Website  Choices for the Perfect Safety Standards

Website  Choices for the Perfect Safety Standards

Do not open attachments or click links in messages from unknown users. The same applies to messages from known users, but whose message structure is unusual or empty.To learn more about the issues related to messages on the Internet, we recommend that you check our phishing reflex: one of the main threats to your security on the Internet. A visit to toto-ks happens to be perfect here.

Further advice: do not use an account with “administrator” rights to view your messages or browse the Internet. Indeed, if a virus wants to install on your machine, a confirmation will be at least requested. Otherwise, and if your machine is hacked, the hacker will be administrator of your machine and can therefore act as he wants on it.

  • Protecting yourself on the Internet also means being extra vigilant in your emails

Pay attention to who is transmitting their data

In both the personal and professional settings, you often have the opportunity to fill in forms to access information, promotions, or to sign up for events or websites.

When you are about to transmit even the most basic data, like your email, check who you are transmitting:

  • Check the website’s Privacy Policy (which should normally be mentioned in the form itself since the implementation of the GDPR).
  • Never send your personal data (address, telephone number, bank or credit card details, or sensitive data concerning your health for example) by email to strangers.

More specifically for companies:

If you need to protect some particularly sensitive data in your company, do not hesitate to create an internal guide of good practices for your employees. Specify in this guide that this data should not be distributed outside the company, including by email or via social networks.

Think carefully before publishing on the Internet

In the age of social networks, it can be tempting to publish elements of one’s personal life on the Internet.

However, it is important to be aware of the impact that these publications can have on your personal life. Some malicious users can take advantage of what you publish for:

Know your daily habits: there are countless, for example, the number of burglaries made through a publication on social networks that indicates that the occupant was on vacation.

Use or divert your photos: Identity theft is common on the Internet.

Regardless of the privacy setting you choose on a social network, remember that this is still information sharing. If only your “friends” can see a publication, it remains published on the web, within the reach of potential malicious users.So think carefully before publishing anything on the Internet.

Do not forget your phones and tablets

There is a tendency to separate the use of a mobile phone or tablet from that of a desktop computer. However, these devices are also connected to the Internet and contain personal data. When using an application, it will often use an internet connection to search and transmit data.

Keep in mind that your phones and tablets, as well as your connected objects (connected watch type or voice assistant) are also affected by all these tips.

With these 10 best practices in mind, you’re ready to surf the web with the utmost care. Even if these elements become reflexes for you, do not forget that you are never immune from a problem, vigilance is finally the key element to protect yourself well on the Internet.

Melissa Ramirez