Every user can take preventative measures to ensure their data is safe:
Picking a secure password
Often the biggest security flaw are the users themselves and one of the biggest problems is the topic of password selection. Passwords should be at least eight characters long and should be composed of an arbitrary combination of numbers, letters, and symbols. Every service should have its own individual password and this should also be regularly changed. These password managers and useful tricks are helpful for managing secure passwords.
2-step verification
Many online services like Google or Dropbox offer the user 2-step or two-factor verification. Users can only log into their accounts after they receive a code that was sent to their mobile. Users are also able to set up the authentication process in such a way that only allows known devices to be used for logging in. Different providers support apps that generate codes for log in. This is a simple and effective way of preventing third parties form accessing accounts to which they possess both the username and password.
Regularly update software and devices
One common mistake that many users make is not thoroughly making sure that their software has been updated. Browsers, operating systems, and especially anti-virus software should always be kept up to date. New security gaps are constantly being discovered that can easily be filled by completing the provided updates. Only those who regularly install these updates can benefit from such improvements.
Use public devices and networks with caution
Libraries, airports, or other highly frequented public spaces, such cafés and restaurants, often provide access to WiFi networks. Data traffic in these unencrypted networks is public and can, under certain circumstances, be intercepted by third parties. Browser pages should always be accessed through the transmission protocol “HTTPS”, and e-mails should only be sent under an encrypted connection. VPN services offer additional protection and allow data traffic to flow through an encrypted tunnel. Online banking and other sensitive transactions should only transpire from privately owned devices, and, in order to minimize any unnecessary risk, an encrypted connection should be used.
Avoid data collectors
The level to which someone is an easy target for hackers depends on where and to what extent their data is exposed online. Thinking twice about every log-in and questioning the reputability of the service provider being used is a good practice to get into. Checking the terms and conditions, the data privacy policy, and site disclaimer is a good way of spotting bad apples. Data should always be revealed with caution. Requests for sensitive data, such as bank account information, via e-mail or Facebook should raise a red flag. The same rules apply to apps, too. Users should always be aware of which data the program is trying to access. Free apps are often data collectors in disguise. A program seeking access to data that is irrelevant to its function (for example a flashlight app requesting your contact data) is a further potential indicator of an untrustworthy service.