5 Common Cybersecurity Mistakes to Avoid in 2018

5 Common Cybersecurity Mistakes to Avoid in 2018

2017 brought new challenges for personal security, and 2018 will likely do the same. While we have little control over major data breaches as individuals, we do have control over our own personal security processes. Here are five common cybersecurity mistakes to avoid in the coming year and beyond.

Connecting Everything That Can Be Connected

How important is it to you that your eating utensil measures how quickly you consume food? Do you really need a digital assistant to tell you the weather or play music? These are the kind of questions you need to answer before buying smart devices.

The Internet of Things, or IoT, continues to grow astronomically. Imagine a life where your refrigerator and pantry automatically calculate how many calories, carbs, and sugars your groceries have and use that info to suggest recipes. Sounds cool, right? Well, that coolness comes at a price. The devices and apps we use have unprecedented access to our personal lives. From our viewing habits to our shopping habits to our eating habits, it’s all being collected and stored by a third party. The more data you allow to be collected, the less control you have of your identity, and the more likely your personal info ends up in the hands of the wrong person.

Our personally identifiable information (PII) is essentially currency. It’s just as important as the money you have in the bank. Consider that before allowing apps and devices to connect and share your PII. And for every device you do connect, be sure to update the default usernames and passwords ASAP.

Using Weak or Outdated Passwords

As usual, inferior password practices rule the “how to get hacked” world of connected accounts and devices. The list of most commonly used passwords seems to never change. Just compare the 2017 list to the 2016 and the 2015 lists.

If you fail to implement strong passwords or forget to change them every now and then, you essentially give up on security. The good news is that generating strong, unique passwords doesn’t have to be difficult. Here are three tips to help:

Use a passphrase instead of a password. Passphrases trump passwords by forming a sentence that’s easy to remember, such as a quote from your favorite movie or book.

Use the SNL Triad – symbols, numbers, and letters. Upgrade your passphrases with multiple characters, including upper and lower case.

Use a password manager. It’s nearly impossible to remember every password for every account you own. Password managers turn that difficulty into a luxury by generating, storing, and syncing your logins across multiple devices.

Relying on SMS Two-factor Authentication

We always recommend utilizing two-factor authentication, or 2FA, wherever possible, which provides an extra layer of security by requiring multiple steps to access accounts. But 2FA via SMS (text messaging) is far from secure. Methods to intercept SMS have been around for a while. Here’s a great example of it in action:

And it isn’t necessary to have a sophisticated understanding of hacking tools in order to compromise someone’s phone. Using good ol’ social engineering on human beings works just as well:

The above example is what is known as a SIM swap, where an attacker steals your phone number and ports it to a phone of his own.

SMS certainly presents too many security issues to be trusted. But what other options do we have? One is Google Authenticator, which implements a process called Time-based One-time Password Algorithm, or TOTP. Here’s a good explanation of how it works.

The other option is to bypass all software-based authentication methods and instead use physical tokens such as Yubikey.* Products like Yubikey require a physical key in order to access an account or device.

But the bottom line is this: two factors are better than one. No matter what. So even though 2FA via SMS may not be secure, it’s still better than not using 2FA at all. Just remember: there is no such thing as 100% security.

Snark aside, trendy apps that collect, send, and store personal information represent a major challenge to personal security. The above example exemplifies how dangerous these seemingly harmless trends could be.

The Google Arts & Culture app has the ability to match your selfie to a famous painting, which is definitely awesome. But it also poses huge security concerns. As of this writing, it is the top app in the Google Play store with over one million downloads. And even though it was designed to be educational, as well as entertaining, by connecting people with arts and culture around the world, the selfie art-matching feature is the driving force behind the popularity.

Google, of course, claims they won’t use the data collected from uploaded images for any other purpose and that the images are deleted after the match is made. Be that as it may, would you upload your fingerprints to a database to see if your hands are anything like (enter famous person here)? Of course not.

Perhaps that comes off as paranoia, but the reality is, app developers collect and store tons of our data. Be selective in the ones you choose. Not every trend is worth joining. And be sure to review security settings and permissions before installing. Think before you app!

Failing to use Browser Plugins for Additional Security

It’s no secret that browsers, search engines, and websites track our online habits. For the most part, this process is a shared compromise stating that we, the user, can access free content in exchange for a few cookies.  We can also opt out of this by turning on private browsing or using alternative browsers that do not store any history or cookies, thereby granting us anonymity.

But remaining anonymous isn’t the top concern. Websites and advertisements are prone to cyber attacks that, in some cases, don’t even so much as require a click in order to spread malware. As attacks become more sophisticated, the need for additional security measures in general web browsing increases. Here are a few plugins that can help you right now:

HTTPS Everywhere* – HTTPS is the secure version of HTTP that encrypts the connection between your computer and the website you are accessing. But not every site offers HTTPS, and even when they do, you still may be redirected to an unsecure page. HTTPS Everywhere explains:

Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using clever technology to rewrite requests to these sites to HTTPS.

Adblockers – Not only are popup advertisements annoying, they can also be dangerous. Malvertising—malicious advertising—is a common attack that utilizes advertisements to spread malware. Adblockers help prevent this and provide a cleaner browsing experience.

VPNs – Short for virtual private networks, VPNs encrypt your traffic and make it nearly impossible for someone to snoop your data. They are a must-have security tool for anyone that connects to public WiFi but are also a good way to prevent internet service providers from collecting your browsing data or blocking you from various websites. You can read about how VPNs work here.


Justin Bonnema

Lead Writer at SAC
Justin left the music business to focus on his true passion: writing. A talented writer and detailed researcher, he’s involved in every department at SAC to make sure all content is fresh and up-to-date. In his spare time, Justin writes about fantasy football for FootballGuys.com and practices mixology (he makes a mean margarita).

Share this now!

3 Comments


  1. Hi,

    Thanks for sharing such a useful post with basic points which really helpful to avoid these types of cyber mistakes…..!!

    Reply

    1. Thank you Sandeep for your feedback…

      Reply

  2. i have always being following your site on updates and since have be guided… now i knw little things counts, we all need to protect ourselves from cyber criminals out there, they are much and determined to steal credentials and cause damages to us.
    thank you NexxyTechnologies.

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *