Ten Essential Tips to Improve Internet Security
Amin Sabeti
Digital Security Researcher
cybersecurity
CopyrightCybersecurity is one of the issues that has received considerable attention in recent years, with a look at the news of the world of less-tech technology, with no news regarding the penetration and release of user account specifications.
Hence, one of the questions that Persian users have been asking me in recent years is how to improve their cyber security and reduce the risk of penetration into various online accounts as well as their operating systems.
Answering these questions is not easy, because every user in the Internet world has a different understanding of cybersecurity and words like sensitive information, however, this article attempts to highlight ten critical points for improving cyber security.
It should not be forgotten that digital security is comparable to physical security, and compliance with these points does not guarantee 100% security.
The following ten points are not sorted by importance because everyone is just as powerful:
Activate the two-step authentication: Two-step authentication is in fact adding a security layer for various online accounts so that after entering the password, the account owner must receive a code received via SMS or the application. To enter. Nowadays, various world-known services offer the possibility for their accounts, for example, Google, Facebook, Twitter, WhatsApp, Telegram.
Cybersecurity is one of the issues that has received considerable attention
in recent years, with a look at the news of the world of less-tech technology, with no news regarding the penetration and release of user account specifications.

Hence, one of the questions that Persian users
have been asking me in recent years is how to improve their cyber security and reduce the risk of penetration into various online accounts as well as their operating systems.

Answering these questions is not easy, because every user in the Internet world has a different understanding of cybersecurity and words like sensitive information, however, this article attempts to highlight ten critical points for improving cyber security.

It should not be forgotten that digital security
is comparable to physical security, and compliance with these points does not guarantee 100% security.

The following ten points are not sorted by importance because everyone is just as powerful:

Activate the two-step authentication
Two-step authentication is in fact adding a security layer for various online accounts so that after entering the password, the account owner must receive a code received via SMS or the application. To enter. Nowadays, various world-known services offer the possibility for their accounts, for example, Google, Facebook, Twitter, WhatsApp, Telegram.
Because of the importance of this feature, you should always have it enabled in your accounts
To get started, it is advisable to enable a two-step login for your Google account.
2. Remove Flash Player: Flash Player can be considered a security hole in the technology world, and the reason for this is the numerous updates that the Adobe Flash Player builds on-line.
Adobe has since stopped supporting Flash Player since 2020, and so many of the Flash-powered websites - like YouTube and Aparat - have begun to support HTML5, which is a modern solution without the need to install specific software and An alternative to Flash Player.
3. Use the original operating system
A
nd non-locked breakthrough: The operating system can be considered the core of any computer and mobile, therefore, under no circumstances and under any circumstances, use an unlicensed OS and broken lock - such as Windows 10 - . The point to keep in mind is that broken lock releases of various operating systems generally have different security holes and, besides, they can not be updated continuously, so always use the original version of Windows or Mac. .
cybersecurity
4. Delete unused software and applications
According to the latest reports , smartphone users use an average of 9 apps per day and 30 apps per month. So, if you have dozens of software on your mobile phone or computer, remove applications and software that you have not been using at any time during the past three months.By eliminating unnecessary software and applications, not only have you increased the security of your device, but also saved your monthly Internet expenses as you have prevented the updating of apps and software that was not used.5. Use password management software

5. By increasing the range of Internet usage in everyday life
One of the problems that users face on a daily basis is the choice of appropriate passwords for different accounts, and given that each user has dozens of online accounts It's almost impossible to create and remember dozens of passwords. Users should therefore begin to use password management software such as LastPass or KeePass, so that they will process the process of creating and storing passwords for these software programs and remembering themselves and only one password.
Is the telegram program secure
Is internet security available or not?
Apple's new operating system has a security hole
6. Get your back-up information from critical and vital information
Approximately two years ago, supporting critical information was only sufficient in cloud services such as Dropbox and Google Drive, and the need to maintain an offline version of this information that does not belong to any computer There was no internet connection

7. With the advent of ransomware 
Getting an online version of the vital information vital for all users now means that all information on the cloud service is also encrypted if their device is infected with malware and access to cloud services through software and computers. As a result, always save your critical information to an external version on an external hard drive.7. Use the original anti-virus: If you are using one of the Windows operating systems, Mac OS, or Android, do not forget that you must have an antivirus installed on them. It's a myth that Mac OS X does not require antivirus. You need to install antivirus software.
cybersecurity
There are dozens of options available to install anti-virus on the market
With free and legible versions of these antivirus software sufficient to protect your device from malicious software and do not need to use the malicious antivirus locked version. For example, Avast AntiVirus or Avira can be considered as antivirus, and its free version is responsive to daily use.


8. Keep your operating system and antivirus up to date:
In addition to having to use the original anti-virus, you should update it on a daily basis. This means that if you install an anti-virus on your device and do not update it on a daily basis, whether it's anti-virus or not, you can ignore it on your device. Do not forget to update your antivirus daily, not weekly or monthly.


9. Use the Signal App
With the advent of smartphones, various apps have been used to connect and connect with others, with hundreds of apps designed so far. Meanwhile, security and hacking of conversations have become one of the concerns of users around the world, including Iran, and one of the questions of Iranian users every day is asking whether it is safe or without a telegram.

As a general rule, every time an application supports End-to-End encryption, that app can be considered a safe application, and in this case the signal application can be considered the safest application in the Internet world. Organizations and individuals have confirmed it.

10. Use a web browser or videotape:
Whenever you connect to the Internet in public places, regardless of whether you want to cope with Internet censorship, you should always use a VPN or an opt-in, so that you will be able to detect and spy on yourself. Protect individuals and potential hackers. In fact, with the implementation of the VPN and the filterer, you will have a mask on your face and it will be possible for a person or company (other than the provider of the VPN or the proxy server) to monitor your online activities.

Finally, I emphasize that digital security is a relative concept and, with the implementation of the above, there is no 100% guar
Print - Close Window