1. USE VPN/Proxies on public WiFi
Always use VPN on public WiFi to avoid network sniffing, data sniffing and privacy issue. Use most reliable and trusted VPN to keep yourself away from hacking.
2. USE HTTPS website and never HTTP
No matter what website you’re surfing, always use HTTPS and avoid HTTP as much as you can. Website owner could consider HSTS preload
3. Never use the same password
One of the major mistake most internet users made. Using same password on every site is very terrible especially on confidential information. Never use same password on internet, you will more likely able to avoid credential stuffing. Be sure setup notify from haveibeenpwned.
4. Use strong password
Enforced your password to unguessable to avoid brute force attack and social engineering attack. Most peoples will use their birthday, IC, name, or anything related to him on password. If you need to do so, encrypt your password from “jackie1996” to “J@cK1e1996” or something like that. You could considered Passphrase as well. Best, don’t memorize your password at all, stored on trust-able password vault like LastPass and use generated password and store your password. Try out Howsecureismypassword. Be sure REMEMBER your the LastPass vault email and password.
5. Enable 2-Factor Authentication
Enable 2-Factor Authentication if possible with google authenticator, authy, sms and etc.. Each time someone login, you’ll received a notification and required a login code to access the account.
6. Only use end to end encrypted instant messaging platform
Never use an instant messaging platform if the platform never encryption your message. If the platform supported end-to-end encryption, be sure enable it before sending any important message. Eg: WhatsApp
7. Check activity log if any suspicious
If you found any suspicious activities on your email or any social network account, check the activity logs, change the password and be sure to sign out all devices.
8. Encrypted your all your gadgets
Use Bitlocker, veracrypt to encrypt your all your computers to add an extra layer to protect your confidential stuff in your computers. When your computer being stolen, the theft will not able to access any file in the drive unless they have the decryption key. Otherwise, the only thing they can do is to format the hard drive in order to use it.
If you find it useful, bookmark and Share it to your friends and let them know too!