6 consejos para blindar tu cuenta de email y redes sociales

The use of cell phones, computers and an internet connection have become essential for daily life. With the increased use of technology, there have been countless cases of cybercrime exploiting weak protection systems to infiltrate and steal private information from unsuspecting users.

According to data from the “Cyberpandemic 2022” report presented by BTR Consulting, 58% of people post their phone number on social networks, 30% say where they work and 20% where they go on vacation. Therefore, beyond prevention, it is necessary to know the tools available to protect your privacy and become aware of its importance for the future.

For this reason, within the framework of the International Day for the Protection of Personal Data, an initiative that was born in 1981 by the Council of Europe and the European Commission; computer security specialists recommend “shielding” email accounts, social networks and mobile applications

Only install trusted apps

There are tons of apps and software that contain malware and/or steal user information. The main thing is to use applications that are signed by official stores, such as Google Play or App Store, or download programs from official sites.

“Today we are all digital citizens and we must understand that there is no longer that separation between the online world and the ‘real’ world, proof of this is that everything we do is recorded on the pages we visit and even on our devices”, assured Roberto Martinez, Senior Security Analyst at Kaspersky.

Pay attention to emails

Many times we will receive emails from scammers who will try to pass themselves off as our bank or some other trusted company to steal information or access to our accounts. This practice is known as phishing. WhatsApp and social networks can also be vehicles used for this practice.

Enable two-factor authentication

This practice is very important for devices such as email accounts, social networks, streaming platforms and game libraries. This makes it very difficult for an attacker to steal our credentials. It is available in most of the most used technologies and is completely free.

Do not use public Wi-Fi networks

Public internet connections are access points that are often tapped by attackers. Photo: Getty Images/AFP

These “free and open” connection points -without a password or knowledge of who manages it- is another of the main ways for a third party to have access to our private data.

In fact, a cybercriminal can easily create a “public” network and spy on what people connecting to it are doing, possibly stealing sensitive information.

Update controls on computers

It is recommended to always have all the updates installed for both the operating system and the applications we use, the antivirus running, updates, security settings and recent backups of our most important information.

“New versions of systems and applications generally solve security problems, so it is very important to keep them up to date”, advised Fabian Martinez Portantier, Coordinator of the Computer Security Career at EducacionIT.

Do not open suspicious emails

The Gmail inbox can receive emails with fraudulent links. Photo: Oscar P. Muñoz (La Vanguardia)

We must be wary of any advertising or promotion that reaches our email inbox. This implies that our confidential data should not be provided to anyone who requests it.

The attention factor is a key point when browsing the web or using apps. It will help us prevent data theft and other attacks on the network.

Another point to consider is awareness. That is, familiarize yourself with the threats that are becoming more and more common in the computer field. All people who use computers, cell phones and tablets should be aware of the dangers to which they are exposed. From detecting a case of phishing, malicious emails.

By Editor

Leave a Reply