Skip to content

Internet Usage Habits That Threaten Your Security

Did you know… careless habits when using the Internet may put you, your organization, and other users at risk of cyberattacks?

With only one click, it’s possible to find:

  • Your profiles on social media and access freely to your photos or contents that can be used in attacks directed to you?
  • Posts that you wrote concerning sensitive or controversial topics that can harm your image?
  • Sensitive personal information about you or your relatives that can be used for fraudulent purposes, such as blackmail, identity theft, and the like?

So, you are vulnerable to virtual dangers!

Know how to proceed to keep safe in the online world:

1. Pay attention to your posts and limit access to sensitive information

  • Avoid making online posts that can harm your image or your organization’s
  • Reflect before posting. Even if you delete the original content, remember that copies that were made will not be deleted from third-party devices, which brings some risks
  • Limit the volume of sensitive information you provide online. Keep data such as marital status, address, and telephone, private
  • Turn on your browser and social media’s privacy configurations, therefore decreasing the volume of information you provide online
2. Security first
  • Practice secure browsing and try not to access doubtful content. Remember that one careless click can expose sensitive data or infect devices with malware
  • Make sure you use a secure Internet connection by avoiding public Wi-Fi networks and using a VPN (Virtual Private Network) provided by your organization for performing work tasks in a secure way
  • Choose a security software that has real-time protection programs and keep it up to date
  • Use robust passwords, according to the effective security policy of your organization (learn how in point 1)
3. Be careful with the pages that you visit, what you download, and who you talk to online
  • Always use websites with secure, encrypted connections for searching or shopping
  • Do not access links or download documents or apps that are considered suspicious or come from websites that are not trustworthy
  • Pay attention to the people you talk to online. Attackers often create fake profiles to access sensitive personal and professional information