10 Tips to Keep You Safe in All Internet Matters in 2021 | Total Security Software

2021 is here and once again the right time to put things in order and start the new year well prepared. The majority of New Year's resolutions may be about healthier eating and more exercise.

Cybersecurity will remain an important topic this year as well. More and more internet-enabled devices are finding their way into households, users are increasingly relying on cloud-based services and attackers are making increasing use of the functions of artificial intelligence.




But whatever the New Year may bring to your digital world, good basic cyber hygiene is still the best protection against modern threats. We have put together ten simple tips that will help you stay safe in 2021, at least in all internet matters.

1. Create backups.

A good backup strategy ensures a clear conscience. Should there be a loss of data, for example through ransomware or defective hardware, you can simply restore your system to its original and secure state.

A good start is the 3-2-1 method - for private users as well as SMEs. It works like this:

·         3 backup copies will be made of your data.
·         2 of these backup copies are saved locally on different devices (e.g. external hard drives).
·         Also, 1 backup copy is stored externally (e.g. with a cloud-based backup provider). This external copy is important because it also protects your data from theft or other local disasters (storms, fire, floods, etc.).

Implementing a good backup strategy naturally requires a little planning - and sometimes a few costs. But this investment in time and money is definitely worth it. In 2021, you can rest assured that your data will be protected even in the event of a system failure.

2. Invest in reliable antivirus software.

Hundreds of thousands of new malware are developed every single day ... and unfortunately, that won't change anytime soon. The best protection against worms, Trojans, ransomware, PUPs (potentially unwanted programs), and other malicious software is, therefore, to invest in a reliable antivirus solution.

There are quite a few adequate providers on the market. When choosing antivirus software, however, keep in mind that detection rates are only part of the overall package. When making your decision, it is best to also consider characteristics such as the impact on system performance, usability, customer service, and the company's privacy policy. If you are looking for a proven antivirus solution that does not slow down your system, why not try the free 30-day trial version of Protegent360 Total Security Software.

3. Treat yourself to a VPN subscription.

If you travel regularly, travel a lot for work or are generally concerned about your privacy, consider subscribing to a VPN service.

What is a VPN for? When you surf the Internet, data is exchanged between your computer and the websites you visit. However, these can be intercepted by attackers, for example, to steal confidential information such as passwords, e-mails, or access data.

VPN (a virtual private network) creates a secure, encrypted connection between your computer and every website you visit. In this way, your system is no longer easily identifiable as a data source. Also, any intercepted information is encrypted and thus virtually worthless for the crooks.

4. If possible, always use two-step authentication.

Two-factor authentication (2FA for short) offers another layer of protection. Its purpose is to ensure that people who try to log into a website or service are who they say they are.

If you activate 2FA, you not only have to enter your username and password to access an account, but you also have to confirm your identity with additional information. For example, some banks will give you a small device that will create a one-time password for you, or you will be sent a confirmation code to your mobile phone by SMS or app.

Most banks, e-mail services, online shops, and other large service providers offer a 2FA. Use this offer if possible. It only takes a few seconds longer to log in with 2FA, but it can be an effective means of preventing cybercriminals from unauthorized access to your accounts. It should be noted, however, that 2FA is not a perfect solution either.

5. Set up WLAN access for guests.

Does your family visit often? Do you like to invite friends to dinner? If you will be welcoming guests more often in 2021, you should set up their own WiFi access for them. With a guest network, your visitors can use the Internet without having full access to your entire home network. This offers several advantages in terms of security:

1.      It minimizes the risk of malware spreading. If your guests use a device that is infected with malware (without their knowledge) to connect to your home network, the malware could spread to the other devices in your network and cause damage. By setting up a guest WiFi network, you can avoid this spread and protect the devices connected to the home network.
2.      It limits what information your guests can see. It's nice if you offer your guests internet access, but that doesn't mean that they can also access your documents and family photos stored on your home network. With guest WiFi, visitors can access the internet without compromising their privacy.

A guest WLAN can be set up via the settings of your router. You can usually, if not always, access these via 192.168.1.1 or 192.168.0.1. If you have then logged in as an administrator, look for the guest WLAN settings under "Guest Network", "Guest Access" or similar menu names and follow the setup instructions. Please note that not all routers support guest access.

6. Take the protection of your internet-enabled devices into your own hands.

From intelligent locks to home cinema systems and game consoles to lighting - the modern home is a paradise of internet-enabled devices. This generation of devices, also known as the “Internet of Things” (IoT), provides a completely new form of convenience with its advanced functions. Unfortunately, however, they also pose a security risk.

So in 2021, take matters into your own hands and protect your IoT devices, for example by:

·         Use strong, unique passwords for your device accounts.
·         Deactivate functions that are not required, especially those that endanger your privacy and/or network security.
·         Always keep software and firmware up to date so that your devices run as stable as possible and are protected.

7. Get a password manager.

By 2020, every internet user will have an average of over 200 online accounts. Manually managing their login data is almost impossible. So it's no wonder that passwords like “123456”, “Password” and “qwertz” - much to the delight of cybercriminals - are still so popular. Using brute force attacks and social engineering (manipulation of users), attackers can crack weak passwords easily and access all information stored in the respective accounts.

Fortunately, these days you no longer have to choose between convenience and a strong password. With the help of password managers, you can easily create and save secure passwords so that you can easily enter them when necessary. There are already some great programs out there, including RoboForm. This password manager offers excellent encryption, supports multiple platforms, and has an easily customizable password generator.

8. Encrypt removable media and external hard drives.

How quickly can it happen that you lose a USB stick or leave an external hard drive lying around - especially if you are a student or travel a lot for work? Should your external data carrier be lost or stolen, you must be sure that other people cannot access the data stored on it.

There are two options for encrypting external data carriers:

·         Hardware-based : Several manufacturers offer secure removable storage devices that have a PIN keypad or a fingerprint reader. This means that only people with the correct PIN or the stored fingerprint can access the stored content. As you have probably already guessed, these devices are correspondingly more expensive than conventional external drives.
·         Software-based: You can also use software to encrypt your external data carriers. Then the stored data can only be accessed with the correct password. The Pro, Enterprise and Education versions of Windows 10 already have encryption software with the BitLocker tool. There are of course numerous third-party solutions, such as the free open-source program VeraCrypt.

9. Install an ad blocker.

According to a report by Deloitte, nearly one in three users in the US (31 percent) use an ad blocker. That is only too understandable. As the name suggests, ad blockers filter out HTML elements that contain advertisements when surfing the Internet. This not only protects against PUPs and malvertising but can also accelerate the page loading and prevent cookies from tracking your browser history.

There are different tools for each browser. A good example of a free, open-source ad blocker is uBlock Origin, which is compatible with the most popular browsers.

10. Be careful on social media.

Social networks have enjoyed enormous popularity with countless users in recent years, which has also made them a real playground for cybercriminals. It is all too easy to create fake accounts and distribute harmful content.

You should, therefore (also) be careful in social networks in 2021. As always, the top Internet rule applies: think first, then click. Never open links that are posted unsolicited on your site or in personal messages - even if you know and trust the sender. Remain skeptical about friend inquiries (and no matter how nice the profile picture looks). Never give out personal information such as phone number, address, workplace, and the like that could easily be used by others to steal your identity.

Maximum internet security in 2021

We don't know what else the year has in store, but one thing is certain: malware won't be fading from the scene anytime soon. However, if you take the security tips described in this article to heart, your 2021 should be quite relaxed, at least in terms of cybersecurity.

Comments