in my heart: “Please, I am not a five-year-old child!”
You don’t know how much cats have killed. You don’t even need to start anything from the malicious drive or open any files can cause the computer to be attacked, even the anti-virus software that has just been updated is not enough.
5.1 A suggestion that is also overlooked by the public: When you don’t need Bluetooth, Wi-Fi and geopositioning, do not open them on your device. Even if you don’t care about the data, you care about the battery life. Let the device automatically connect to the public Wi-Fi network harm without anything. It will be used by online criminals sooner or later.
6. Don’t share over
It is said that the data is new oil, then why are we easy to leak this data? Only fill in the table in the form. Only when you get something, and is some of the valuable things. . Also, why is the flashlight application suddenly needs access to geopositioning and contacts? Why is the weather application request access to data storage and cameras? Means, they obviously know how to deal with these data (spoiler: they are selling data to advertisers), but what is the benefit of you?
6.1 Delete Useless Accounts. Of course, it is difficult to remember all services that have been registered, but at least pay attention to notifications and emails. This is really sad: they try to use their uninterrupted reminder and communication to attract users, and users tell them “Thank you” to remind users to delete accounts. 6.2 Never doing things at home. Don’t do personal things when you work. Don’t do anything important on the public network.
If you really need to complete some things as soon as possible, then of course you have to do it. But to achieve this balance of work and life, there is a good tip. Separate your work and non-working time and space. Don’t work in your bed with your personal notebook, or sit in front of your work computer. This partition also applies to digital worlds. Your office network administrator does not need to know your personal financial situation or you are talking to anyone on WeChat.
At least no one argues to debate the issue of public networks. Metro, park, coffee shop, your neighbor’s Wi-Fi – is a foodless fish pool, which should be treated accordingly. Use VPN and avoid sensitive information transmission, only access to a secure and reliable website. For example, Google’s service or more or less meetings, but a small independent e-commerce website is most likely to meet.
7. Learn about your rights
The state usually likes to protect their citizens, and the country also likes to be protected from their citizens. Explore your country’s legislation on data, privacy, and digital service supervision. Find out what you can do can do. Others can do what you can do. Ignorantia Legis Neminem Excusat – No one can get off.
8. Kill the chicken monkey, take the ring
When you know that others steal the amount of data and suffer, you will also change the view of privacy protection. You can start.
Or maybe you have to try and try not to be angrec because of finding them.
There is also a method very interesting: Check your advertising preferences, such as or. I saw myself in the twisted mirror of Zakberg. You can even correct them, if they think you are a new crown virus, live in the four floors, or go to North Korea.
9. Discover and use tools
VPN, DNS, advertising interceptors, anti-viruses, browser seamless patterns, cookie cleaning, private search engines and security communication software, etc. Of course, they are not produced for criminals, spies or celebrities. They are developed for all ordinary people. The browser has no trace mode or VPN (when air ticket, hotel, car rental, and many other things will be more expensive for those who are more affluent, or more needed. Advertising interceptors can make you free Effects and problems with attention, fatigue, delay, marketing manipulation, impulse consumption, battery consumption, etc.
Of course, it is vital to wisely choose service providers or merchants. What users want to use is that there is an experienced developer with positive feedback in an independent comment and can provide sometimes pop-up solutions. Note that you want to download applications only from official app stores and developers. Sometimes a mobile app can only download from the website. For example, Google does not allow applications with certain features to enter their stores.
10. Leave feedback, report violations or infringement
Click and less than one minute from three to four times: report omission of advertising, spam, fraud, bullying and any other bad things (or just suspicious things).
11. Think twice
This is a good suggestion that can be applied at any time in daily life. The impulse emotional reaction is highly abused. Next time you receive the email of “Nigerian deceleration”, don’t impress it again.
12. Don’t think that you are safe and impeccable
Many people feel that they are not stupid, and the data is safe. But this idea is wrong, this doesn’t mean that hackers will not find ways to steal your data. Your personal information is much better than you think, and some people and companies are very willing to steal these sensitive information from you.
13. Pay close attention to those who are more suspended
Teach your child and parents’ elders. Protect yourself by strengthening their protection.
I really hope that at least one or two of the above recommendations will help you. Even if you can’t do it, please do it as much as possible from small things: Modifications have used two years of Google password, or give VPN a chance. Who knows, maybe you don’t know, you will quickly develop a habit of maintaining digital hygiene.