Cybersecurity for beginners

1 February 2019 Information Security

Current cybersecurity reports prove that we should think twice before being careless on the internet. With so many cyber-attacks and private data invasions, every netizen has to know at least about basic steps to be protected on the network.

1. Take care of your passwords

Passwords are considered to be sensitive information and vulnerable to being stolen. That’s why you need to make strong enough combinations containing both letters and numbers, at least 8-10 (or more) characters. Be sure that you change them monthly. If you use lots of services and can’t create long and strong passwords, use a password generator for these needs. For more information, you can read about these 9 simple steps that will save your data.

2. Don’t forget to update your antivirus software

The security of your PC depends on your antivirus software. For this reason, never ignore updates offered by its developers. You can also enable the automatic mode of updates.

3. Be careful with strange links in e-mails and ads

If you receive strange e-mails from unknown or even known people, don’t click on any links. You may fall victim to phishing attacks. Cybercriminals often pretend to be an official establishment, for example, banks.

Moreover, don’t click on any link you see in ads as they may also be infected with malware.

4. Keep your personal information private

Personal data is one of the main targets for hackers and snoopers. Sharing your sensitive data, you risk becoming one of the hacker’s victims. Use a VPN service that will encrypt everything your transfer through the network.

5. Encrypt internet connections

As it has been mentioned above, to make your online presence more private, you need to encrypt internet connections when you pay online, use messengers, send e-mails, etc.

6. Avoid using free public Wi-Fi networks

Public Wi-Fi spots are full of strangers that can easily access the network to steal users’ data and passwords. Try not to do shopping online from cafes or airports. You’ll avoid possible problems connected with data theft.

7. Install back-up software

Back-up software will protect all your important files from being deleted. It’s a good way to be away from unexpected troubles.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Kaspersky’s predictions for 2025 APT landscape
Information Security
The 2025 advanced persistent threat (APT) includes the rise of hacktivist alliances, increased use of AI-powered tools by state-affiliated actors – often with embedded backdoor – more supply chain attacks on open-source projects.

Read more...
SecurityHQ certified B-BBEE Level 1: Delivering global services from a local entity
SecurityHQ Information Security
SecurityHQ, a global managed security services provider (MSSP) with an office in South Africa, has announced it can now offer local companies a complete managed cybersecurity service from a Level-1 B-BBEE accredited and 51% black-owned service provider.

Read more...
2024, the year of Fraud-as-a-Service
Information Security
A report from AU10TIX outlines how ‘the industry’s dark engine’ offers user-friendly fraud kits that enable amateurs to execute complex attacks against thousands of accounts in minutes.

Read more...
The future of endpoint security
Information Security
Endpoint security is a critical pillar of cybersecurity, especially for South African businesses, which are becoming prime targets for cybercriminals. Endpoint security involves safeguarding devices connected to a network from a range of cyberthreats.

Read more...
Not enough businesses take cybercrime seriously
Information Security
Interpol recently revealed that cybercrime, specifically ransomware incidents, cost the South African economy up to 1% of the country’s GDP, while the Council for Scientific and Industrial Research estimated the loss at R2,2 billion a year.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...