{"id":1230,"date":"2019-12-19T16:31:08","date_gmt":"2019-12-19T21:31:08","guid":{"rendered":"https:\/\/www.thexyz.com\/blog\/?p=1230"},"modified":"2023-10-06T16:56:41","modified_gmt":"2023-10-06T20:56:41","slug":"5-tips-to-stay-safe-online","status":"publish","type":"post","link":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/","title":{"rendered":"5 tips to stay safe online"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.21.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>It is a common misconception that to be secure online, expensive software and systems are required or people ask &#8220;why would I be a target, I have nothing to hide.&#8221;<\/p>\n<p>It is not expensive to vastly increase your online security whether for yourself, your family, or your organization. It is basically a matter of policy.<\/p>\n<p>And even if you have nothing to hide and no need to worry about security, try talking to some folks that have had their identity stolen. Learn what is like to spend years rebuilding a life that has been compromised, flagged, and blocked from getting credit, loans, or even a flight abroad.<\/p>\n<p>What is involved in creating a policy to stay safe online and implementing it?<\/p>\n<ol>\n<li><a href=\"#passwords\">Passwords<\/a><\/li>\n<li><a href=\"#two-factor-authentication\">Two-Factor Authentication<\/a><\/li>\n<li><a href=\"#virtual-private-network\">Virtual Private Network<\/a><\/li>\n<li><a href=\"#paid-anti-virus\">Paid Anti-Virus<\/a><\/li>\n<li><a href=\"#email-aliases\">Email Aliases<\/a><\/li>\n<\/ol>\n<p>After spending a few minutes reading through this list, it can take anywhere from a full day for an individual or weeks for an organization to break bad habits and implement a policy that focuses on security and privacy. I think everyone that uses the internet should do this, as well as increasing your online security and privacy, it will also save you time. By implementing a policy like this it will save you time, you will have more time so I am essentially saving your life. Now read my tips and then you can start to think about how to add it to your life, improve your online security, and save yourself time.<\/p>\n<p>If you are doubting how much time this will save you think about how long you spend tapping a password into a login box, maybe you need to do it several times. After several attempts perhaps you give in an go through the account recovery process. This is because you are doing passwords wrong.<\/p>\n<h2 id=\"passwords\">Passwords<\/h2>\n<p>Even though we are almost into 2020, many people are still not doing passwords right. And that is with a password manager, which is software that is used to remember all your passwords. The fact is, human brains cannot remember strong passwords, random characters, and numbers that are long and unique. Writing them down is not a secure option, also time-consuming, having the same password is too risky, just check <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Troy Hunts tool<\/a> to find your overused password publicly available on a dark web paste or breach.<\/p>\n<p>The passwords you use should follow these rules:<\/p>\n<ul class=\"\">\n<li>They should contain a mix of uppercase, lowercase, special characters, and numbers<\/li>\n<li>They should be long ideally over 30 characters if allowed*<\/li>\n<li>They should be unique<\/li>\n<li>They should not contain any words<\/li>\n<li>You should not be able to remember it<\/li>\n<\/ul>\n<p>The only way you are going to get by using a password like without going crazy is by using a password manager. Some object saying, what good is it putting all my private passwords in one place, I understand the objection although these password managers are designed to do one thing, and that keeps your passwords safe.<\/p>\n<p>Using a unique password for every service may seem crazy to some. It&#8217;s not and soon it will almost be a requirement. Thanks to the excellent work by leading cybersecurity expert, Troy Hunt. There is now an API available that allows websites to inform users if a password has previously been exposed to a data breach. This then forces the user to use a unique password. But what about a unique email address? Most people cannot keep track of their unique passwords. They cannot be blamed for this as very few human beings are capable of remembering both secure and unique passwords. Our brains are simply not designed to do this. The solution here is simple, a Password Manager. \u00a0 While the idea of using a Password Manager may not instill confidence in people that already have a hard time remembering passwords. This is a common misconception. The password manager will allow you to only have remembered one password. No more remembering multiple weak passwords of past pets or street names. Your old phone number that has existed for the last 6 years on the dark Web, no longer has to be your password. With a Password Manager at your service, you no longer do you have to be scared of those 16 digits passwords, or longer.<\/p>\n<p>Another thing I see which is a terrible security practice is saving passwords to browsers. This is far more insecure, especially when using a browser like Chrome, run by a company that openly shares <a href=\"https:\/\/www.wsj.com\/articles\/techs-dirty-secret-the-app-developers-sifting-through-your-gmail-1530544442\" target=\"_blank\" rel=\"noopener noreferrer\">sensitive information with various third parties<\/a>.<\/p>\n<p>Setting up a password manager may take you a full day (if you have a lot of passwords), resetting passwords and automatically saving them to the manager. But the time to be gained is far greater, for example, now that I use a password manager, I never have to spend my time waiting for a password reset email to arrive or tapping every password I may have used into a login box. I now the password manager to automatically log me in. I have also put together a transparent and trusted list of <a href=\"https:\/\/www.thexyz.com\/blog\/which-password-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\">recommended password managers<\/a>. Here at Thexyz I often recommend <a href=\"http:\/\/xyz.am\/dashlane\" target=\"_blank\" rel=\"noopener noreferrer\">Dashlane<\/a> and offer a 6 of free service through our <a href=\"https:\/\/www.thexyz.com\/offers\" target=\"_blank\" rel=\"noopener noreferrer\">special offers page<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p>The University in Gie\u00dfen, Germany had a security incident that required resetting the passwords of 38000 students. Students are lining up to get their new passwords on paper, after identity verification. More about the incident on the bottom of this page: <a href=\"https:\/\/t.co\/uMBOi2MpJr\">https:\/\/t.co\/uMBOi2MpJr<\/a> <a href=\"https:\/\/t.co\/QEKcPMZ2Sk\">pic.twitter.com\/QEKcPMZ2Sk<\/a> \u2014 svbl (@svblxyz) <a href=\"https:\/\/twitter.com\/svblxyz\/status\/1206948966442708992?ref_src=twsrc%5Etfw\">December 17, 2019<\/a><\/p>\n<\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h2 id=\"two-factor-authentication\">Two-Factor Authentication<\/h2>\n<p>Although <a href=\"https:\/\/twofactorauth.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">many services support Two-Factor Authentication<\/a> it is used by less than 28% of people who use the Internet. In early 2020 we are starting to see many services require 2FA. Those left unsure about what 2FA is, may soon find themselves locked out of using many services on the internet, or forced to enable 2FA.<\/p>\n<p>What is 2FA and how to enable it? Authy have also written a great intro into 2FA <a href=\"https:\/\/authy.com\/what-is-2fa\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/ds_TANz4n3U\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>I am not going to go into too much detail about what two-factor authentication is or why should you enable it, you can read that <a href=\"https:\/\/authy.com\/what-is-2fa\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. The short answer is this should be enabled and if you are not already using 2FA, you really should. It often increases the security of login by around 1000%. To enable 2FA you will need a 2FA app, I recommend Authy although Google and Microsoft both have second-factor authentication apps.<\/p>\n<p>I like Authy because it can be installed on both your desktop and mobile device. Using Authy over a service like Google also prevents the sharing of your private data with a company that has a poor track record when it comes to protecting people&#8217;s privacy.Two-factor authentication has been available for several years, it is rarely however required and instead offered as an optional feature. This policy has led to a low adoption rate of 2FA. I believe many services see less than 10% adoption rate unless 2FA is made mandatory.<\/p>\n<p>In the coming years, we expect to see more services adopt a stricter 2FA policy and as services begin to roll out mandatory second-factor authentication, people risk being locked out of online services if they fail to embrace a 2FA solution.<\/p>\n<p>To get started with 2FA, download Authy on your Android, iPhone, Mac or Windows device.<\/p>\n<p>You can then start enabling 2FA on your logins, it is a great time to do this when you are already setting up your password manager.<\/p>\n<h2 id=\"virtual-private-network\">Virtual Private Network<\/h2>\n<p>As many as one-quarter of internet users around the world use VPNs, according to a survey from <a href=\"https:\/\/www.vpnmentor.com\/blog\/vpn-use-data-privacy-stats\/\" target=\"_blank\" rel=\"noopener noreferrer\">Global Web Index<\/a>. With content becoming restricted based on your location, extensive data tracking from service providers, and other privacy concerns. It is becoming increasingly important to use a Virtual Private Network (VPN) when connecting to the internet.<\/p>\n<p>This is also worth enabling when using the internet in a shared location, like a coffee shop or airport.<br \/>With a <a href=\"https:\/\/www.thexyz.com\/vpn\">VPN<\/a>, it&#8217;s true your ISP may no longer have access to your browsing data, but the VPN provider now does. Some VPNs even\u00a0<a href=\"https:\/\/mashable.com\/2017\/03\/31\/vpn-isp-no-more-privacy-for-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">sell that data<\/a> to third parties, just like your ISP may or may not do, so in that way, you could be right back where you started. That&#8217;s why you should be especially cautious of &#8220;free&#8221; VPNs. Those services still have to make money, and chances are your data is the primary revenue source.<\/p>\n<h2 id=\"paid-anti-virus\">Paid Anti-Virus<\/h2>\n<p>Many people rely on free Anti-Virus or protection that comes pre-installed on a computer or device. This is simply not enough for the current, ever-growing threat landscape that in 2020 we can expect to get even weirder and more sophisticated. People that pay for anti-virus get a better list of virus definitions that is updated sometimes weeks faster than on free anti-virus.<\/p>\n<p>Often thought of like email, why pay for something that you can get for free? Just like free email services, free anti-virus may include adware that allows the vendor to distribute the software without cost. This software can re-write configuration files on a device and leave a user vulnerable to viruses. It was also recently discovered that <a href=\"https:\/\/www.av-comparatives.org\/tests\/android-test-2019-250-apps\/\" target=\"_blank\" rel=\"noopener noreferrer\">many anti-virus apps in Google Play<\/a>, actually do not provide any protection. When it comes to selecting an Anti-Virus vendor, you have to be able to trust the service. On servers, computers, and mobile devices I set up for people, I always recommend ESET. I don&#8217;t just recommend it because of a partner relationship, they are actually really quick and the first vendor to discover and patch some serious security vulnerabilities.<\/p>\n<h2 id=\"email-aliases\">Email Aliases<\/h2>\n<p>Your main email address is often used to log in to various services. When a breach happens, hackers can attempt to log in to the email account first to lock the user out and gain access to other online services. If your username or email ID is not an actual email account, then this solves this problem as a hacker cannot guess what the real email is if they only know the alias.<\/p>\n<p>Using aliases also helps with spam and bacn, no, not that bacon, all those unwanted newsletters filling your inbox. Also, if for example your alias email ID is involved in a breach or suddenly starts getting a lot of spam, then you can simply shut the email alias down and change it to something else.<\/p>\n<p>Another way aliases can be useful is when you need to receive an email from someone or somewhere but are hesitant to give your email address. If you give out a more disposable email alias instead, you get the email and can then later be easily terminated.<\/p>\n<p><a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/82\/How-to-create-an-email-alias.html\" target=\"_blank\" rel=\"noopener noreferrer\">Email aliases are easy to <\/a>set up and a great way to protect your real email address. With almost 10 billion pwned accounts in the Have I Been Pwned database at the time of writing this, it is easy to see why using an alias is a good idea.<\/p>\n<h4 id=\"x_response_container_BBPPID\" dir=\"auto\">Spread the word<\/h4>\n<p>People are often overwhelmed when it comes to protecting themselves online. Online security doesn&#8217;t have to be hard. A common objection I often hear is the &#8220;I have nothing the hide&#8221; stance. This is when I introduce <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Troy Hunts: Have I been Pwned tool<\/a>, which lists every email address and password exposed in a data breach. If you haven&#8217;t already, check it out. You can feel safe entering your email and password into the tool as it doesn&#8217;t save them. It might also provide the needed motivation to complete steps 1 through 5 and take control of your online security.<\/p>\n<p>To further increase your online privacy, you may want to check our post on <a href=\"https:\/\/www.thexyz.com\/blog\/which-web-browser-best-respects-my-privacy\/\"><strong>which browser best protects your privacy<\/strong><\/a>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>It is a common misconception that to be secure online, expensive software and systems are required or people ask &#8220;why would I be a target, I have nothing to hide.&#8221; It is not expensive to vastly increase your online security whether for yourself, your family, or your organization. It is basically a matter of policy. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1233,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<div id=\"x_response_container_BBPPID\" dir=\"auto\">It is a common misconception that to be secure online, expensive software and systems are required or people ask \"why would I be a target, I have nothing to hide.\"<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">It is not expensive to vastly increase your online security whether for yourself, your family or your organization. It is basically a matter of policy.<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">And even if you have nothing to hide and no need to worry about security, try talking to some folks that have had their identity stolen. Learn what is like to spend years rebuilding a life that has been compromised, flagged and blocked from getting credit, loans or even a flight abroad.<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">What is involved in creating a policy to stay safe online and implementing it?<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div dir=\"auto\">1. Passwords<\/div>\r\n<div dir=\"auto\">2. Two-Factor Authentication<\/div>\r\n<div dir=\"auto\">3. Virtual Private Network<\/div>\r\n<div dir=\"auto\">4. Paid Anti-Virus<\/div>\r\n<div dir=\"auto\">5. Email Aliases<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">After spending a few minutes to read through this list, it can take anywhere from a full day for an individual or weeks for an organization to break bad habits and implement a policy that focuses on security and privacy. I think everyone that uses the internet should do this, as well as increasing your online security and privacy, it will also save you time. By implementing a policy like this it will save you time, you will have more time so I am essentially saving you life. Now read my tips and then you can start to think about how to add it to you life, improve your online security and save yourself time.<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">If you are doubting how much time this will save you think about how long you spend tapping a password into a login box, may be you need to do it several times. After several attempts perhaps you give in an go through the account recovery process. This is because you are doing passwords wrong.<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<h2 id=\"x_response_container_BBPPID\" dir=\"auto\">1. Passwords<\/h2>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">Even though we are almost into 2020, many people are still not doing passwords right. And that is with a password manager, which is software that is used to remember all your passwords. The fact is, human brains cannot remember strong passwords, random characters and numbers that are long and unique. Writing them down is not a secure option, also time consuming, having the same password is too risky, just check <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Troy Hunts tool<\/a> to find your overused password publicly available on a dark web paste or breach.<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">Your passwords you use should follow these rules:<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">\r\n<ul class=\"\">\r\n \t<li>They should contain a mix of uppercase, lowercase, special characters and numbers<\/li>\r\n \t<li>They should be long ideally over 30 characters if allowed*<\/li>\r\n \t<li>They should be unique<\/li>\r\n \t<li>They should not contain any words<\/li>\r\n \t<li>You should not be able remember it<\/li>\r\n \t<li><\/li>\r\n<\/ul>\r\n<blockquote class=\"twitter-tweet\">\r\n<p dir=\"ltr\" lang=\"en\">Password managers don't need to be perfect, they just need to be better than *not* using them which they unequivocally still are <a href=\"https:\/\/t.co\/nVG5G6RAWx\">https:\/\/t.co\/nVG5G6RAWx<\/a><\/p>\r\n\u2014 Troy Hunt (@troyhunt) <a href=\"https:\/\/twitter.com\/troyhunt\/status\/848065067669086208?ref_src=twsrc%5Etfw\">April 1, 2017<\/a><\/blockquote>\r\n<script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\r\n<div>The only way you are going to get by using a password like without going crazy, is by using a password manager. Some object saying, what good is it putting all my private passwords in one place, I understand the objection although these passwords managers are designed to do one thing, and that is keep your passwords safe.<\/div>\r\n<\/div>\r\n<div><\/div>\r\n<div><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">\r\n<div>Another thing I see which is a terrible security practice is saving passwords to browsers. This is far more insecure, especially when using a browser like Chrome, run by a company that openly shares <a href=\"https:\/\/www.wsj.com\/articles\/techs-dirty-secret-the-app-developers-sifting-through-your-gmail-1530544442\" target=\"_blank\" rel=\"noopener noreferrer\">sensitive information with various third parties<\/a>.<\/div>\r\n<\/div>\r\n<div><\/div>\r\n<div><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">\r\n<div>Setting up a password manager may take you a full day (if you have a lot of passwords), resetting passwords and automatically saving them to the manager. But the time to be gained is far greater, for example, now that I use a password manager, I never have to spend my time waiting for a password reset email to arrive or tapping every password I may have used into a login box. I now the password manager to automatically log me in. Dan Arel from Think Privacy has put together a transparent and trusted list of <a href=\"https:\/\/www.thinkprivacy.io\/password\" target=\"_blank\" rel=\"noopener noreferrer\">recommended password managers<\/a>. Here at Thexyz I often recommend <a href=\"http:\/\/xyz.am\/dashlane\" target=\"_blank\" rel=\"noopener noreferrer\">Dashlane<\/a> and offer a 6 of free service through our <a href=\"https:\/\/www.thexyz.com\/offers.php\" target=\"_blank\" rel=\"noopener noreferrer\">special offers page<\/a>.<\/div>\r\n<div><\/div>\r\n<\/div>\r\n<blockquote class=\"twitter-tweet\">\r\n<p dir=\"ltr\" lang=\"en\">The University in Gie\u00dfen, Germany had a security incident that required resetting the passwords of 38000 students. Students are lining up to get their new passwords on paper, after identity verification. More about the incident on the bottom of this page: <a href=\"https:\/\/t.co\/uMBOi2MpJr\">https:\/\/t.co\/uMBOi2MpJr<\/a> <a href=\"https:\/\/t.co\/QEKcPMZ2Sk\">pic.twitter.com\/QEKcPMZ2Sk<\/a><\/p>\r\n\u2014 svbl (@svblxyz) <a href=\"https:\/\/twitter.com\/svblxyz\/status\/1206948966442708992?ref_src=twsrc%5Etfw\">December 17, 2019<\/a><\/blockquote>\r\n<script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\r\n<h2><\/h2>\r\n<h2>2. Two-Factor Authentication<\/h2>\r\n<div>Although <a href=\"https:\/\/twofactorauth.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">many services support Two-Factor Authentication<\/a> it is used by less than 28% of people who use the Internet. In early 2020 we are starting to see many services require 2FA. Those left unsure about what 2FA is, may soon find themselves locked out of using many services on the internet, or forced to enable 2FA.<\/div>\r\n<div><\/div>\r\n<div><\/div>\r\n<div>What is 2FA and how to enable it? Authy have also written a great intro into 2FA <a href=\"https:\/\/authy.com\/what-is-2fa\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/div>\r\n<iframe src=\"https:\/\/www.youtube-nocookie.com\/embed\/ds_TANz4n3U\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\r\n<div><\/div>\r\n<div>I am not going to go into too much detail about what two-factor authentication is or why should you enable it, you can read that <a href=\"https:\/\/authy.com\/what-is-2fa\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. The short answer is this should be enabled and if you are not already using 2FA, you really should. It often increases the security of a login by around a 1000%. To enable 2FA you will need a 2FA app, I recommend Authy although Google and Microsoft both have secondary factor authentication apps.<\/div>\r\n<div><\/div>\r\n<div><\/div>\r\n<div>I like Authy because it can be installed on both your desktop and mobile device. Using Authy over a service like Google also prevents sharing of your private data with a company that has a poor track record when it comes to protecting people's privacy.<\/div>\r\nTwo factor authentication has been available for several years, it is rarely however required and instead offered as an optional feature. This policy has lead to a low adoption rate of 2FA. I believe many services see less than 10% adoption rate unless 2FA is made mandatory.\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">In the coming years, we expect to see more services adopt a stricter 2FA policy and as services begin to roll-out mandatory second factor authentication, people risk being locked out of online services if they fail to embrace a 2FA solution.<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">To get started with 2FA, download Authy on your Android, iPhone, Mac or Windows device.<\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">You can then start enabling 2FA on your logins, it is a great time to do this when you are already setting up your password manager.<\/div>\r\n<h2 dir=\"auto\"><\/h2>\r\n<h2 id=\"x_response_container_BBPPID\" dir=\"auto\">3. Virtual Private Network<\/h2>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">As many as one quarter of internet users around the world use VPNs, according to a survey from <a href=\"https:\/\/www.vpnmentor.com\/blog\/vpn-use-data-privacy-stats\/\" target=\"_blank\" rel=\"noopener noreferrer\">Global Web Index<\/a>. With content becoming restricted based on your location, extensive data tracking from service providers and other privacy concerns. It is becoming increasingly important to use a Virtual Private Network (VPN) when connecting to the internet.<\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">This is also worth enabling when using internet a shared location, like a coffee shop or airport.<\/div>\r\n<div dir=\"auto\">With a VPN, it's true your ISP may no longer have access to your browsing data, but the VPN provider now does. Some VPNs even\u00a0<a href=\"https:\/\/mashable.com\/2017\/03\/31\/vpn-isp-no-more-privacy-for-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">sell that data<\/a>\u00a0to third parties, just like your ISP may or may not do, so in that way you could be right back where you started. That's why you should be especially cautious of \"free\" VPNs. Those services still have to make money, and chances are your data is the primary revenue source.<\/div>\r\n<h2 dir=\"auto\"><\/h2>\r\n<h2 id=\"x_response_container_BBPPID\" dir=\"auto\">4. Paid Anti-Virus<\/h2>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">Many people rely on free Anti-Virus or protection that comes pre-installed on a computer or device. This is simply not enough for the current, ever growing threat landscape that in 2020 we can expect to get even weirder and more sophisticated. People that pay for anti-virus get a better list of virus definitions that is updated sometimes weeks faster than on free anti-virus.<\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\"><\/div>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">Often thought of like email, why pay for something that you can get for free? Just like free email services, free anti-virus may include adware that allows the vendor to distribute the software without cost. This software can re-write configuration files on a device and leave a user vulnerable to viruses. It was also recently discovered that <a href=\"https:\/\/www.av-comparatives.org\/tests\/android-test-2019-250-apps\/\" target=\"_blank\" rel=\"noopener noreferrer\">many anti-virus apps in Google Play<\/a>, actually do not provide any protection. When it comes to selecting an Anti-Virus vendor, you have to be able to trust the service. On servers, and computers and mobile devices I setup for people, I always recommend ESET. I don't just recommend because of a partner relationship, they are actually really quick and the first vendor to discover and patch some serious security vulnerabilities.<\/div>\r\n<h2 dir=\"auto\"><\/h2>\r\n<h2 dir=\"auto\">5. Email Aliases<\/h2>\r\n<div dir=\"auto\"><a href=\"https:\/\/www.thexyz.com\/account\/knowledgebase\/82\/How-to-create-an-email-alias.html\" target=\"_blank\" rel=\"noopener noreferrer\">Email aliases are easy to setup<\/a> and a great way to protect your real email address. With almost 10 billion pwned accounts in the Have I been Pwned database at the time of writing this, it is easy to see why using an alias is a good idea.<\/div>\r\n<div dir=\"auto\"><\/div>\r\n<h4 id=\"x_response_container_BBPPID\" dir=\"auto\">Spread the word<\/h4>\r\n<div dir=\"auto\"><\/div>\r\n<div id=\"x_response_container_BBPPID\" dir=\"auto\">People are often overwhelmed when it comes to protecting themselves online. Online security doesn't have to be hard. A common objection I often hear is the \"I have nothing the hide\" stance. This is when I introduce <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Troy Hunts: Have I been Pwned tool<\/a>, which lists every email address and password exposed in a data breach. If you haven't already, check it out. You can feel safe entering your email and password into the tool as it doesn't save them. It might also provide the needed motivation to complete steps 1 through 5 and take control of your online security.<\/div>","_et_gb_content_width":"","footnotes":""},"categories":[1,7],"tags":[],"class_list":["post-1230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","category-privacy","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 tips to stay safe online - Thexyz Blog<\/title>\n<meta name=\"description\" content=\"To stay safe and secure online, it is all about following best practices and forming good habits. Following these 5 tips will help you with online security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Follow these 5 tips to stay safe online\" \/>\n<meta property=\"og:description\" content=\"To stay safe and secure online, it is all about following best practices and forming good habits. Following these 5 tips will help you with online security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/\" \/>\n<meta property=\"og:site_name\" content=\"Thexyz Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-19T21:31:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-06T20:56:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"314\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Perry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Follow these 5 tips to stay safe online\" \/>\n<meta name=\"twitter:description\" content=\"To stay safe and secure online, it is all about following best practices and forming good habits. Following these 5 tips will help you with online security.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Perry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/\"},\"author\":{\"name\":\"Perry\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\"},\"headline\":\"5 tips to stay safe online\",\"datePublished\":\"2019-12-19T21:31:08+00:00\",\"dateModified\":\"2023-10-06T20:56:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/\"},\"wordCount\":2025,\"image\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png\",\"articleSection\":[\"How To\",\"Privacy\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/\",\"url\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/\",\"name\":\"5 tips to stay safe online - Thexyz Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png\",\"datePublished\":\"2019-12-19T21:31:08+00:00\",\"dateModified\":\"2023-10-06T20:56:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\"},\"description\":\"To stay safe and secure online, it is all about following best practices and forming good habits. Following these 5 tips will help you with online security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#primaryimage\",\"url\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png\",\"contentUrl\":\"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png\",\"width\":600,\"height\":314,\"caption\":\"Tips for staying safe online\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.thexyz.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 tips to stay safe online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#website\",\"url\":\"https:\/\/www.thexyz.com\/blog\/\",\"name\":\"Thexyz Blog\",\"description\":\"Email and Domains\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.thexyz.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223\",\"name\":\"Perry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g\",\"caption\":\"Perry\"},\"description\":\"Perry is founder and a developer of Thexyz. I write code to fight for our human right to privacy. I am keen to create a cloud service which is so easy to use, respects user privacy and follows best security practices. We really deserve better.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ptoone\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 tips to stay safe online - Thexyz Blog","description":"To stay safe and secure online, it is all about following best practices and forming good habits. Following these 5 tips will help you with online security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/","og_locale":"en_US","og_type":"article","og_title":"Follow these 5 tips to stay safe online","og_description":"To stay safe and secure online, it is all about following best practices and forming good habits. Following these 5 tips will help you with online security.","og_url":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/","og_site_name":"Thexyz Blog","article_published_time":"2019-12-19T21:31:08+00:00","article_modified_time":"2023-10-06T20:56:41+00:00","og_image":[{"width":600,"height":314,"url":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png","type":"image\/png"}],"author":"Perry","twitter_card":"summary_large_image","twitter_title":"Follow these 5 tips to stay safe online","twitter_description":"To stay safe and secure online, it is all about following best practices and forming good habits. Following these 5 tips will help you with online security.","twitter_image":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png","twitter_misc":{"Written by":"Perry","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#article","isPartOf":{"@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/"},"author":{"name":"Perry","@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223"},"headline":"5 tips to stay safe online","datePublished":"2019-12-19T21:31:08+00:00","dateModified":"2023-10-06T20:56:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/"},"wordCount":2025,"image":{"@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png","articleSection":["How To","Privacy"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/","url":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/","name":"5 tips to stay safe online - Thexyz Blog","isPartOf":{"@id":"https:\/\/www.thexyz.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#primaryimage"},"image":{"@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png","datePublished":"2019-12-19T21:31:08+00:00","dateModified":"2023-10-06T20:56:41+00:00","author":{"@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223"},"description":"To stay safe and secure online, it is all about following best practices and forming good habits. Following these 5 tips will help you with online security.","breadcrumb":{"@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#primaryimage","url":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png","contentUrl":"https:\/\/www.thexyz.com\/blog\/wp-content\/uploads\/thexyz-twitter-card-stay-safe.png","width":600,"height":314,"caption":"Tips for staying safe online"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thexyz.com\/blog\/5-tips-to-stay-safe-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thexyz.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 tips to stay safe online"}]},{"@type":"WebSite","@id":"https:\/\/www.thexyz.com\/blog\/#website","url":"https:\/\/www.thexyz.com\/blog\/","name":"Thexyz Blog","description":"Email and Domains","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thexyz.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Person","@id":"https:\/\/www.thexyz.com\/blog\/#\/schema\/person\/e2c26bd981f75b2b1786ced1e9f2b223","name":"Perry","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6750a4725b2114d76de054f45ed548dbbe8401f36e08e35171b0c811dd77d316?s=96&d=monsterid&r=g","caption":"Perry"},"description":"Perry is founder and a developer of Thexyz. I write code to fight for our human right to privacy. I am keen to create a cloud service which is so easy to use, respects user privacy and follows best security practices. We really deserve better.","sameAs":["https:\/\/www.linkedin.com\/in\/ptoone\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/1230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/comments?post=1230"}],"version-history":[{"count":20,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/1230\/revisions"}],"predecessor-version":[{"id":2774,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/posts\/1230\/revisions\/2774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/media\/1233"}],"wp:attachment":[{"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/media?parent=1230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/categories?post=1230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thexyz.com\/blog\/wp-json\/wp\/v2\/tags?post=1230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}