By Kim Kommando …..
We all have bad habits, like biting our nails or drinking straight from the milk carton. While it’s bad form, it won’t steal your life savings. It won’t target your children.
As a digital expert, I cringe when people confess their hazardous activities and unacceptable etiquette. It’s time to quit the bad behavior. Here are seven things you should never do online.
- Be gullible to posts and videos
It doesn’t take much effort to create a convincing hoax. With the right phrasing and a dab of digital wizardry, you can convince millions of people that Brad Pitt committed suicide, or drilling a hole in your iPhone 7 will reveal a hidden headphone jack. (It won’t by the way, but here’s the video that has over 15 million views and fooled some into destroying an iPhone.)
True, it’s hard to tell a hoax is a hoax, but if you hear something shocking, run a quick internet search before you believe it. You may save yourself a lot of embarrassment, and you’ll leave the pranksters less reason to fool people.
- Skip setting up two-factor authentication
Don’t let the fancy name “two-factor authentication” throw you. It just means that to login to your account, you need two ways to prove you are who you say you are. It’s like the bank or DMV asking for two forms of ID.
Most major services and companies, such as Amazon, Google, Facebook, Microsoft and Apple, offer two-factor authentication. It’s essential to set up.
This way, no one can access your account if your password is compromised. Some sites ask for your cell number, so they can text supplemental access codes if a password reset is enacted. You can also get alerts every time your account is accessed from an unfamiliar browser or device.
- Use the same password for multiple sites
Passwords used to be so easy. Your pet bunny was named “Pinky,” so that became your password. Nowadays, passwords look more like JaYW1x%BuUnZ#. Even if you could remember this gobbledygook, do you really want to dream up more than one password that looks like this? Security is vital these days, and complex passwords are the way to go. But there is a simple way to remember good passwords that are also unique to each site.
- Sync your social media accounts
It’s difficult keeping up with all your social media accounts. Services like Buffer, Hootsuite, and SproutSocial help you manage your social presence across several platforms from one dashboard. Unfortunately, some people make the mistake of scheduling the same message across all their profiles. Remember, tweets and Facebook posts are very different things, as are Instagram and Google+.
Social media is an art. It’s a little more time-consuming to tailor your announcements to each type of social media, but it’s like the old carpenter’s motto: measure twice, cut once.
- Share too much information about your kids
Sharing a few cute photos is fine, but posting too much private information can be very dangerous. I even warn the parents in my family: Suppose your 8-year-old daughter is at soccer practice, and a stranger approaches and says, “Hi, Susie. I work with your father John at the dentist’s office. He just had an accident in his blue 2014 Honda Accord and your Dad asked me to drive you to him at St. Vincent’s Hospital.”
Today, it’s easier than ever for predators to find your child’s name, plus your own professional and personal data. Aggressive predators might even track down schedules for sporting events and after-school clubs. Don’t give them a chance to sound credible.
- Use public Wi-Fi without giving it much thought
Most people feel very comfortable walking into a hip urban café and logging onto the local WiFi. But is it really the local WiFi? Lots of people log on to systems named “CoffeeShop” or “ILoveFood” and have no idea that these belong to data-hungry hackers.
Hackers set up their own fake public Wi-Fi with a misleading name. Upon logging in, the victim’s keystrokes are recorded and stolen to obtain personal information. Hackers will also send malware disguised as updates to a victim’s computer. Once the malware is installed, the hackers gain full control of the computer without the victim’s knowledge.
In this video from Australia’s ABC, cybersecurity consultant Kevin Mitnick demonstrates how it’s done.
That’s why you want to use a virtual private network or VPN. A VPN service lets you create an encrypted connection with one of its servers, and you use that server to use the internet. The connection is encrypted through the server, so the VPN can’t see your traffic either. It’s a bit more complicated, but that’s the result.
- Get into arguments on social media
We have all stumbled into a meme that makes us angry. Or someone sends us a forwarded message that sounds totally misinformed. Or some troll posts a series of vicious comments. My advice: Do not engage.
There’s nothing tackier than a social media argument. Even well-intentioned comments can sound snarky and mean-spirited. Friendships often fall apart after sparring on Facebook or Twitter. If you need to sort out your differences, it’s best to do this in person or over the phone. Social media is a high wire act, and most arguments end badly.
Please Subscribe for free on the right panel to receive updates as soon as they are published.
And please comment below, or visit our “Comments and Discussion” page and tell us what you think.
Data Source: http://bit.ly/2foK4UO