Mistakes you make every day ‘online’ and that open the door to the theft of your personal data

Connect to free Wi -Fi networks, grant excessive permissions in the ‘apps’ or create weak passwords and reuse them on different platforms are some of Online mistakes that Internet users comment daily and that allow cybercounts to access their personal information.

Mobile phones and computers are electronic devices that have become essential for people’s day -to -day Search for information and access social networksbut also for carry out financial activities and communicate with friends and familyaccording to the report ‘The Digital Society 2024’, of the National Observatory of Technology and Society (ONTSI).

This extended use of electronic devices to access the Internet and the proliferation of digital services and platforms also means that Internet users They manage a lot of personal datawhich can be exposed in case of cyber attacks, but also due to daily practices that impact security.

Everyday ‘online’ errors

For example, connect to Wi -Fi networks in coffee shops, airports or shopping centers It is a way to save on the use of contracted mobile data, especially if you do not have an unlimited plan or is abroad. But this action involves “a great risk”, as the researchers from Check Point Software warm.

“When connecting to a public wifi network, cybercriminals They can intercept the connection and access personal data without the user“They explain. Therefore, they advise to use a virtual private network (VPN) to encrypt the connection and deactivate the automatic connection to Wi -Fi networks. In addition, they insist that, when you have to deal with vulnerable information, you better opt for mobile data .

Applications usually request permission to access sensitive elements of the ‘smartphone’, such as the camera, the microphone or the contact agendain order to enable their basic functions. However, there are ‘apps’ that ask for unnecessary permits, which are not fundamental for their operation.

From the security firm they explain that “this can lead to The improper use of personal data or in your sale to third parties without users being aware “, and therefore advise reviewing the permits that the application will request before installation and deactivate those that are not essential.

Another error is related to passwords. The use of a simple key or always repeat the same in different digital services “remains a usual practice”, Experts point out, who also refer their risks in suede a filtration or a security gap.

“To be safe in the face of any violation it is necessary to put several measures in motion: create unique passwords for each service, use a password manager and activate two steps (2FA) verification for greater security,” they advise.

They also underline the need for Have protection measures on the electronic device itself, as a pin key, a pattern or biometric recognition (fingerprint or face). “Without adequate security measures, anyone could access emails, social networks, bank data and personal documents,” they warn.

Check Point researchers do not forget artificial intelligence (AI), whose use through The ‘chatbots’, such as Gemini or Chatgptit helps to boost productivity, but its misuse can put sensitive data in risks.

“Some people They introduce sensitive data without considering the consequences“, they explain. This information can be stored in the ‘chatbot’ or be used in AI training, so that it can appear later in response to some consultation.

“To use them in a safe way, you have to avoid sharing confidential information in AI chats, review the privacy policies of each tool and, when using it in corporate environments, versions with higher guarantees of safety must be used,” they point out.

This is bound that cybercriminals also use AI to create more sophisticated attacks, As emails of highly personalized phishing or ‘Deepfakes’ -Manipulations of images, videos and audios- convincing.

In the case of ‘phishing’ attacks, with artificial intelligence the cybercriminals They mimic messages of banks, shipping companies or even personal contacts. They usually include a link or file to download, and click on these elements “can expose passwords, install malware or allow identity theft”, warn from Check Point.

To avoid falling into the trap, they always verify the address of the sender, not click on suspicious links and, in doubt, directly contact the company or person who has supposedly contacted.

“The tips to stay safe when navigating the Internet may seem basic and repetitive, but there are still many users who tell these errors every day without knowing the risk they run,” said Check Point Software technical director for Spain and Portugal, Eusebio Nieva, on the occasion of the Safe Internet Daywhich is celebrated this Tuesday, February 11.

By Editor