Skip to main content

Being Safe Online

 How to Stay Safe Online


The Internet has recently become an important conduit for information and communications. Security of these information transmitted and privacy of communications are some serious concerns. There are cases of careers ruined as a result of misuse of the internet and people defrauded of their hard earned money. Also, there are cases of individuals committing suicide as a result of online bullying or blackmail over personal media. It is evident that we need to take adequate precautions when using the internet.


Common Internet Threats


1. Let's first discuss some common threats internet user may face online. These may be:


a. Phishing.


Phishing is an attempt to get sensitive information using authentic looking websites or emails. Such information include username, password or ATM card details. This is one of the technics used by the famous yahoo yahoo boys.


b. Cyberstalking.


Cyberstalking is the use of the Internet to contact someone or find out information about them in a way that is annoying or frightening.


c. Cyberbullying.


Cyberbullying is the act of harassing someone online by sending or posting mean messages. It might be in a bid to rattle you.


d. Blackmail.


Blackmail is demanding money from someone in return for not revealing compromising information. This information could be compromising private images exchanged with a spouse or associate.


e. Kidnapping.


Most times we leave the location on our devices on, to get for example an accurate weather report on our present location. But, this can also aid kidnappers in tracking your movements.


Ways to Stay Safe Online


2. Here are some ways you can ensure your safety when online:


a. Avoid using the same password for many internet accounts. Use a password manager to create and store strong unique passwords for your different accounts.


b. Do not leave mobile phones or other personal electronic devices unattended.


c. Never open emails or attachments from someone you don’t know.


d. Ensure online transactions are over Hyper Text Transfer Protocol Secure (https) not "http". This is because the secure version is less prone to attack than the unsecured "http".


e. Be careful with your personal information online especially when using a computer that is not yours. Your information could be of use to impersonate you.


f. Be sure to have an updated antivirus or antispyware application installed on your device.


g. Do not respond to abusive messages. Either ignore or use the report link, if available.


h. Be careful about what you post on social media. 


i. Finally, ensure your system is up to date.



Comments

Popular posts from this blog

5 Things That Every New Developer Needs to Know

Even though I have only been developing software "professionally" for around two years, there is a ton of information that I can pass on to fledgling developers and hackers. Learning how to program is just the beginning of learning software development and actually becoming awesome at it. If you are taking computer science or MIS/CIS courses at a university, I can imagine that you are learning technical aspects, system design, programming languages, computer logic, and maybe even a little user interaction design. The problem is that with any technical field, there is almost too much to learn. So, here are the top 5 things that every new developer needs to know to prepare themselves for the "real world" of software development. You can't please everyone all the time. So don't. When it comes to designing and implementing new software and systems, you will inevitably have some system users. Also, you tend to have more than on...

Businessman arrested with Cynthia's BB

A Port Harcourt businessman has been arrested by the police for being in the possession of a Blackberry phone reported to be owned by the late Cynthia Udoka Osokogu, who was allegedly raped and murder by some suspect. The businessman admitted to purchasing the phone through a friend in Lagos, which was later sent to him through a courier. Police were able to use the BB pin to get the SIM number of the businessman, hence were able to track the phone to Port Harcourt, even though it had already been flashed. P.S. Just one of the many disadvantages of buying a used phone

Scam Alert

Please watch out for scam sites which tαкєs advantage of the gullibility and eagerness of job seekers to dupe them. An example, you hear something like customs is recruiting and then you're told to apply via α link such as " http://www.nigeriacustomsservice.org/log.php ". Going through thє site, you'd notice lots of discrepancies, thє site is plagued with broken & non functional links, poor grammar, inconsistent use of character casing, improper alignments, suspicious copyright etc. Iη general, it's α poorly designed site and α sorry attempt αt imitating thє real site with intent to defraud unsuspecting job seekers. If you google "Nigeria Customs Service", you'd sєє thє real Customs site listed as " www.customs.gov.ng ". Be careful and try to pay attention to details. Wish you success as you job hunt. Regards Jay