Heimdal Security Blog

50+ Internet Security Tips & Tricks from Top Experts

We invited 19 cyber security experts to share their top 3 tips for staying safe online, and they mentioned some great ones!

This is the fastest way to learn how to keep your data safe from a reliable source. All these experts’ knowledge and experience packed into over 50 tips is a must-read-and-apply!

The experts involved range from researchers, to bloggers and journalists who have been writing about cyber security issues for years and years. Representatives from security vendors such as BitDefender, Kaspersky, Avira, Malwarebytes, Eset or F-Secure also joined this roundup.

Plus, you can download a PDF version of this collection of Internet security tips and tricks at the end of the article!

Time to see what these specialists answered when we asked:

Can you name 3 internet security tips any user needs to follow to stay safe online?

 

Top Security Tips From Cyber Security Experts

 

1. Neil Rubenking, Lead Analyst PC Magazine

 

 

 


 

2. Kelly Jackson Higgins, Executive Editor Dark Reading

 

 

 

There are no foolproof ways to stay safe online, but here are a few tips:


3. Andrei Petrus, Product Manager, Avira

 

 

 

While people understood how critically important the essential protection of antivirus software is, there is more each of us must do in order to augment our cyber armor. Here’s a top 3:

Free software always come at a price, most frequently by side installing adware, browser extensions or other software you didn’t ask for. For that matter, things just worsened last week, when a notorious torrent client started to use customers’ computers for bitcoin mining. The advice here is to read carefully all the notes throughout the installation wizard and avoid installing apps from untrustworthy download portals / vendors.

Be very careful what apps you choose to install and pay special attention to what permissions each app is requesting. For instance, it doesn’t quite make sense for a weather app to demand access to your photos, does it?

Don’t ever say I have nothing to hide, because that’s equivalent to I don’t care about this right.


4. Lee Munson, BH Consulting’s Social Media Manager of SecurityWatch

 

 

As we sign up for ever more accounts and services it becomes extremely tempting to reuse the same password over and over again but this is extremely risky behaviour.

If your login credentials are ever grabbed by a hacker – and with the number of data breaches in the news every week it’s a case of when, not if – the attacker will have inadvertently gained access to your entire digital world.

If creating a large number of complex, hard to guess passwords is a challenge consider using a password manager such as LastPass which can store all your credentials for you, leaving you with just one master password to remember.

Whether you’re at home or at work, chances are, you’ll receive emails from time to time that are not quite what they seem. Cyber criminals often create convincing emails that appear to come from bank, credit card company and other popular websites that hold financial or other sensitive data. Contained within will be links to copycat sites under the bad guys’ control which will steal your personal data – and maybe your money too – should you visit them and enter your username and password.

We live in a digital age in which we can download just about anything we want to watch, listen to or use… and have access to it almost immediately.

While there are hundreds of legitimate sites from which digital content can be downloaded, there are thousands more that offer bogus, and harmful content, filled with malware designed to steal your financial and other personal information.

So, if you must download the latest movie or song, think twice about where you are downloading it from.

Is the site well-known? Have any of your friends used the site without incident or unexpected surprises? Is it actually the site you think it is rather than a clone? (Check your browser for a padlock or a URL beginning with https:// for some certainty and don’t ever visit a download link sent you via email – see point #2 above)


5. David Harley, Senior Research Fellow of ESET N. America

 

 

After more than a quarter century in security, it still seems to me that many people still expect to find a 100 per cent solution for all the security issues that plague us, and are furious when a solution doesn’t meet their expectations. Unfortunately, vendor marketing isn’t good at expectation management, often offering simplistic solutions to complex problems, single solutions that are supposed to render all other products obsolete.

In fact, the promotion of the idea that single-layer/single-solution security is enough is not only obsolete (if it was ever valid, which I don’t think is the case), but irresponsible. I often read that solution S makes passwords obsolete. Password methodology has lots of problems, but the way to improve authentication isn’t simply to replace one (flawed) method with the latest method du jour and hope it’s more reliable.

Many social media sites now allow you to augment password authentication with at least one secondary authentication method, such as Facebook’s Login Approvals, which uses a token (security code) sent to your cellphone by SMS or its own authenticator app. I really hope that most people nowadays know that viruses are not the only security threat they need to worry about, but all too often, all that they do is install an (often free) anti-virus program.

As long as it’s a genuine security program rather than some kind of alluringly marketed malware – but it’s not enough to provide anything like complete protection. What security do your internet provider, applications and operating system provide? How can you configure them to make the best of that security? If you can’t bear to spend money on security software (preferably a full-strength security suite), then at least look into the possibility of reinforcing your free anti-virus with other free but genuine, reliable security software such as a browser sandbox.

Having argued (convincingly, I hope) for multi-layering, on the grounds that where one approach fails, another might succeed, I’m going to mention a security layer that often gets overlooked: you. Many kinds of threat rely on social engineering, psychologically manipulating a victim into doing something which will enable the attacker to achieve his aims. I can’t teach resistance to sophisticated social engineering in a paragraph – and even grizzled security researchers can be fooled sometimes – but if you can maintain a reasonable level of skepticism and remember that successful social engineering may use the carrot or the stick (or both), you can save yourself a lot of grief. Above all, don’t fall into the trap of thinking that security software or your favourite operating system will save you having to make sensible choices about what links and attachments you open.


6. Peter Kruse, Partner & Security Specialist of CSIS Security Group

 

 

 

Ask yourself if you trust the source and why you’d want to open it in the first place.

Patch your software whenever new security patches are released.

Make sure you download antivirus software from vendors that you trust and never run more than one AV tool on your PC at the same time. If you can’t afford to buy a license there are plenty of free options for home users such as AVIRA, AVG, AVAST and Microsoft etc.


7.  Marcin Kleczynski, CEO and Founder of Malwarebytes

 

 

 


8. Liviu Arsene, 

Senior E-Threat Analyst, Bitdefender

 

 

Online or email scams are no longer identifiable by poor grammar and spelling mistakes. Whenever you see ads or emails claiming to give you a free iPhone or iPad, ask yourself “Would it happen to me walking down the street?”;

Make sure you have the latest version of all installed software. Although Java or PDF software is commonly targeted, few actually take the time to install the latest security updates;

An up to date security solution will keep your PC infection free, provided you follow a minimum of best practices for online browsing and file downloading.


9. John E Dunn, Co-founder of Techworld

 

 

 


10. Simon Edwards, Technical Director of Dennis Technology Labs

 

 

 

Two of those tips are related to web-based exploit protection while the first is fairly obvious. I can explain why I think those are important but for now here are some links that helped form my opinion:

  1. VPN
  2. Update
  3. Java

If I was allowed a 4th tip I’d say, “Use two factor authentication whenever possible” and a 5th, “If you are using Windows, you should use anti-malware software.


11. Daniel Cid, Founder & CTO of Sucuri

 

 

 

That’s an easy one.

I will share the tips that I “force” my family and friends to do online:

*The web still works (mostly) without javascript and you can easily re-enable it for sites that actually require it (like gmail or youtube).


12. Matthew Pascucci, Cyber Security Engineer and Privacy Advocate

 

 

 

Here are a few things non-tech savvy people should be doing to stay safe online:


13. Morten Kjaersgaard, Heimdal Security’s CEO

 

 

 

These are the 3 security tips that you can follow to stay safe online:


14. Xavier Mertens, Security Consultant and Blogger at XM Consulting

 

 

 

If possible enable 2FA (2-factors authentication – some you have/know/are) when the online service proposes this feature. Generate a strong and unique password for every service. Don’t spend your time to remember all those passwords, use a password manager to generate and store them. They can even fill the login pages for you!

By devices, I mean your laptops/desktops but don’t forget that today, most electronic devices are also… computers! Think about your access points, ADSL modems, SmartTV’s, mobile phones, IoT (fridges, thermostat, etc). They also must be upgraded!

Internet is not a world of care bears! You received a gift, an invitation, found a USB stick or are asked to perform a specific action to your computer. Have the good reflex to ask Why? or Do I know the person who’s asking me this? Don’t be afraid to decline or ask more information. Exactly like we learn to our kids: Do not talk to strangers.


15. Dave PiscitelloVice President, Security and ICT Coordination, ICANN

 

 

 


16. Rahul Kashyap, Chief Security Architect at Bromium

 

 

 


 

17. Brian Donohue, Social Media Editor, Threatpost

 

 

 


18. Troy Hunt, Microsoft MVP for Developer Security

 

 

 

Randomly generate them all (bar the ones you actually need to remember) and use a good password manager like 1Password.

It’s increasingly common on large services and is enormously effective.

Think twice before creating anything digital you wouldn’t want exposed including malicious email and nudie pics.


19. Mikko Hypponen, F-Secure Chief Research Officer

 

 

 

 

Conclusion

 

Hopefully, these tips shared by these top cyber security experts in this article will inspire your own personal quest for better online protection.

This is the kind of advice experts share with their families and friends, and we hope you’ll find the time to apply them as well.

In a changing landscape like the IT industry, there isn’t only one problem and one solution to Internet security. That’s why you should focus on your needs and your resources, so you can be as safe as possible at all times.

Can you name 3 security tips you follow constantly to stay safe online?

*This article was initially written and published by Aurelian Neagu, in March 2015, and brought up to date by Andra Zaharia, in June 2016.