{"id":53219,"date":"2022-07-07T17:08:32","date_gmt":"2022-07-07T09:08:32","guid":{"rendered":"http:\/\/wordpress-my-161844363.ap-southeast-1.elb.amazonaws.com\/articles\/?p=53219"},"modified":"2022-07-07T17:11:18","modified_gmt":"2022-07-07T09:11:18","slug":"cyber-hygiene-habits","status":"publish","type":"post","link":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits","title":{"rendered":"Here\u2019s Why You Should Stop Ignoring That Update Notification On Your Phone"},"content":{"rendered":"<p>Do you know right now what hardware and software is on your network and where it is? More importantly, do you know where your most important data is located and who can access it?<\/p>\n<p>Chances are you don&#8217;t know and it is this gap in knowledge that cyber thiefs try to take advantage and exploit to their benefit.<\/p>\n<p>As technology develops at an exponential rate, so have the frequency and severity of cyberattacks around the world. Individuals are targeted by scammers and hackers seeking to gain access to your personal information and data &#8211; and money. As a result, cyber hygiene has become a key method for creating a more secure and safe digital environment.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why-cyber-hygiene-is-important\"><\/span><b>Why cyber hygiene is important<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">So what is cyber hygiene exactly? Much like how an individual engages in certain personal hygiene practices to maintain good health and wellbeing, cyber hygiene practices can keep your personal data safe and protected.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, both personal and business networks include an array of computers, servers, databases, virtual machines, mobile devices, operating systems, applications, and tools, all of which are potential attack vectors for hackers. I<\/span><\/p>\n<p><span style=\"font-weight: 400;\">f these are not regularly and properly maintained, your network will grow ever more vulnerable over time as malicious hackers discover more ways to gain access to your devices.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How-do-you-practice-good-cyber-hygiene\"><\/span>How do you practice good cyber hygiene?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h4>1. Do not visit suspicious websites<\/h4>\n<p><span style=\"font-weight: 400;\">You might be tempted to go looking for ways to get free software, games, or movies, but be warned that this is very risky behaviour. These malicious websites can often look like legitimate websites. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, upon visiting, it might start to download malware and cause you any number of headaches. If you are unsure about the authenticity of a website, then it might be best to avoid visiting it.<\/span><\/p>\n<h4>2. Enable 2FA<\/h4>\n<p><span style=\"font-weight: 400;\">Two-factor authentication (2FA) helps to reinforce your security by requiring two methods to verify your identity. The 2nd part of the authentication process will usually be sent to your email or cell phone. It helps to protect against phishing, social engineering and password brute-force attacks.<\/span><\/p>\n<h4>3. Don\u2019t click on attachments in emails without first verifying the sender<\/h4>\n<p><span style=\"font-weight: 400;\">Similar to suspicious websites, links from emails or unfamiliar numbers should be verified. You have to make sure that the sender does not have any malicious intent. Many phishing emails and messages will often masquerade as legitimate entities. As such, you need to familiarise yourself with how legitimate senders communicate in order to spot red flags.<\/span><\/p>\n<h4>4. Ensure all your software is up to date<\/h4>\n<p><span style=\"font-weight: 400;\">While hackers are always finding new ways to compromise their victims\u2019 data, software developers are also constantly updating their programs to combat them. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">As such, every new update or patch can be crucial in plugin potential security loopholes. To ensure maximum security, regularly check to see if your security software is up to date.<\/span><\/p>\n<h4>5. Minimise sharing personal information<\/h4>\n<p><span style=\"font-weight: 400;\">There are certain pieces of personal information you should never, ever post online. These can include things such as birthdays, home address, place of work, IC and driver\u2019s licence numbers, or current location. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Basically anything that could be used to prove that you are who you say you are. Many online quizzes like those that ask you to create a fancy name based on your birthday are often used by cybercriminals to harvest information.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risks-of-poor-cyber-hygiene\"><\/span>Risks of poor cyber hygiene<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The results of poor cyber hygiene can cause a domino effect throughout your devices and network environment, resulting in multiple security vulnerabilities and potential attack vectors. Some of these include:<\/span><\/p>\n<h4>1. Ransomware<\/h4>\n<p><span style=\"font-weight: 400;\">Ransomware is extortion software that can lock your computer and then demand a ransom for its release. The ransom is usually paid for in cryptocurrency like Bitcoin, although there is no guarantee that the criminals will actually unlock your computer if you do as they say.<\/span><\/p>\n<h4>2. Keyloggers<\/h4>\n<p><span style=\"font-weight: 400;\">Keyloggers are activity-monitoring software programs that record everything that you type. This kind of cyber risk allows hackers to get ahold of your passwords and credit card numbers.\u00a0<\/span><\/p>\n<h4>3. Social engineering attacks<\/h4>\n<p><span style=\"font-weight: 400;\">These attacks often involve human interaction and psychological manipulation to trick victims into making security mistakes or giving away sensitive information. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is similar to the traditional phone call or Macau scam. The perpetrators will use all the personal information that they have harvested to trick you into giving them money or access to your accounts.\u00a0<\/span><\/p>\n<h4>4. Someone literally breaking into your house<\/h4>\n<p><span style=\"font-weight: 400;\">Remember when we said that you should not share your personal information so easily? This is one of the reasons why. Something like sharing your location on social media can have dire consequences if you&#8217;re not careful. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagine going on holiday overseas. You are excited to let all your friends know, so you post your location on Instagram or Twitter. Some people with malicious intent might be able to then look up where you live and decide to break into your home while you are away.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Know-what-needs-to-be-protected\"><\/span>Know what needs to be protected<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">One of the biggest challenges of implementing good cyber hygiene is simply knowing what needs to be protected in the first place. Thanks to the convenience provided by modern devices, much of our critical data is often hidden from us. This makes it hard to protect, as most people might not even be aware of them. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is of utmost importance to know what hardware and software is on your network and where it is, as well as where your most important data is located and who can access it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember, these are not one off methods. Good cyber hygiene means building up good habits over time through repetition. You can never be too complacent in this day and age. If you set up your computer and other devices with reputable antivirus programs, update them regularly, create strong passwords, and keep everything clean regularly, you will be on your way to creating cyber habits that may help keep you safe and secure online.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out these 5 tips to improve your cyber hygiene.<\/p>\n","protected":false},"author":58,"featured_media":53334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[256],"tags":[1004,350,767,1005],"class_list":["post-53219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifestyle","tag-cyber-hygiene","tag-cybersecurity","tag-lifestyle","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Do You Have Good Cyber Hygiene?<\/title>\n<meta name=\"description\" content=\"Do you know where your most important data is located and who can access it? Check out these 5 tips to improve your cyber hygiene.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do You Have Good Cyber Hygiene?\" \/>\n<meta property=\"og:description\" content=\"Do you know where your most important data is located and who can access it? Check out these 5 tips to improve your cyber hygiene.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits\" \/>\n<meta property=\"og:site_name\" content=\"iMoney Malaysia\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-07T09:08:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-07T09:11:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/static.imoney.my\/articles\/wp-content\/uploads\/2022\/07\/07170533\/cyber-hygiene.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jordan Low\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jordan Low\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits\",\"url\":\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits\",\"name\":\"Do You Have Good Cyber Hygiene?\",\"isPartOf\":{\"@id\":\"https:\/\/www.imoney.my\/articles\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.imoney.my\/articles\/wp-content\/uploads\/2022\/07\/07170533\/cyber-hygiene.jpg\",\"datePublished\":\"2022-07-07T09:08:32+00:00\",\"dateModified\":\"2022-07-07T09:11:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.imoney.my\/articles\/#\/schema\/person\/504ffd45ac95c1aed85e1dfc7d4c4ea6\"},\"description\":\"Do you know where your most important data is located and who can access it? Check out these 5 tips to improve your cyber hygiene.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#primaryimage\",\"url\":\"https:\/\/static.imoney.my\/articles\/wp-content\/uploads\/2022\/07\/07170533\/cyber-hygiene.jpg\",\"contentUrl\":\"https:\/\/static.imoney.my\/articles\/wp-content\/uploads\/2022\/07\/07170533\/cyber-hygiene.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Image source: pexels.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.imoney.my\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lifestyle\",\"item\":\"https:\/\/www.imoney.my\/articles\/category\/lifestyle\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Here\u2019s Why You Should Stop Ignoring That Update Notification On Your Phone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.imoney.my\/articles\/#website\",\"url\":\"https:\/\/www.imoney.my\/articles\/\",\"name\":\"iMoney Malaysia\",\"description\":\"Everything you need to know about improving your personal finances.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.imoney.my\/articles\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.imoney.my\/articles\/#\/schema\/person\/504ffd45ac95c1aed85e1dfc7d4c4ea6\",\"name\":\"Jordan Low\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.imoney.my\/articles\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f70608d4c20f96f6cff35357fc9e37d322e1898f6d623a1d6cc307c2076ed42d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f70608d4c20f96f6cff35357fc9e37d322e1898f6d623a1d6cc307c2076ed42d?s=96&d=mm&r=g\",\"caption\":\"Jordan Low\"},\"description\":\"With a background in history and public relations, Jordan has ample experience in business and creative writing, especially in the field of SMEs and Human Resources.\",\"url\":\"https:\/\/www.imoney.my\/articles\/author\/jordan-low\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Do You Have Good Cyber Hygiene?","description":"Do you know where your most important data is located and who can access it? Check out these 5 tips to improve your cyber hygiene.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits","og_locale":"en_US","og_type":"article","og_title":"Do You Have Good Cyber Hygiene?","og_description":"Do you know where your most important data is located and who can access it? Check out these 5 tips to improve your cyber hygiene.","og_url":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits","og_site_name":"iMoney Malaysia","article_published_time":"2022-07-07T09:08:32+00:00","article_modified_time":"2022-07-07T09:11:18+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/static.imoney.my\/articles\/wp-content\/uploads\/2022\/07\/07170533\/cyber-hygiene.jpg","type":"image\/jpeg"}],"author":"Jordan Low","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jordan Low","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits","url":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits","name":"Do You Have Good Cyber Hygiene?","isPartOf":{"@id":"https:\/\/www.imoney.my\/articles\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#primaryimage"},"image":{"@id":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#primaryimage"},"thumbnailUrl":"https:\/\/static.imoney.my\/articles\/wp-content\/uploads\/2022\/07\/07170533\/cyber-hygiene.jpg","datePublished":"2022-07-07T09:08:32+00:00","dateModified":"2022-07-07T09:11:18+00:00","author":{"@id":"https:\/\/www.imoney.my\/articles\/#\/schema\/person\/504ffd45ac95c1aed85e1dfc7d4c4ea6"},"description":"Do you know where your most important data is located and who can access it? Check out these 5 tips to improve your cyber hygiene.","breadcrumb":{"@id":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#primaryimage","url":"https:\/\/static.imoney.my\/articles\/wp-content\/uploads\/2022\/07\/07170533\/cyber-hygiene.jpg","contentUrl":"https:\/\/static.imoney.my\/articles\/wp-content\/uploads\/2022\/07\/07170533\/cyber-hygiene.jpg","width":1200,"height":628,"caption":"Image source: pexels.com"},{"@type":"BreadcrumbList","@id":"https:\/\/www.imoney.my\/articles\/cyber-hygiene-habits#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.imoney.my\/articles\/"},{"@type":"ListItem","position":2,"name":"Lifestyle","item":"https:\/\/www.imoney.my\/articles\/category\/lifestyle"},{"@type":"ListItem","position":3,"name":"Here\u2019s Why You Should Stop Ignoring That Update Notification On Your Phone"}]},{"@type":"WebSite","@id":"https:\/\/www.imoney.my\/articles\/#website","url":"https:\/\/www.imoney.my\/articles\/","name":"iMoney Malaysia","description":"Everything you need to know about improving your personal finances.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.imoney.my\/articles\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.imoney.my\/articles\/#\/schema\/person\/504ffd45ac95c1aed85e1dfc7d4c4ea6","name":"Jordan Low","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.imoney.my\/articles\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f70608d4c20f96f6cff35357fc9e37d322e1898f6d623a1d6cc307c2076ed42d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f70608d4c20f96f6cff35357fc9e37d322e1898f6d623a1d6cc307c2076ed42d?s=96&d=mm&r=g","caption":"Jordan Low"},"description":"With a background in history and public relations, Jordan has ample experience in business and creative writing, especially in the field of SMEs and Human Resources.","url":"https:\/\/www.imoney.my\/articles\/author\/jordan-low"}]}},"_links":{"self":[{"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/posts\/53219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/comments?post=53219"}],"version-history":[{"count":6,"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/posts\/53219\/revisions"}],"predecessor-version":[{"id":53337,"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/posts\/53219\/revisions\/53337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/media\/53334"}],"wp:attachment":[{"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/media?parent=53219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/categories?post=53219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.imoney.my\/articles\/wp-json\/wp\/v2\/tags?post=53219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}