PhreeNewsPhreeNews
Notification Show More
Font ResizerAa
  • Africa
    • Business
    • Economics
    • Entertainment
    • Health
    • Politics
    • Science
    • Sports
    • Tech
    • Travel
    • Weather
  • WorldTOP
  • Emergency HeadlinesHOT
  • Politics
  • Business
  • Markets
  • Health
  • Entertainment
  • Tech
  • Style
  • Travel
  • Sports
  • Science
  • Climate
  • Weather
Reading: 12 steps you’ll be able to take proper now to be safer on-line
Share
Font ResizerAa
PhreeNewsPhreeNews
Search
  • Africa
    • Business
    • Economics
    • Entertainment
    • Health
    • Politics
    • Science
    • Sports
    • Tech
    • Travel
    • Weather
  • WorldTOP
  • Emergency HeadlinesHOT
  • Politics
  • Business
  • Markets
  • Health
  • Entertainment
  • Tech
  • Style
  • Travel
  • Sports
  • Science
  • Climate
  • Weather
Have an existing account? Sign In
Follow US
© 2026 PhreeNews. All Rights Reserved.
PhreeNews > Blog > World > Tech > 12 steps you’ll be able to take proper now to be safer on-line
13b86a10 6e4f 11f0 af79 3c5dc90e43f0.jpeg
Tech

12 steps you’ll be able to take proper now to be safer on-line

PhreeNews
Last updated: November 8, 2025 10:05 am
PhreeNews
Published: November 8, 2025
Share
SHARE

There is a basic query you’ll be able to ask of each the web and actual life: “How do I get pleasure from my time right here with out taking pointless dangers?” In grass-touching meatspace, you’ll be able to lower out processed meals, carry pepper spray and keep away from skydiving with out a companion.

However one of the best strategies for staying protected on-line aren’t as intuitive. The web is an enormous city sq. the place individuals are consistently bellowing deeply private info about themselves. It is no shock that it is turn out to be a breeding floor for scams, theft and different felony exercise.

Given the breadth of risks, it might really feel simpler to throw up your palms and say that no matter occurs will occur. I am right here to let you know, although, that cybersecurity would not must be complicated, troublesome or time-consuming. You do not have to be a hacker to foil a hacker — you solely must make the most of easy suggestions and free apps designed to make you safer on-line. Whether or not you decide to all 12 detailed right here or solely deal with one, you may be rather more safe for it.

1. Set up safety updates instantly

One of the essential issues you are able to do to make sure your digital safety is to put in all software program updates as quickly as they turn out to be obtainable in your units. Once you see the notification, do not wait — prepare your self to obtain the replace instantly.

Not all software program updates are about safety, however the ones which might be type your finest line of protection in opposition to technical hacks. When builders uncover a flaw that may be exploited, they ship an replace to repair it. By the point the flaw will get patched, chances are high very excessive that hackers additionally learn about it, so any time misplaced means you would be the subsequent to get exploited.

As you go down this listing, you may study that cybersecurity threats are much less technical than you suppose. To counter those which might be, nevertheless, there’s nothing extra essential you are able to do than set up safety updates.

2. Use robust passwords

Weak, simply guessed passwords are probably the most frequent causes of information breaches and malware assaults. If a password is likely one of the ten or so most typical, an attacker might be able to guess it with no different info. If it is related to you — your birthday, say, or mom’s maiden title — it might be guessable from info anybody can lookup on-line.

Even when your password is a random string of characters, it’d nonetheless be guessable if it is too quick. Hackers can use applications to guess all potential combos and take a look at every one on a goal account. The longer a password is, the extra exponentially troublesome it’s to guess.

SEAN GLADWELL through Getty Pictures

Which means you want passwords which might be each lengthy and meaningless to you. You may rightly complain that these are bastards to recollect, however you are in luck: password managers can do this for you. A password supervisor app or browser extension can create passwords whenever you want them, retailer them securely and fill them in routinely. All you must keep in mind is the one grasp password that unlocks all of the others.

3. Arrange two-factor authentication

Even the strongest password may get revealed by no fault of your personal, like if it is saved with out encryption and leaked in an information breach. That is why it helps to have two-factor authentication (2FA), also called multi-factor authentication (MFA), as a second safe layer on each account.

You in all probability already know 2FA because the irritating further step that makes you go get your cellphone — however that is not the one solution to do it. Many apps, together with Google and Apple, now allow you to log in by passkeys. These not solely do not require you to enter a code or password, however use uneven encryption, sharing credentials between your machine and the service that runs the passkeys. It is loads faster for you, and leaves nothing to steal.

4. Again every part up

Ransomware and its cousins are a progress trade throughout the cybercrime economic system. These assaults corrupt your information or lock you out of them till you pay a price to get them again. The best solution to foil a ransomware assault, or to clear some other type of malware off a tool, is to revive the whole system from the latest backup.

To be sure to even have a backup, consultants suggest the 3-2-1 rule: three completely different backups, on two several types of storage, with at the least one bodily distant from the primary system. For instance, you would have one backup on one other machine in your own home, one within the cloud and one on a transportable onerous drive. Computerized backup providers can save disk photos for you at set intervals so you do not have to recollect to do it your self.

5. Be taught to identify social engineering

Regardless of all of the technobabble flying across the cybersecurity world, an important many scams and hacks are completed by strategies a Nineteenth-century con artist would acknowledge. Scammers pose as consultants or authority figures to achieve your belief, and use scary language to bypass your important considering. Ticking clocks, emotional manipulation and pretend identities are all within the toolbox.

Bank fraud through phone messages.Businessman holding phone with scam message on digital screen. Fake text SMS scam.Scammers online.Cyber scam

Alex Cristi through Getty Pictures

Take phishing, wherein hackers trick you into giving up your info willingly. A typical phishing e-mail may pose as a financial institution, credit score bureau or different authoritative service. In crimson letters, it might demand your financial institution password or social safety quantity to right away repair an irregularity together with your account. Different frequent approaches embrace warning you about rushing tickets you by no means incurred or sending receipts for subscriptions you by no means purchased.

Social engineering assaults are consistently evolving, however they usually fall again on the identical methods. One of the best ways to foil them is to take a deep breath each time you obtain a daunting e-mail or textual content message, then analysis it intimately: lookup the e-mail tackle, verify the visible design to verify the sender is who they declare to be, and ask your self if there’s any method the message could possibly be true. I extremely suggest working by this phishing quiz — it is robust, however truthful, and very academic.

6. At all times verify hyperlinks earlier than clicking

This can be a companion to the earlier tip. Social engineering scams do not all the time attempt to get you to surrender info your self. Additionally they get you to click on on hyperlinks that put secret malware in your machine — like keyloggers that watch you kind your passwords or ransomware applications that corrupt your information.

If you happen to’re ever undecided about an e-mail attachment or a hyperlink you are being requested to click on, copy the hyperlink (with out opening it) and paste it right into a URL checker like this one from NordVPN. These free instruments can let you know if a hyperlink is related to any recognized malware domains.

URL checker

Sam Chapman for Engadget

You too can mouse over any hyperlink, then have a look at the bottom-left of your browser to see what URL it would take you to. If an e-mail is out of your financial institution, any hyperlinks inside it ought to go to your financial institution’s web site. If it is going wherever else, particularly to an unidentifiable string of characters, be suspicious.

7. Do not overshare

During the last 20 years, a lot of us have gotten into the behavior of dumping all types of private info on social media. This development has supercharged the rip-off economic system. It could appear innocent to broadcast the names of your youngsters or the dates you may be on trip, however every bit of information you place into the world makes it simpler for a stranger to get hooks into you.

For instance, “grandparent scams” are on the rise proper now. Grifters contact a goal, often a senior, pretending to be their grandchild. They’re going to declare to be in a disaster and want cash quick. The extra info they’ve on their goal, the extra convincing their story of woe will likely be. Social media is a chief place to check a possible sufferer.

Oversharing may also be a compounding downside. If you happen to use weak passwords, your public info can be utilized to guess your credentials or reply your safety questions. So, if you do not have a password supervisor but, suppose twice earlier than you interact with that quiz put up on Fb that asks for the title of your childhood pet.

8. Use a VPN

I am a giant booster of digital personal networks (VPNs), however it’s essential to be real looking about what they’ll and might’t do. Even one of the best VPNs aren’t whole cybersecurity options — you’ll be able to’t simply set one and assume you are protected perpetually. A VPN cannot shield you should you use simply guessed passwords, for instance, or click on on a malware hyperlink. It is about hiding your identification, not making you invulnerable.

So what can a VPN do? In brief, it replaces your IP tackle (a fingerprint that identifies you on-line) with one other IP tackle, belonging to a server owned by the VPN. The VPN server does enterprise with the web in your behalf, whereas its conversations together with your machine are encrypted so it might’t be traced again to you.

Proton VPN's app for Windows.

Sam Chapman for Engadget

This implies no third social gathering can join your on-line actions together with your real-world identification. No one will likely be harvesting information on the web sites you go to to promote to advertisers, nor constructing a file on you that an unscrupulous authorities may misuse. VPNs additionally shield you from pretend public Wi-Fi networks arrange by cybercriminals — even when a hacker methods you with a man-in-the-middle assault, they can not do a lot with out your actual IP tackle.

Many prime VPNs, together with my prime choose Proton VPN, embrace advert blockers that may additionally preserve cookies and monitoring pixels from latching onto you. So, even when a VPN cannot do every part, you may be far safer and extra personal with one than with out one. If you happen to don’t need to pay for a brand new subscription proper now, I’ve additionally compiled an inventory of one of the best free VPNs which might be really protected to make use of.

9. Run common virus scans

An important time to search for malware is whenever you’re downloading a file from the web. Not solely can undesirable apps hitch rides on seemingly protected information, however hyperlinks can begin downloads in secret, even should you do not suppose they’re meant to be downloading something. A stable antivirus program can catch malware because it arrives in your system, and if it is unsure, can lock suspicious information in quarantine till it is aware of whether or not they’re protected or not.

Devoted antivirus apps are typically even able to catching malware that hasn’t been seen or used but. AV software program makes use of machine studying to determine the frequent patterns of malware, filtering out new viruses that behave like previous ones.

However what about malware that is already gotten by the perimeter? An antivirus app may also verify your laptop at set intervals searching for undesirable apps, together with those who may be masquerading as system information. Home windows computer systems now come pre-installed with Home windows Defender, which is sufficient to deal with most of those duties, however I like to recommend at the least one anti-malware program on any machine.

10. Use e-mail maskers and personal engines like google

If you happen to’re involved about your info being misused or mishandled, do not forget that the much less you place out into the world, the much less hazard you are in. Protecting your personal information off social media is one essential step, however there are different methods your information will get disseminated — and different choices for responding.

For instance, you usually want an e-mail tackle to enroll in a web-based account. If you happen to use your actual e-mail, your contact info is now floating round on-line, growing the possibility of somebody utilizing it to rip-off you (or at the least including you to mailing lists you by no means signed up for). To remain protected, use an e-mail masker. These providers provide you with a pretend e-mail tackle you should use to create accounts, which routinely forwards messages to your actual tackle.

DuckDuckGo

Sam Chapman for Engadget

Search engines like google and yahoo, particularly Google, are additionally infamous for constructing profiles on customers by watching the phrases they seek for. You may dodge that by switching to a personal search engine like DuckDuckGo, which does not monitor something you do — it is funded by non-targeted advert gross sales on its search outcomes pages, not by promoting your information to brokers.

11. Use an information removing service

Talking of information brokers: sadly, should you’ve been on the web at any level within the final 10 years with out taking intense precautions, your information might be within the palms of at the least one enterprise that makes cash by hoarding and promoting it. These information brokers vary from public-facing, people-search websites to non-public backend sellers.

Information brokers are poorly regulated and lax about security. The longer one has your private info, the extra doubtless it’s to leak. The excellent news is that the majority brokers (although not all of them) are legally required to delete your information should you ask them to.

Nevertheless, there are a number of information brokers on the market, they usually actually need to preserve your information. Every one makes opting out more durable than uninstalling a Norton product — and tons of of them could have information on you. To make the method simpler, you should use an information removing service like DeleteMe or Surfshark VPN’s companion service Incogni.

12. Follow bodily safety

Let’s shut out the listing by getting a little bit old skool. I’ve already mentioned what number of on-line scams rely on basic con artistry to work. By the identical token, bodily infiltration and smash-and-grab ways nonetheless pose a risk to cybersecurity.

It would not take an excessive amount of creativeness to see how this might work. If you happen to depart your laptop computer or cellphone unattended in public, for instance, somebody may insert a flash drive that masses malware onto the system. In a single illustrative case, a thief within the Minneapolis space would loiter in bars, watch folks unlock their telephones, then steal these telephones and unlock them himself.

I am not saying that you must be paranoid each second you are in public. Simply use the identical degree of warning you’d use to guard your automotive. Lock your cellphone with a biometric key so solely you’ll be able to open it, and ensure to not depart any machine mendacity round if it might entry your on-line accounts. And at work, watch out to not let anybody right into a safe space if they do not have the correct credentials.

Amazon’s new eero Sign retains you linked to the web when outages happen
The best iPhone accessories for 2025
Seattle startup Accipiter Bio emerges with $12.7M and massive pharma offers for AI-designed proteins
Giant reasoning fashions nearly definitely can suppose
Why World Software program Groups Have Turn into a Good Alternative for Rising Companies
TAGGED:OnlineSafersteps
Share This Article
Facebook Email Print
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow US

Find US on Social Medias
FacebookLike
XFollow
YoutubeSubscribe
TelegramFollow

Weekly Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Forex

Market Action
Popular News
1757475992 aa logo rgba no text square.png
Economics

Uganda: URA, UCCA Partner to Digitize Cargo Clearance and Curb Sector Fraud

PhreeNews
PhreeNews
September 10, 2025
Senegal has a thriller Togolese bond bid
Greenpeace challenges deceptive fuel foyer warfare earnings claims, as ‘warflation’ actuality hits households
Dolly Parton Misses Dollywood Ride Reveal Due to Kidney Stone
How AI Is Shaping Firm Tradition

Categories

  • Sports
  • Science
  • Sports
  • Tech
  • Business
  • Entertainment
  • Tech
  • Politics
  • Markets
  • Travel

About US

At PhreeNews.com, we are a dynamic, independent news platform committed to delivering timely, accurate, and thought-provoking content from Africa and around the world.
Quick Link
  • Blog
  • About Us
  • My Bookmarks
Important Links
  • About Us
  • 🛡️ PhreeNews.com Privacy Policy
  • 📜 Terms & Conditions
  • ⚠️ Disclaimer

Subscribe US

Subscribe to our newsletter to get our newest articles instantly!

© 2026 PhreeNews. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?