Three Cybersecurity Tips to Protect Yourself and Your Devices From Privacy Threats

By Tom Kelly

On September 13, Apple suddenly released an unprecedented, emergency security update after researchers at Citizen Lab discovered that an Israeli spyware group was able to infect Apple products via a critical cybersecurity vulnerability. Before the emergency patch, cybercriminals could use what’s called a “Zero-Day exploit” to put malware on Apple products without ever being detected.

Apple had to work non-stop to patch the vulnerability before cybercriminals around the world caught wind of the exploit. But while this particular cybersecurity crisis may have been narrowly averted, it’s far from an isolated incident. This year alone saw a massive surge in ransomware attacks, malware and more.

These attacks don’t just target businesses and industries; they target individuals too. We all use our phones, social media websites, smartphone apps and other digital services to live our daily lives and share our sensitive information. Today, the security of that information is at risk.

The fact is that cybercrime has been on the rise since the start of the pandemic. As more and more people rely on digital products and services to do their banking, shopping, investing, working, dating and socializing, almost no one and nothing is immune to the growing threat posed by the world’s cybercriminals.

But ordinary people can and should take charge of their own cybersecurity and protect the privacy of their data.

Using digital technology doesn’t mean you have to sacrifice your safety, security and privacy. But you can’t rely on the companies behind the products you use to do all the work for you. Cybercriminals are working around the clock to hack your devices and steal your data; taking careful and proactive steps to protect yourself is key.

It may not be possible to prevent the next zero-day exploit, but you can keep yourself from falling victim to any of the countless cyberattacks launched every day. Here are my three cybersecurity tips.

(1) Use Two-Factor Authentication and Other Security Protocols

Cybercriminals are dedicated, hard-working and, in many cases, well-funded. They are always trying to find new ways to hack your devices and online accounts.

There’s a lot that companies can do to make their products and services more secure. But 95% of cybersecurity breaches are due to human error. If you want to be as secure as possible, you have to take steps on your own to protect yourself.

For most people, that means using things like two-factor authentication or creating unique and difficult-to-guess passwords for their accounts. Some of these security protocols may seem burdensome; but they are simple steps that can have a huge impact.

(2) Beware of Suspicious Links and Emails

It’s easy to focus on the big cyber incidents involving state-of-the-art technology. As scary and significant as these incidents can be, they are far from the most common type of cybercrime.

Most often, cybercriminals rely on a tactic known as social engineering. That means cybercriminals try to manipulate and trick people, rather than directly hack their devices. The only defense against social engineering is vigilance.

Social engineering usually involves a phishing attack, where cybercriminals send emails that look legitimate to try to get people to give up their bank information, volunteer their login credentials or simply download malware. So keep an eye out for suspicious emails; if it doesn’t feel or look right, be careful!

(3) Take Control of Your Data

An emerging threat to everyone’s cybersecurity is the internet itself. So many of the websites and services we use, especially things like our social media platforms, collect massive amounts of information about us. Hackers can easily scrape data from these websites or intercept information and steal personal data.

So much of the internet runs on a business model that is hostile to user privacy. Taking back control of your data can help protect your identity, whether that means limiting the data you give to apps and websites or even just making informed decisions by reading website privacy policies.

Don’t take a lack of privacy for granted. Instead, take ownership of your privacy in whatever way you can.

More Resources


06/18/2024
'The Legend of Zelda: Echoes of Wisdom' Finally Gives Zelda Her Own Game
Princess Zelda is getting her own adventure on September 26.


more info


06/18/2024
Fisker Is Dead
Henrik Fisker's car company filed for bankruptcy late Monday, just three months after pausing production on its all-electric SUV.


more info


06/18/2024
How to Turn Your Smartphone Into a Webcam
Upgrade your Zoom meetings with that snazzy camera in your pocket.


more info


06/18/2024
20 Amazon Prime Perks You Might Not Be Using
Your membership gets you more than free two-day shipping. Here’s what you may be missing ahead of Amazon Prime Day 2024.


more info


06/18/2024
My Favorite Affordable Sheets Are Discounted Right Now
Quince makes some of our favorite cheap-yet-fantastic sheets to sleep on. They’re already a great price—and now they’re on sale.


more info


06/18/2024
Airbnb's Olympics Push Could Help it Win Over Paris
Paris officials have placed tough new restrictions on Airbnb rentals in recent years. The company is using the Olympics to try and win over locals and broaden its footprint in the iconic city.


more info


06/18/2024
ISIS Created Fake CNN and Al Jazeera Broadcasts
One video focused on giving ISIS credit for a terror attack that Russian disinformation blamed on Ukraine. “It was essentially fake news to debunk fake news,” says an expert.


more info


06/18/2024
I Am Laura Kipnis-Bot, and I Will Make Reading Sexy and Tragic Again
Margaret Atwood, Marlon James, Lena Dunham, Roxane Gay: We’ve all agreed to be turned into AI reading companions by a mysterious company called Rebind. I report from the inside.


more info


06/18/2024
Crypto Scammers Are Targeting Trump’s MAGA Supporters
After Donald Trump’s campaign announced it would accept cryptocurrency, the operators of a host of fraudulent websites have sought to hustle his supporters.


more info


06/18/2024
Instead of Mining the Deep Sea, Maybe People Should Just Fix Stuff
A new report contends that deep sea mining is not only an environmental risk, it’s also not going to help meet the world’s renewable energy needs.


more info


06/17/2024
Medievalist Professor Answers Medieval Questions From Twitter
Professor of English and Medieval Literature Dr. Dorsey Armstrong answers your questions about the Middle Ages from Twitter. Why is it called the "Middle" Ages? What activities did people do for fun? How were animals tried in court for crimes? Answers to these questions and many more await—it's Medieval Support.Director: Lisandro Perez-ReyDirector of Photography: Constantine EconomidesEditor: Alex MechanikExpert: Dr. Dorsey ArmstrongLine Producer: Joseph BuscemiAssociate Producer: Paul Gulyas; Brandon WhiteProduction Manager: Peter BrunetteCasting Producer: Nicholas SawyerCamera Operator: Christopher EustacheSound Mixer: Sean PaulsenProduction Assistant: Kelsey BarnhartPost Production Supervisor: Christian OlguinPost Production Coordinator: Ian BryantSupervising Editor: Doug LarsenAssistant Editor: Andy Morell


more info


06/17/2024
Alex Jones Is Now Trying to Divert Money to His Father's Supplements Business
Conspiracist Alex Jones has responded to his bankruptcy proceedings by urging viewers to spend money with his father's company—which isn't answerable to the Sandy Hook families.


more info


06/17/2024
The 19 Best Portable Chargers for All of Your Devices
Keep your phone, tablet, laptop, and other electronics running with these handheld power banks.


more info


06/17/2024
Orkut’s Founder Is Still Dreaming of a Social Media Utopia
In the mid-2000s, Google engineer Orkut Büyükkökten’s self-titled social network briefly took the world by storm before disappearing. Now he’s back, with a plan for a happier social media.


more info


06/17/2024
The Best Place Online Is a Race in the Middle of Denver’s Airport
You can compete against anyone on Strava, anytime, anywhere—even in an international airport at 2 am. Which is better than doomscrolling.


more info


06/17/2024
OpenAI-Backed Nonprofits Have Gone Back on Their Transparency Pledges
Two organizations that handed out unconditional cash grants told WIRED that they will no longer disclose their financial statements and internal policies. Their stance follows a similar denial by OpenAI.


more info


06/17/2024
Banks Are Finally Realizing What Climate Change Will Do to Housing
Extreme weather threatens the investment value of many properties, but financing for climate mitigation efforts are only just getting going.


more info


06/17/2024
AI Is Coming for Big Tech Jobs—but Not in the Way You Think
Companies aren’t replacing workers with AI yet. But they are sacrificing thousands of jobs in the race to further innovation in the technology.


more info


06/17/2024
Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake
A ShinyHunters hacker tells WIRED that they gained access to Ticketmaster’s Snowflake cloud account—and others—by first breaching a third-party contractor.


more info


06/17/2024
Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers
CCTV cameras and AI are being combined to monitor crowds, detect bike thefts, and spot trespassers.


more info


06/16/2024
The 16 Best Electric Bikes for Every Kind of Ride
We tested the best electric bikes in every category—commuting, mountain biking, foldable, cruisers, and more.


more info


06/16/2024
Analog Photography: The Beginner’s Guide to Film Cameras
Which film camera should you get? Which films are the best? We demystify the world of analog photography to help you get started.


more info


06/16/2024
Our Favorite Pillows for a Restful Night’s Sleep
We spent months sleeping on various pillows to find the right support for your noggin whether you snooze on your side, back, or in a tangle of blankets.


more info


06/16/2024
Sorry, VR: The Meta Ray-Ban Wayfarers Are the Best Face Computer
Finally! An AI-enabled face computer that's comfortable, useful, attractive, and not completely humiliating to wear.


more info


06/16/2024
How to Spot a Business Email Compromise Scam
In this common email scam, a criminal pretending to be your boss or coworker emails you asking for a favor involving money. Here's what do to when a bad actor lands in your inbox.


more info



More Personal Technology Information:

Related Articles


Advantages and Guidelines of Automated Testing
"Automated Testing" is automating the manual testing process currently in use. This requires that a formalized "manual testing process", currently exists in the company or organization.
Occupational Therapy and PDAs
Occupational Therapy Made EasierMedical downloads for the pda have improved the life of both patients and doctors of all kinds. These freeware software downloads make many types of medical conditions much easier to manage.
Compare MP3 Players for the Coolest Features and Sweetest Deals
How can you compare mp3 players to be sure you're getting the best features and price? You've checked some mp3 player ratings, and they're helpful. But iPod reviews and ratings don't answer all your questions.
FTP - File Transfer Protocol Explained
File Transfer Protocol (FTP) is a protocol that is part of the TCP/IP suite. It is the standard for transferring large amounts of data from server to server and from servers to clients.
Compile .BAT Files into Native Windows Applications (.EXE)
Since the DOS days, batch files have been one of the most convenient and immediate ways to accomplish certain tasks. Even today it's possible to find some remarkably sophisticated utilities written as command-line batch files.
Some Thoughts on Choosing a Flash MP3 Player
Flash mp3 players come with an exciting array of features, and can be used for more than playing music while you cycle at the gym. Here are some things to think about when purchasing a flash mp3 player, which might make the difference between your choice becoming an indispensable tool, or just another gadget.
Deleting and Destroying Data Forever
Peoples' private information needs to stay private, even after it has been erased. Wait a minute, after it's been erased?Have you ever given away an old computer or diskette, deleting the files off it, or giving it a quick format to make sure your information is gone? That might not be enough to stop some one from easily recovering the information!When you delete a file, normally the operating system and file system say, "ok the file is gone!" but at the physical level the information is still there.
Refurbished Computers on the Internet
What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers.
10 Easy Steps to Speed Up Your Computer - Without Upgrading
1. Empty the Temp directory regularly.
SmartCar Memory Stick for LapTop Transfer Data
With the new technology used to transfer information to from your digital camera to your laptop or PC using memory sticks which hold significant amounts of data it appears such technology will be perfect for net-centric cars. Where all the data is stored in a black box situation as many cars now have these features already.
404 Error Pages: What Are They And How Do You Create One?
We've all seen them, you've been browsing a website and you click a link and nothing loads apart from the words '404 Error' along with the usual stuff.So what is a 404 Error page? The 404 Error page, basically informs the user that the server cannot find the file they are looking for.
Cisco Certification: Taking Your First Certification Exam
Youve studied hard; youve practiced your configurations; youve used your flash cards over and over again; and finally, the big day is here. Your first certification exam!For many Cisco certification candidates, their first exam is the CCNA Composite exam or one of the two exams that make up the CCNA, the Introduction To Networking exam or the ICND (Interconnecting Cisco Networking Devices) exam.
How Does a Palm Pilot Work?
Just The Facts, Ma'mPalm pilots are all the rage now. Everyone has a pda or wants to get one in the near future.
How to Protect your PC from Spyware in the Cyber Age
Wouldn't you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes? Even worse..
Portable DVD Players - Things To Know
In my humble opinion nothing makes a long trip easier (especially if you have kids). A portable DVD player is the ideal solution for those long plane rides or endless drives in a car to keep everyone entertained, especially when you have new hit DVD to play.
The Newbies Guide to Personal Computer Maintenance
When you turn on your computer, does it act like it needs a coffee to wake up? When you surf around the Internet, are you bombarded with pop-up windows? Does your computer freeze up or turn off for no apparent reason?Before you decide to throw your monitor out of the nearest window, there may be a number of solutions to fix these problems that won't require you having a degree in computer technology.There are two primary ways to maintain your computer's performance, and the maintenance should be done once a week or more.
How I Started Working With 3D Modeling Programs
So I'll start from the very beginning.One day I was surfing in the web and I found one site -- www.
Healthy Webmasters Choose Ergonomic Computer Products
Webmasters usually sit at their computers much longer in a day than most other office workers, sometimes up to 10 and 12 hours. This can bring about the potential for physical discomforts that are attributed to prolonged use and the repetitive tasks that they perform on computers every day.
Get Ahead When You Build Your Own Computer
If you've been kicking around the idea of building your own computer, it actually isn't a bad idea. It's easier than you might think, and you can probably come out with a system that gives you more kick for your money, than you'd see in retail, or those made-to-order places.
HTML Explained: Part 1
Want to save money while promoting your web-based business? Of course you do. Here's some advice on the matter, from a freelance copywriter who knows: it pays to learn the basics of HTML.