Cybersecurity

6 internet habits that can compromise your cybersecurity

En collaboration avec
We need to be aware of the bad habits that we continue to maintain and that can affect our cybersecurity.

We need to be aware of the bad habits that we continue to maintain and that can affect our cybersecurity. Image: Pexels/Vlada Karpovich

Check Point
Share:
Our Impact
What's the World Economic Forum doing to accelerate action on Cybersecurity?
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:

Cybersecurity

  • The internet has become an essential part of our lives, but it also comes with risks.
  • We need to be aware of the bad habits that we continue to maintain and that can affect our digital security.
  • These include using weak passwords, clicking on links in emails from unknown senders, and not keeping our software up to date.
  • By being more careful online, we can help to protect ourselves from cybercrime.

Nowadays we cannot live without the Internet, a basic resource among the new generations. Remember looking for information in an encyclopedia or going to a travel agency to buy a plane ticket or make a hotel reservation? It seems like ages ago, but the truth is that the network of networks has changed the way we do many tasks and has opened the doors to new possibilities that allow us, for example, to work from anywhere or make a bank transfer from our phone in just one click.

Unfortunately, this relentless evolution is also present in the multiple threats posed by cybercriminals. We have moved on from viruses distributed on floppy disks and Morris, the first worm to infect the Internet in 1988, to the emergence of Trojans, spyware and ransomware, the main protagonists of today’s cybercrime scene. According to the Security Report 2023 from Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading global cyber security specialist provider, cyberattacks have increased by 38% in 2022 compared to the previous year, with an average of 1,168 attacks per week per organization and a situation that looks set to continue to worsen over the coming years.

Discover

How is the Forum tackling global cybersecurity challenges?

All of this makes it clear that we need to be prepared to face these threats, which is why Check Point Software has assembled this list of tips to remind us of the “bad habits” that we continue to maintain and that affect our digital security:

Neglecting passwords

This is one of the most common mistakes, and yet one of the practices that most affects the maintenance of proper cybersecurity. We all find it easier to recycle passwords and use the same one for work and personal emails, but we are putting important data at risk. It is also very common to share them – Netflix or Spotify passwords, for example – and oftentimes we write them down or send them in a message or email to family or close friends. This reality translates into millions of users who every year see their accounts breached because they do not take care of their passwords. To avoid this, it is advisable to create secure passwords, with at least 12 characters and a combination of uppercase and lowercase letters, numbers, and special characters. Likewise, it is always recommended to update them every few months, and not to reuse them on several different platforms or accounts.

Update, update, update

All systems and devices have regular updates designed not only to improve or correct usability, but also to apply patches for possible vulnerabilities. The message to update often appears at inconvenient times or when we do not have a Wi-Fi connection and we usually end up postponing or even ignoring its installation, unconsciously leaving an open door for cyberattacks. Just by keeping our devices up to date, we can avoid many of the vulnerabilities that can occur.

Falling prey to disinformation

While most cyberattacks today focus on data theft, there has recently been a growth in hacktivist practices and other state-related threats. This type of practice often includes the distribution of disinformation with fake news or biased and incomplete messages that prey on the emotional side of users to generate discord. For this reason, it is advisable to use several sources when informing ourselves, as well as to check any news or chain message before falling into practices such as mass dissemination. One of the main pillars of Internet security is common sense.

Have you read?

Using free wireless networks

To avoid using up your own data, it is increasingly common to surf between hot spots and free Wi-Fi networks in restaurants, airports, train or metro stations, hotels and even public or private transport. However, security researchers have demonstrated on numerous occasions that these types of wireless networks have little or no security. It is advisable not to access an unknown network, but if you must, limit your use to basic browsing, avoid entering passwords or using sensitive applications such as payment platforms or banking access.

Accepting privacy policies and permissions without reviewing them

Who ever reads the terms and conditions of data use? These lengthy and difficult to understand texts encourage most people to accept all the terms of use for any application without further ado. While this allows us to start enjoying them more quickly, it can lead to a serious security problem and even a breach of all our data. On the one hand, cybercriminals often use some popular applications or programs to spread their malicious code, while some malicious developers hide some clauses for the transfer of permissions to collect, store and even trade with this data. By taking a few minutes to review the permissions and conditions before installing a program, we can avoid falling victim to deception or exposure of our personal information.

Browsing and trusting unsafe websites

A way to identify this type of fraudulent website is to look for small errors such as typos, poorly written text or the presence of misleading or poor-quality images. However, the most effective method is undoubtedly the analysis of the URL, with security indicators such as SSL certificates (indicated by the presence of a padlock next to the web address); or alerts, such as the presence of irregular characters or subdomains.

Although the Internet is still a fairly young tool, we already have a lot of experience at our disposal to avoid becoming victims of cyber attackers. Once again, we must call for education and common sense, as education and knowledge are key to achieving a safe digital space for everyone.

More on Check Point here.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Related topics:
CybersecurityEmerging Technologies
Share:
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

Quantum computing could threaten cybersecurity measures. Here’s why – and how tech firms are responding

Simon Torkington

April 23, 2024

About Us

Events

Media

Partners & Members

  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum