Basic rules for online safety. Basic Internet safety rules

An important problem today is security on the global network, and this problem concerns absolutely everyone, from children to pensioners. Due to the massive arrival of users on the Internet, this problem is becoming increasingly relevant.


Not all users are ready to face the threats that await them in the Internet space. This review will focus on the issue of Internet security. After all, millions of users are facing this problem today.

Dangers on the Internet

In short, there are two potential possibilities for a virus to get onto your computer. The first option is due to the user's fault. Very often, users, installing unverified software and traveling through dubious Internet resources, bring an infection to their computer. The second option is the activity of Trojans and viruses. Using these tools, attackers can deliberately make your device a source of danger.

As a result, the computer may start sending spam, stealing passwords, and participating in DDoS attacks on websites without the owner’s knowledge. In some cases, the provider decides to forcefully disconnect the infected device from the global network. Thus, a user who has no idea about information security on the Internet will have a hard time.

Why do attackers seek to gain access to a user's computer?

Many users believe that no one needs access to their computer. But this is far from true. It used to be that hackers created viruses out of pure curiosity. Today the situation is completely different. Now viruses are written with commercial gain in mind. A couple of decades ago, hackers received satisfaction only from the fact that they could gain access to this or that information. Or, for example, remotely change the wallpaper and theme on the user’s desktop. Today, every possible effort is being made to keep the PC user in the dark. Meanwhile, the device will secretly perform some additional functions. Why is this needed?

As mentioned at the beginning of the article, hackers today are trying to gain access to user accounts and electronic payment systems. There are often situations when at one moment all funds are debited from your e-wallet, and all your contacts in the mail receive letters with spam and Trojans. Hackers today have a lot of options, for example, they can unite infected computers into a single network and launch an attack on government servers.

Another simple option to get money from the user is to block the operating system and demand a certain amount to unlock it. Moreover, even if you pay the required amount to the attackers, this does not mean that the computer will be immediately unlocked. Therefore, Internet security is one of the user’s priorities today.

How can attackers gain access to your computer?

Professional hackers use a number of methods to hack a personal computer. Users are in vain hoping for antivirus protection. Even if you have taken precautions in advance, there is still a chance of picking up a virus or malware. Therefore, before searching the Internet for information about maintaining security online, it is important to understand the very mechanism of viruses and Trojans appearing on a personal computer. The following will list the main ways they penetrate and gain access to the user’s personal information.

The first method hackers use is called social engineering. Thanks to the use of tricks and psychological techniques, you open a letter sent by hackers containing a Trojan. It is noteworthy that you launch the virus on your computer with your own hands. Another popular technique is to offer free software. These are usually tricks that contain many viruses and Trojans.

By the way, even in software from trusted sources, security holes often appear. The same applies to operating systems. Attackers seize every opportunity. Simply follow an unverified link and your device is at risk of infection.

Recently, another method of spreading a computer infection has gained popularity. This is the so-called phishing. Fakes of popular sites are created on the Internet. So, instead of the official page of your bank, you may end up on a fake copy of it. Let's not talk about what might happen next.

How to protect your PC?

Ideally, a user who has just purchased a personal computer should complete a whole range of operations before starting to conquer the Internet. Below we will present several recommendations for safe browsing on the Internet. The Windows operating system has a built-in firewall.

But the standard security measure does not provide the required level of security. Therefore, it is recommended to install a more reliable firewall. Whether you will use the paid version or the free one depends only on your capabilities. The next step should be to install antivirus and antispyware software.

After installation, update them and set up automatic updates. It is better to make the antivirus update run automatically along with the operating system. Scan any program you install with an antivirus. When updates for the browsers you use appear online, try to download them immediately. To reduce the chances of hackers gaining access to various services, try to disable all unused components.

Information security lessons

Even if you have completed all the operations listed in the previous paragraph, do not forget about daily safety measures. First of all, do not open files downloaded from unverified sources. It is also better to immediately delete emails with suspicious content. Do not pay attention to offers of easy money, and especially do not send your logins and passwords to anyone. When registering, use complex passwords consisting of symbols, letters and numbers. Assign a new original password each time.

Be careful when using the Internet in public areas. The same goes for using a proxy server. With this connection, it is advisable not to make payments via the Internet. It is generally better to work with payment systems through special applications, rather than through the official website. It's safer this way. Sites for adults are also undesirable to visit. On such Internet resources there is a high probability of catching a Trojan. Even if you use an unlimited tariff, monitor your Internet traffic. A sudden increase in traffic for no reason is a serious cause for concern. Following these simple rules for working on the Internet will allow you to avoid many problems.

That's not all. There are a lot of dangers waiting for you on the Internet, so you shouldn’t forget about protection even for a second.

Precautionary measures

Next, we will give a few more recommendations to ensure safe browsing on the Internet. If you receive an email asking you to send your password for verification, do not respond to it. Banks do not carry out such checks. Today, all email programs have a feature that allows you to filter spam.

Activate it. You should also ignore messages about big wins or inheritances.
It is recommended to install programs that provide comprehensive PC protection. This is more reliable than using antivirus, antispyware and firewall from different manufacturers. And of course, it is worth considering that paid versions provide more reliable protection. Since the most common Internet browsers today are InternetExplorer and Opera, it is for them that there are the most viruses.

Try using alternative internet browsers such as GoogleChrome, MozillaFireFox and AppleSafari. Try not to use unlicensed software: it may initially contain viruses and spyware. If you often make purchases in online stores, try to use only proven options. The same rule applies to all online services. It is enough to follow these few simple requirements, and you can ensure your safety on the Internet.

Internet and children

In recent years there has been a big leap in the development of high technology. In this regard, more and more children are able to independently access the Internet. And if quite recently children on the Internet were mainly interested only in games, today the situation has changed somewhat. Surely you can guess what we are talking about.

Therefore, there is a need to ensure the safety of children on the Internet. It is extremely difficult to organize such protection, since the Internet is developing completely uncontrollably. It contains a lot of information that children should not have access to. You should also pay attention to the basic rules when working on the Internet. This way you can teach your child to avoid Trojans and viruses. Children are the most inexperienced users. They can easily fall for scammers. Therefore, it is very important to teach children to use this information resource correctly.

Teaching children how to use the Internet correctly

The main advice that can be given to all parents is to conduct at least the first sessions on the Internet with their child. It is advisable to use programs such as Parental Control. This will allow you to control the child's actions. Limit your child's independent use of email programs. This can be extremely dangerous.

Recommendations

Try to organize your child’s work on the Internet in such a way that he shares his successes and failures with you. Encourage your child to tell you about anything that makes him worry. Also, take some time and tell your child what confidentiality is, help him choose a password for registering on information resources. Explain to your child that surfing the Internet safely will help him avoid trouble.

Let him understand that you don’t need to give personal information about yourself to anyone on the Internet. Also tell him that there is no difference between actions on the Internet and in real life. Warn your child in advance that communication on the Internet may deceive his expectations, that in real life a person may not be at all who he claims to be. Be sure to install special software that allows you to control your children’s activities on the Internet.

Children from 14 to 16 years old

If your child is already a teenager, then it is unlikely that you will be able to tell him anything new about computers. But still, don’t forget about control. Remember the need to ensure information security. If your child has access to a shared computer, be sure to scan the computer for threats.

If all home devices are connected via a network, then the threat can develop into a serious problem. You can always view reports on your child's activities. Try not to create conflict situations, but calmly communicate with your child on this issue. Let your child understand that there are certain rules for using the Internet.

It is better to install a computer with network access in public areas. This will help hold the baby back a little. Also install software that will block your child’s access to unwanted Internet sites and make sure that no new programs appear on your computer. Do not allow children to spend long periods of time online, as this can cause addiction. That's all the recommendations. We hope that these tips will allow you to improve the security of your home computer.

The number of Internet users in Russia is growing every year; according to Mediascope for the period from October 2016 to March 2017, it increased by 2% and reached 87 million people, which indicates 71% of the country’s total population. At the same time, the goals of Internet users are varied; communication on social media. networks, searching for the necessary information, purchasing goods and services, selling goods and doing business.

At the same time, the number of cyber threats is growing; the media constantly contains reports about the theft of passwords from mailboxes amounting to millions, the release of famous TV series before the premiere (we are talking about the HBO series “Game of Thrones”), or interference in the elections of different countries (who In the know, Russian hackers helped Trump become US President by rigging voting data).

But the media only covers high-profile cyberattacks, which generate a great public outcry, ignoring everyday cybercrimes, which, according to experts, by 2018 could reach 2 trillion rubles in damage, which will affect the wallet of almost every tenth RuNet user, because our users neglect basic Internet safety rules.

To prevent users of our blog from becoming one of these “bad” statistics, I have prepared 10 rules that must be observed and adhered to.

1. Strong password

A password is the basis of security, which most RuNet users openly neglect, using simple passwords or the same ones for all resources, mail, social networks, forums and even personal accounts of payment systems.

And if large services care about the security of their users’ data, then small forums, online trackers, online stores neglect this and become a tasty morsel for hackers, because when the database is hacked, they also get access to users’ emails, because they have a password for everything services are the same.

According to the advice of experts, the password should consist of at least eight characters, including letters in different case, numbers and special characters in a chaotic order or in an order understandable only to the user.

Passwords must be different for key services, such as a mailbox, personal banking account, and the main social network. If you have difficulty coming up with a password, use a password generator, for example, randstuff.ru, but do not forget to write them down on paper so as not to forget.

    1Password (supports Mac, iOS, Android, Windows)

    LastPass (Web, Mac, iOS, Android, Windows support)

    Dashlane (Web, Mac, iOS, Android, Windows)

    OneSafe (Mac, iOS, Android, Windows)

    iCloud Keychain (iOS, Mac)

    Splikity (iOS, Android, Chrome, Firefox, Safari)

Don’t forget to change your passwords every three to six months, thereby reducing the risk of hacking; some services already have a forced password change, in certain periodicals, mainly social networks and e-wallets.

2. A good antivirus program

You should not rely on built-in protection, even if you have the latest version of Windows 10 installed; experts advise installing third-party antiviruses, because they are more effective, since now there is plenty to choose from, including free versions, the most popular of which are:

    Avast Free Antivirus

    AVG AntiVirus Free

    Bitdefender Antivirus Free Edition

    Antivirus Kaspersky Free

    ZoneAlarm Free Antivirus+

  • Avira Free Antivirus

    Adaware Antivirus Free

    Comodo Antivirus

    Panda Free Antivirus

    Qihoo 360 Total Security

At the same time, do not forget about updates to both the operating system itself and third-party applications that are installed after a reboot. It is better if your Internet connection allows you to set the settings to autoload.

3. Connection security

One of the most important aspects of security when working on the Internet, as well as the safety of your login and password when working in various Internet services, is the use of an encrypted connection via the HTTPS protocol, which can be checked in the address bar; it is visually displayed in the form of a padlock.

The presence or absence of this icon can signal to you that the site is secure, and also whether it is phishing if, for example, you followed a link to an online savings bank and ended up on an unsecured site with a similar name, as in the example in the screenshot below.

Therefore, pay attention to where you go, especially via links from SMS and messages from subscribers not from your circle or spam.

4. Linking to a phone number

Most major Internet services have additional security measures, one of which is linking your account to a mobile phone number, which is currently considered the most secure available, for example, the same code word, which is essentially a second password.

This function is mainly used in online banking and electronic wallets, because even if your login and password are captured by attackers, it will be technically difficult to intercept an SMS in order to complete the transaction or action they need. Therefore, email services and social networks now also have the ability to link to a mobile number. I strongly recommend that you take advantage of it immediately in order to protect your information as much as possible.

5. Give up “pirate”

It just so happens that in our country it is not customary to pay for someone else’s intellectual work and the majority prefer not to buy software, but to download it for free from various torrent trackers or other similar resources. At the same time, without suspecting that more than 76% of such software has viruses, Trojans and other malicious code, with the help of which they not only steal confidential information about the user, but can also use the device without the owner’s knowledge, for example, in hacker attacks or connect it to cryptocurrency mining .

In unlicensed Windows XP alone, experts found up to 63 different viruses, Trojans, spyware and other malicious code. At the same time, when downloading and installing such a “pirate”, antivirus programs do not see most of the malicious code, so if you are still using unlicensed software, you are at risk.

6. Filter your information

With the advent of social networks, publicity has become commonplace; many, without thinking about the consequences, openly share information that attackers can use for their own purposes, ranging from year and date of birth, full name, nicknames, ending with the name of their favorite dog, which, inappropriately, is also a password in Classmates.

Information about the user is collected in order to apply social engineering methods to him, when, based on the data, scammers can slip you a phishing site or send you an email from your boss (from a similar mailbox) with a link to a Trojan, which will subsequently result in some damage for you or simply they will select a password for your mailbox and from there to all the services where you are registered, and all because of the name of your beloved dog...

7. Free Wi-Fi danger

When using Wi-Fi hotspots in public places, be careful, although few people think about it and the word free Wi-Fi is exciting, it still increases the risk of losing your personal data.

Therefore, before connecting, make sure that the Wi-Fi network name (SSID) is from a valid source. Don't connect to random unsecured Wi-Fi networks. If possible, use a Virtual Private Network (VPN). VPN allows you to work on a separate, secure, private network even when connected to the public. Or you can use an app like Hotspot Shield, which sets up the VPN automatically.

Compliance with the above rules will significantly reduce the risk of losing your personal data or reduce it to zero. But the main thing is to be more careful, because according to surveys, most users become victims of scammers due to their carelessness.

For example, in an online survey conducted by Mail.Ru Group, in which 1,783 people aged 15 to 64 years old, who live in cities with a population of over 100 thousand people and access the Internet at least once a week, took part, users became victims of fraud for three reasons: they used simple passwords, downloaded viruses, and went to fraudulent sites.

  • Be careful with links contained in emails. They may lead in a completely different direction than the text information indicates.
  • Do not submit sensitive personal or financial information unless it is encrypted (if you are on a secure website). Regular emails are not encrypted.
  • Be careful! Fake websites that look like large company websites are designed to deceive customers and collect their personal information. Make sure that the websites you interact with contain privacy and security statements and review them carefully. Make sure the URL you want appears in the "address" or "host" field of your browser. Some websites may appear similar to what you need, but may in fact be fraudulent. Take a few extra seconds and type the URL yourself.
  • When transmitting sensitive information, look for the padlock symbol in the lower right corner of the web page. This symbol indicates that the site is running in secure mode. You must see it BEFORE you enter sensitive information.
  • Use strong passwords or PINs for your online accounts. Choose words that will be difficult for others to guess, and use a different password for each account you have. Use letters and numbers, and a combination of uppercase and lowercase letters if passwords or PINs distinguish between lowercase and uppercase letters.
  • When exiting the program, do so in accordance with established procedures. Don't just close your browser! Follow instructions when leaving the safe area to ensure your safety.
  • Avoid conducting any banking transactions in places where Internet services are publicly available, such as Internet cafes. It is very difficult to determine whether such computers are free of hacker programs that capture your personal information and account information. If you need to perform a transaction from a public computer, change your PIN from your computer after you have used the public computer. This is of great importance, since there is a risk of recording keystrokes (including bank card and credit card numbers, as well as PIN) using special programs built into the shared computer, without your knowledge.

Login and password

Login is your unique identifier, a “name” that makes it possible to protect your computer connected to the Network from unauthorized entry into the network by another person. When registering on our network, you indicate your login and enter a password known only to you.

Basic rules for handling Login and Password

  • Please do not share your password with others!
  • Do not respond to emails asking for your personal information!
  • Be suspicious of any company or person asking for your password, passport number or other sensitive information. NetByNet employees never request this type of information via email.
  • Periodically check your computer with an antivirus program for spyware that steals passwords and personal data.
  • Remember that all actions performed under your login/password are legally considered to have been performed by you.

Viruses

A computer virus is a program that violates the integrity of information on your computer, in some cases also leading to the failure of the equipment included in your computer. In modern conditions, computer viruses are an integral part of the information contained in local and global (Internet) networks, however, the influence of viruses on the operation of your computer can be neutralized by adhering to the following rules.

Basic rules of antivirus security.

  • Install reputable antivirus programs
  • Despite the large selection of anti-virus systems, you should use only packages that have proven themselves on our market. You can contact us for antivirus software recommendations. You should also give preference to well-supported products from our region, since, despite the global nature of the network, most viruses are specific to the Runet (Russian-language Internet).
  • Update your antivirus program periodically
  • Anti-virus scanners are capable of protecting only against those computer viruses whose data is contained in the anti-virus database. This is not enough to guarantee absolute protection, if only because new types of virus programs appear. Therefore, it is necessary to update anti-virus databases regularly. The more often this simple operation is performed, the more protected the workplace will be.
  • Be careful with files in emails. Never open suspicious files that come from people you don't know.
  • Never run programs sent by an unknown person! This rule is well known and does not need explanation. However, files received from “reliable” correspondents (acquaintances, colleagues, friends) can also be infected. Your friends may not know that unauthorized letters are being sent from their computer: the virus is capable of sending messages on someone else’s behalf, unnoticed by the computer owner! Before opening any file, you must scan it with anti-virus tools. Naturally, good antivirus packages scan automatically.
  • Limit the circle of people using your computer
  • The ideal situation is when no one except you has access to your computer. However, if this is not possible, it is necessary to clearly delineate access rights and determine the range of permitted actions for other persons. First of all, this concerns working with floppy disks and CDs, the Internet and e-mail.
  • Make regular backups
  • By following this rule, you will be able to save data not only if your computer is infected with a virus, but also in the event of a serious breakdown in the computer hardware.
  • Do not panic!

We in no way want to create the impression among users that viruses are an irreparable disaster. Viruses are the same programs as, say, a Windows calculator or notebook. Their distinctive feature is that viruses are able to reproduce (that is, create copies of themselves), integrate into other files or boot sectors, and also perform other unauthorized actions. Rash actions aimed at neutralizing the virus can cause much more harm. When working on a corporate network, you should immediately contact your system administrator. If you are just a home user, then contact the company from which you purchased the antivirus program. Give the opportunity to professionals to take care of the security of your computer, otherwise you may forever lose the information stored on your computer.

In conclusion, it should be added that malware may not be a virus as such, but it can certainly create difficulties when working on a computer. These could be, for example, intrusive advertising programs that enter the address of their page into the system as the starting page when browsing the Internet, and do not provide the opportunity to change it in the future. Therefore, in addition to antivirus software, it is a good idea to install AdAware programs that protect against such malware.

Work via WiFi radio modems

Wireless networks have a lot in common with wired networks, but there are also differences. In order to penetrate a wired network, a hacker must physically connect to it. In the Wi-Fi version, it is enough for him to install an antenna in the nearest gateway within the network coverage area.

What could an attacker theoretically gain from a wireless network whose configuration has not been given due attention?

Here is the standard list:

  • access to resources and disks of Wi-Fi network users, and through it - to LAN resources;
  • eavesdropping on traffic and extracting confidential information from it;
  • distortion of information passing through the network;
  • Internet traffic theft;
  • attack on user PCs and network servers (for example, Denial of Service or even radio jamming);
  • introduction of a fake access point;
  • sending spam, illegal activities on your behalf.
The NetByNet network allows clients to install household Wi-Fi equipment for personal use and organize an internal Wi-Fi network to connect several computers within an apartment. But we urge you to pay due attention to the security of your wi-fi equipment.

The basic rules for organizing and setting up a private Wi-Fi network (if there is no goal of making it publicly available) are as follows:

  • Please read the documentation carefully before purchasing network devices. Find out what protocols or encryption technologies they support. Check if your OS supports these encryption technologies. If not, then download updates from the developer’s website. If a number of technologies are not supported by the OS, then this must be supported at the driver level;
  • Pay attention to devices using WPA2 and 802.11i, as this standard uses the new Advanced Encryption Standard (AES) for security;
  • If your access point allows you to deny access to your settings via a wireless connection, then use this feature. Configure AP by wire only. Do not use the SNMP protocol, web interface or telnet over the radio;
  • If the access point allows you to control client access by MAC addresses (Media Access Control, in the settings may be called Access List), use this feature. Although the MAC address can be spoofed, it is nevertheless an additional barrier on the path of an attacker;
  • If the equipment allows you to prohibit broadcasting of the SSID, use this option (the option may be called “closed network”), but even in this case, the SSID can be intercepted when a legitimate client connects;
  • Deny access to clients with the default SSID "ANY" if the hardware allows it. Do not use simple SSIDs in your networks - come up with something unique that is not tied to the name of your organization and is not in dictionaries. However, the SSID is not encrypted and can be easily intercepted (or spied on the client’s PC);
  • Place the antennas as far as possible from windows and external walls of the building, and also limit the radio power to reduce the likelihood of connection from the street. Use directional antennas, do not use the default radio channel;
  • If, when installing network device drivers, you are offered a choice between encryption technologies WEP, WEP/WPA (middle option), WPA, select WPA (in small networks you can use Pre-Shared Key (PSK) mode). If devices do not support WPA, be sure to at least enable WEP. When choosing a device, never buy something that doesn't even support 128bit WEP.
  • Always use the longest possible keys. 128-bit is the minimum (but if there are 40/64-bit cards on the network, then you will not be able to connect to them). Never enter simple, “default” or obvious keys and passwords in the settings (birthday, 12345), change them periodically (in the settings there is usually a convenient choice of four predefined keys - tell clients what day of the week which key is used ).
  • Do not give anyone information about how and with what passwords you connect (if passwords are used). Distorting or stealing data, as well as eavesdropping on traffic by inserting it into the transmitted stream, is a very labor-intensive task when long, dynamically changing keys are used. Therefore, it is easier for hackers to use the human factor;
  • If you use static keys and passwords, make sure to change them frequently. It is better to do this by one person - the administrator;
    If the device settings offer a choice between the WEP authentication methods "Shared Key" and "Open System", select "Shared Key". If the AP does not support filtering by MAC addresses, then to enter the "Open System" it is enough to know the SSID, but in the case of "Shared Key" the client must know the WEP key (www.proxim.com/ support/ all/ harmony/ technotes/ tn2001-08-10c.html). However, in the case of "Shared Key" it is possible to intercept the key, and the access key is the same for all clients. Due to this, many sources recommend "Open System";
  • Be sure to use a complex password to access the access point settings. If the access point does not allow you to restrict access with a password, its place in the landfill;
  • If you are asked to enter a key phrase to generate a key, then use a set of letters and numbers without spaces. When manually entering a WEP key, enter values ​​for all fields of the key (in hexadecimal notation, you can enter numbers 0-9 and letters a-f).
  • If possible, do not use TCP/IP protocol on wireless networks to organize shared folders, files, and printers. Organizing shared resources using NetBEUI is safer in this case. Do not allow guest access to shared resources, use long, complex passwords;
  • If possible, do not use DHCP on your wireless network - manually distributing static IP addresses between legitimate clients is safer;
  • Install firewalls on all PCs within the wireless network, try not to install an access point outside the firewall, use a minimum of protocols within the WLAN (for example, only HTTP and SMTP). The fact is that in corporate networks there is usually only one firewall - at the Internet exit, but an intruder who has gained access via Wi-Fi can get into the LAN, bypassing the corporate firewall;
  • Regularly examine the vulnerabilities of your network using specialized security scanners (including hacker ones like NetStumbler), update firmware and device drivers, and install patches for Windows.

Please remember that if your wi-fi network is compromised and an attacker commits illegal actions on the Internet on your behalf, it is very difficult to prove your innocence.

In the field of information technology development, projects that teach schoolchildren about cybersecurity issues are currently of high relevance. Among the projects presented on the network, a special role is occupied by the portal “Setevichok.rf”, which was developed and maintained by a group of schoolchildren with the expert support of the NP “Safe Internet League”. Resource "Setevichok.rf"- a specialized portal for training and consulting schoolchildren on cybersecurity issues.

The organizer of the project is “School Know-It-All Blog” www.e-parta.ru Information and educational portal for teenagers.
The project has a positive expert opinion from the Ministry of Education and Science of the Russian Federation.

    • Helpline “Children Online” is a free all-Russian telephone and online counseling service for children and adults on problems safe use of the Internet and mobile communications .
    • Hotline of the Friendly Runet Foundation
    • Federal program for safe children's Internet Gogul
    • Parental Controls Overview
    • Internet and children. Security tips from Kaspersky Lab
    • Rules for safe browsing on the Internet from Microsoft

Internet Safety Reminder

Every year there are more young people on the Internet, and schoolchildren are among the most active users of the Runet. Meanwhile, in addition to a huge number of opportunities, the Internet also brings problems. This guide should help you stay safe online.

A computer virus is a type of computer program, the distinctive feature of which is the ability to reproduce. In addition to this, viruses can damage or completely destroy all files and data controlled by the user on whose behalf the infected program was launched, as well as damage or even destroy the operating system with all files as a whole. In most cases, viruses are spread via the Internet.

Anti-malware methods:

  • Use modern operating systems that have a serious level of protection against malware;
  • Constantly install patches (digital patches that are automatically installed to improve the program) and other updates to your operating system. Download them only from the official website of the OS developer. If there is an automatic update mode, turn it on;
  • Work on your computer as a user, not an administrator. This will prevent most malware from installing on your personal computer;
  • Use anti-virus software products from well-known manufacturers, with automatic database updates;
  • Restrict physical access to the computer for unauthorized persons;
  • Use external storage media, such as a flash drive, disk or file from the Internet, only from trusted sources;
  • Do not open computer files obtained from untrusted sources. Even those files that your friend sent. It’s better to check with him whether he sent them to you.

Tips for staying safe on public Wi-Fi networks

Wi-Fi is not a type of data transmission, not a technology, but just a brand. Back in 1991, the Dutch company registered the “WECA” brand, which stood for the phrase “Wireless Fidelity,” which translates as “wireless precision.” Another abbreviation has reached our time, which is the same technology. This is an abbreviation for "Wi-Fi". This name was given with a hint of the highest standard of audio technology, Hi-Fi, which means “high precision”.

Safety tips for working on public Wi-fi networks:

  • Do not share your personal information over public Wi-Fi networks. When working in them, it is advisable not to enter access passwords, logins or any numbers;
  • Use and update antivirus programs and firewall. This way you will protect yourself from downloading a virus to your device;
  • When using Wi-Fi, turn off File and Printer Sharing. This function is disabled by default, but some users activate it for ease of use at work or study;
  • Do not use public WI-FI to transmit personal data, for example to access social networks or email;
  • Use only a secure connection via HTTPS, not HTTP, i.e. when typing a web address, enter “https://”;
  • On your mobile phone, disable the “Connect to Wi-Fi automatically” function. Do not allow your device to automatically connect to Wi-Fi networks without your consent.

Basic tips for safety on social networks

Social networks are actively entering our lives, many people work and live there permanently, and a billion people are already registered on Facebook, which is one seventh of all the inhabitants of the planet. Many users do not understand that the information they post on social networks can be found and used by anyone, including those who may not have good intentions.

Basic social media safety tips:

  • Limit your friends list. Your friends should not include random or unfamiliar people;
  • Protect your privacy. Do not include passwords, phone numbers, addresses, your date of birth or other personal information. Attackers can even use information about how you and your parents plan to spend the holidays;
  • Protect your reputation - keep it clean and ask yourself: would you like other users to see what you upload? Think before you post, write, or upload anything;
  • If you are talking to people you don’t know, do not use your real name and other personal information: name, place of residence, place of study, etc.;
  • Avoid posting photographs online that show you in a location that could indicate your location;
  • When registering on a social network, you must use complex passwords consisting of letters and numbers and with at least 8 characters;
  • For social networks, mail and other sites, you must use different passwords. Then if you are hacked, the attackers will have access to only one place, and not all at once.

Basic tips for working safely with electronic money

Electronic money is a very convenient method of payment, but there are scammers who want to get this money.

Electronic money appeared quite recently and it is precisely because of this that in many countries it is still not spelled out in laws. In Russia, they function and are already spelled out in the law, where they are divided into several types - anonymous and non-anonymous. The difference is that anonymous ones are those in which operations are allowed to be carried out without user identification, and in non-anonymous ones, user identification is mandatory.

You should also distinguish between electronic fiat money (equal to state currencies) and electronic non-fiat money (not equal to state currencies).

Basic tips for working safely with electronic money:

  • Link your mobile phone to your account. This is the most convenient and fastest way to restore access to your account. A linked phone will help if you forget your payment password or access the site from an unfamiliar device;
  • Use one-time passwords. After switching to enhanced authorization, you will no longer be in danger of theft or interception of your payment password;
  • Choose a complex password. Criminals will have a hard time guessing a complex password. Strong passwords are passwords that are at least 8 characters long and include lowercase and uppercase letters, numbers, and multiple symbols such as dollar sign, pound sign, exclamation point, etc. For example, $tR0ng!;;
  • Don't enter your personal information on sites you don't trust.

Basic tips for using email securely

Electronic mail is the technology and services it provides for sending and receiving electronic messages that are distributed over a computer network. Typically, an email mailbox looks like this: user_name@domain_name. Also, in addition to transmitting simple text, it is possible to transfer files.

Basic tips for using email securely:

  • You need to choose the right mail service. There is a huge selection of free email services on the Internet, but it is better to trust those you know and who are first in the ranking;
  • Do not include personal information in your personal email. For example, it is better to select “music_fan@” or “rock2013” ​​instead of “topic13”;
  • Use two-step authentication. This is when, in addition to the password, you need to enter a code sent via SMS;
  • Choose a complex password. Each mailbox must have its own strong, hack-resistant password;
  • If you have the opportunity to write your own personal question, use this opportunity;
  • Use multiple mailboxes. The first is for private correspondence with recipients you trust. This email address does not need to be used when registering on forums and websites;
  • Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files;
  • After finishing work on the mail service, before closing the tab with the site, do not forget to click on “Exit”.

Basic tips to combat cyberbullying

Cyberbullying - harassment by messages containing insults, aggression, intimidation; hooliganism; social boycotting using various Internet services.

Basic tips to combat cyberbullying:

  • Don't rush into battle. The best way: seek advice on how to behave and, if there is no one to whom you can turn, then calm down first. If you start responding to insults with insults, you will only inflame the conflict even more;
  • Manage your cyber reputation;
  • Anonymity on the Internet is imaginary. There are ways to find out who is behind an anonymous account;
  • You should not lead a hooligan virtual life. The Internet records all your actions and stores them. It will be extremely difficult to remove them;
  • Maintain your virtual honor from a young age;
  • Ignore the single negative. One-off offensive messages are best ignored. Usually the aggression stops at the initial stage;
  • Ban the aggressor. In instant messaging programs and social networks, it is possible to block sending messages from certain addresses;
  • If you are a witness to cyberbullying. Your actions: speak out against the stalker, show him that his actions are assessed negatively, support the victim who needs psychological help, inform adults about the fact of aggressive behavior online.

Basic Mobile Phone Security Tips

Modern smartphones and tablets contain quite mature functionality, and now they can compete with desktop computers. However, there are still very few protection measures for such devices. Testing and searching for vulnerabilities in them is not as intensive as for PCs, the same applies to mobile applications. Modern mobile browsers have almost caught up with their desktop counterparts, but expanding functionality entails greater complexity and less security. Not all manufacturers release updates that close critical vulnerabilities for their devices.

Basic tips for mobile phone security:

  • Nothing is truly free. Be careful, because when you are offered free content, there may be some paid services hidden in it;
  • Think before you send an SMS, photo or video. Do you know exactly where they will end up?
  • It is necessary to update the operating system of your smartphone;
  • Use antivirus programs for mobile phones;
  • Do not download applications from an unknown source, as they may contain malicious software;
  • After you leave the site where you entered personal information, go to your browser settings and delete cookies;
  • Periodically check which paid services are activated on your number;
  • Only give your mobile number to people you know and trust;
  • Bluetooth should be turned off when you are not using it. Don't forget to check this sometimes.

Basic tips for gaming account security

Modern online games are colorful, exciting entertainment that unites hundreds of thousands of people around the world. Players explore the world given to them, communicate with each other, complete tasks, fight monsters and gain experience. They pay for pleasure: they buy a disc, pay for a subscription or purchase some options.

All these funds are used to maintain and develop the game, as well as to security itself: authorization systems are improved, new patches (digital patches for programs) are released, and server vulnerabilities are closed. In such games, you should be afraid not so much of your opponents as of the theft of your password, on which the authorization system of most games is based.

Basic tips for the security of your gaming account:

  • If another player behaves badly or causes trouble for you, block him from the list of players;
  • Complain to the game administrators about the bad behavior of this player, it is advisable to attach some evidence in the form of screenshots;
  • Do not provide personal information in your game profile;
  • Respect other participants in the game;
  • Do not install unofficial patches and mods;
  • Use complex and different passwords;
  • Even while playing, you should not disable your antivirus. While you are playing, your computer can be infected.

Basic tips for fighting phishing

The usual theft of money and documents today will not surprise anyone, but with the development of Internet technologies, attackers have moved to the Internet and continue to do their “favorite” business. This is how a new threat emerged: Internet fraud or phishing, the main goal of which is to obtain confidential user data - logins and passwords. In English, phishing is read as phishing (from fishing - fishing, password - password).

Basic tips to combat phishing:

  • Keep an eye on your account. If you suspect that your profile has been hacked, then you need to block it and inform the resource administrators about it as soon as possible;
  • Use safe websites, including online stores and search engines;
  • Use complex and different passwords. Thus, if you are hacked, the attackers will have access to only one of your online profiles, and not all of them;
  • If you have been hacked, then you need to warn all your friends who are added as your friends that you have been hacked and, possibly, spam and links to phishing sites will be sent on your behalf;
  • Set a strong password (PIN) on your mobile phone;
  • Disable password saving in the browser;
  • Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files.

Essential tips for protecting your digital reputation

Digital reputation is negative or positive information about you online. Compromising information posted on the Internet can seriously affect your real life. “Digital reputation” is your image, which is formed from information about you on the Internet. Your place of residence, study, your financial situation, character traits and stories about loved ones - all this accumulates on the Internet.

Many teenagers are frivolous about publishing personal information on the Internet, not understanding the possible consequences. You won’t even be able to guess that a photo posted 5 years ago was the reason they refused to hire you.

1) Do not send confidential information (bank card number, PIN code, passport data) through social network messengers. It is better to delete letters with scanned documents immediately after sending or receiving them; there is no need to store them in the mail.

3) Turn off Wi-Fi when not in use. Protect yourself and save battery power. Be sure to turn off the automatic Wi-Fi connection feature on your phone or tablet.

4) Don't trust unverified Wi-Fi connections that don't ask for a password. Most often, it is these networks that attackers use to steal users’ personal data.

5) Do not access online banks and other important services through open Wi-Fi networks in a cafe or on the street. Use mobile internet.

6) Remember: banks, services and stores never send letters asking you to follow a link, change your password, enter your bank card number and secret confirmation code, or provide other personal data!

7) Disable Siri on iPhone. Most likely, you don’t use it, but scammers have already learned how to withdraw money through online banking using voice commands.

8) Create several email addresses: personal, work and entertainment (for subscriptions and services).

9) Create a complex password, different for each mailbox. We wrote about how to do this.

10) Wherever possible, enable two-factor authentication.


11) Change passwords regularly, update your browser and spam filters.

12) Install and update antivirus programs. Outdated versions may not guarantee protection against malware. Several new viruses appear in the world every day, so an antivirus needs to receive information about methods to combat them as often as possible.

13) Clicking on links received in messages from strangers is a sure way to fall for cyber scammers and infect your device with viruses. A dangerous link can also come from a hacked friend, so it’s better to find out what he sent you and whether you need to open it.

14) Do not run unknown files, especially those with the .exe extension

15) Carefully check the link addresses, logos, text and sender of messages.

16) Never respond to spam.

17) If you receive a request via messenger from a friend asking you to urgently send money, do not send anything! First, call him back and make sure that the account has not been hacked by intruders.

18) Read Kevin Mitnick's book "The Art of Deception." Mitnick is a cult figure in the information security community, and his book, like his life story, is both fascinating and instructive. You will learn how cybercriminals gain people's trust by manipulating their feelings.

19) A minimum of personal information: do not publish your home address online, do not write what time you are not at home, do not describe your regular route, do not boast about large purchases, and generally try not to advertise your level of income.

20) Back up your data regularly. Follow the 3-2-1 rule: create one primary copy and two backup copies. Save two copies on different physical media, and one in cloud storage (Google Drive, Yandex.Disk, special solutions from Acronis). Don’t forget to backup all devices: smartphones, tablets, computers/laptops.

21) To never lose money on unnoticed payments, not to buy additional services by mistake and to accurately pay for what you need, always read the rules before checking the “I agree” checkbox and proceeding to payment.

22) If in your security question you indicated your mother’s maiden name, which is now publicly available on her social media pages, be sure to change the security question.

23) Set a safe mode for the child. To do this, create a separate account on the website of the search engine of your choice or use children's search engines: Gogul or Sputnik.kids.

24) Talk to your child about the Internet: agree that he will inform you about unwanted information found. Explain that not all information on the Internet is reliable, and teach them to consult with you on any unclear issue.

25) Do not download dubious applications or try to do so from unknown links. Use only the official App Store, Google Play and Windows Market.

26) Advice for Google Chrome, Firefox and Opera users: if you often travel and access the Internet from a laptop in public places, install a special browser extension to access the Internet safely. We recommend. By default, this plugin provides a secure connection for Yahoo, eBay, Amazon and some other web resources. You can also add sites of your choice.

28) When purchasing from online stores, maintain healthy skepticism. Remember: the price cannot be too low, especially if you are counting on purchasing original brand products.

29) Study the history of the store online, check for contacts, find out if you can come there and meet in person. When reading reviews, pay attention that they are different. Custom reviews are written by people who have to do this many times a day, so such texts seem to be written according to a template.

30) See how sellers react to reviews. Pay special attention to the negative ones: if they are dealt with, this is a good sign (and the situation must be specific, contain the order number, etc.).

31) Pay safely! The classic case is that you will be redirected to a secure page (the address begins with “https://”). If not, it's better not to risk it. According to acquiring rules, the seller’s website must contain information about who accepts the payment. Read it and compare it with what is written on the next page.

32) Get a separate (virtual) card for online payments.

33) If you use your regular card to pay online, do not store large amounts of money on it.

34) Connect your bank to SMS notifications about all transactions on cards and accounts. This way you can quickly notice if your card is compromised and block it.

35) The pages for entering confidential information of any serious service are always protected, and the data is transmitted in encrypted form. The site address must begin with “https://”, next to which there is a closed green padlock.


36) Where to go if something goes wrong? The activities of online stores are controlled by the same organizations as regular ones: Rospotrebnadzor, the Society for the Protection of Consumer Rights. Be sure to write to the Runet Hotline: www.hotline.site

37) Be careful when communicating online with strangers, they may not be who they say they are.

39) Do not repost compassionate announcements about a cute cat who is urgently looking for a home (and in the post - the owner’s phone number or card number where you can transfer money for the care of the animal). There is a high probability that these are scammers who decided to make money on compassionate and gullible citizens.

40) The logo of a well-known charitable foundation does not mean that the money will go there - the account details can be falsified. If you want to help people, do it only for people you know personally or, for example, with a project

44) By following the link http://www.tcinet.ru/whois/ you can find out when the site was created. Attackers usually create one-day pages that are closed very quickly.

45) Lost your phone to which your bank card is linked? Block both your SIM card and your card immediately.

46) It is better not to use torrents: if you download illegal content, you are not only ripping off your favorite author, but you may also download a file infected with a virus.

47) Fraudsters create websites where you can supposedly watch or download the movie you like for free, but first you need to leave your phone number or send a message to a short number. This way, a significant amount of money can be deducted from your account for SMS, and the phone itself will end up in the spammers’ database.

48) Some applications and services have a free trial period (for example, 2-3 months), after which you must disable the service yourself. If you do not do this, the subscription may be automatically renewed and become paid, and money will be debited from the card specified during registration.

49) Do not participate in promotions with prizes where you have to pay for something and then ask several other people to do the same. It's a pyramid!

50) Always lock your computer screen, even if you are leaving “just for a minute.”