They say data is the new oil — and as monetary transactions become increasingly virtual, I completed the IBM SkillsBuild Cybersecurity Fundamentals Certificate to share the key lessons I learned about staying private and safe.
The 100th time I clicked "Ignore" on that software update.
Does that software update on your phone keep annoying you? Software updates often include patches for security vulnerabilities — so it’s wise to regularly update your devices and applications.
You can even schedule updates while you’re asleep — just remember to stay connected to the internet.
Breach here, breach everywhere!
We all know to use long, complex passwords. But do we remember to use a different password for our bank account than we do for other sites?
If another account is breached, your finances will be better protected.
Virtually Permanent
Remember: everything you post online is virtually permanent.
Even small pieces of information can add credibility to a social engineering attack.
If something is too good to be true, it probably is.
You receive an email from a "representative of a lottery" congratulating you on winning a grand prize.
Or maybe a message from a bank asking you to update your password.
These are common examples of social engineering — where someone tries to trick you into giving up private information.
Don’t be afraid to challenge suspicious requests.
And remember: if something is too good to be true, it probably is.
Something phishy about this email? Here's how to spot it:
- Were you expecting this email?
- Is it from someone or a company you recognize?
- Does it use a generic greeting instead of your name?
- Does it contain poor grammar or spelling errors?
- Does it create a false sense of urgency?
- Is it asking for your password or bank details?
Tip:
Don’t click on links without verifying the URL.
Look for https://
and check for misspellings or unusual characters in the web address.
Principle of Least Privilege
This concept is often used in organizations to prevent cyberattacks, but it’s a useful mindset for everyone.
It simply means: give apps or users only the permissions they need.
For example:
I only enable location access when I actually need the app to use it.
Cybersecurity isn’t just for tech professionals — it’s for all of us.
Hopefully, these tips help you stay a little safer online.
Top comments (0)