Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

10 Internet Security Tips to Make 2019 Your Most Cyber Secure Year Ever, Part 2

1/31/2019

 
Picture
A guest post, courtesy of Emsisoft. If you have any questions about the topics discussed here or need help implementing them, call, click, or visit us today!

5) Set up a guest WiFi network 
Do you have family coming to stay? Planning on throwing a lot of dinner parties in 2019? If you regularly find yourself playing the role of host, it might be time to set up a guest WiFi network. A guest network allows your guests to connect to the Internet without giving them full-blown access to your home network. This has a couple of advantages from a security perspective:  
  1. It reduces the risk of malware spreading. If your guest connects to your primary WiFi using a device that is – unbeknownst to them – infected with malware, there’s a chance that the malware could spread to other devices on your home network and wreak havoc. Setting up a guest WiFi network can help contain the spread of malware and protect the devices connected to the home network.  
  1. It limits what information your guests can see. It’s nice to be able to give your guests Internet access, but that doesn’t necessarily you want them to be able to see personal documents or family photo albums that are stored on your home network. A guest WiFi network allows visitors to connect to the Internet without infringing on your privacy.  
You can set up a guest WiFi network in the settings of your router, which can usually be accessed at 192.168.1.1 or 192.168.0.1 (but not always). Once you’ve logged in as an administrator, look for guest WiFi network settings under “Guest Zone” or “Guest Access” (or similar), and follow the setup instructions. Please note that not all routers have guest network capabilities.  

6) Take control of your IoT devices 
From smart locks to theater systems, gaming consoles to intelligent lighting, the modern home is a wonderland of Internet-connected devices. Otherwise known as the Internet of Things (IoT), these devices are ushering in a new era of convenience and advanced functionality, but they also pose a cybersecurity risk. 
Make 2019 the year in which you take control of your IoT devices. This might involve:  
  • Using strong, unique passwords for device accounts. 
  • Disabling unnecessary features, particularly those that may affect your privacy and/or network security.  
  • Always installing the latest software and firmware to ensure your devices are as stable and secure as possible.  

7) Start using a password manager
The average Internet user is expected to have more than 200 online accounts by 2020. Manually keeping track of so many login credentials is next to impossible, which explains why passwords such as “123456”, “password” and “qwerty” remain – much to the delight of cybercriminals – so popular. Using brute force or social engineering tactics, hackers can easily break into accounts guarded by weak passwords and steal whatever information lies beyond.  
 The good news is you don’t have to choose between convenience and a strong password. Password managers enable you to create and store highly secure passwords on the fly, and easily enter them when prompted. There are a few great password managers on the market, including RoboForm, which provides excellent encryption, multi-platform support and an excellent customizable password generator.
  
8) Encrypt your flash drives and external HDDs 
It’s all too easy to lose a flash drive or external hard drive, particularly if you’re a student or regularly travel for work. In the unfortunate event that your external drive is lost or stolen, you need to be certain that the data it contains cannot be accessed by whoever’s hands it falls into.  
External drive encryption comes in two main flavors:  
  • Hardware: A number of manufacturers make secure flash drives that come equipped with a physical pin pad or fingerprint scanner, which prevent access to the contents of the drive without the correct input. As you might imagine, these secure drives are significantly more expensive than regular external drives. 
  • Software: You can also use software to encrypt your external drives, making your files inaccessible to anyone without the password. Pro, Enterprise, and Education editions of Windows 10 come with built-in drive encryption software called BitLocker. Alternatively, you may wish to use VeraCrypt, a free, open-source encryption tool. 

9) Install an ad blocker 
Almost 1 in 3 people (31 percent) in the United States use an ad blocker, according to a report from Deloitte – and it’s easy to see why. By filtering out HTML elements that contain advertising, ad blockers can protect you against PUPs and malvertising, stop cookies that track your browsing and speed up your web browsing.  
There are a few different options available for each web browser, but one good option is uBlock Origin; a free, open-source ad blocker that works with most major browsers.  

10) Be more mindful on social media 
Social media platforms have become a hotbed for cybercrime in recent years thanks to the sheer number of users they attract, how easy it is to create fraudulent accounts and how quickly malicious content can be distributed.  
Make it your goal in 2019 to be more mindful on social media. Think before you click on any links that appear in your feed or personal messages (even if you know and trust the sender), be selective with friend requests (no matter how attractive they look in their profile picture) and don’t share your phone number, address, place of work or any other personal information that could make it easier for someone to steal your identity.  
​
Maximize Internet security in 2019 
We don’t know what the rest of the year has in store for you, but one thing is certain: malware isn’t going away any time soon. By practicing the security tips discussed in this article you’ll be in a great position to make 2019 your most cyber secure year ever.  

Comments are closed.

    Yellowstone Computing

    To read about us, click here!

    Archives

    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.