Skip to main content

About us

HOW TO SURVIVE THE INTERNET is an educational blog mainly aimed at young adults and teenagers to guide them in matters of digital responsibility.


Comments

Popular Posts

Phishing? What is that?

Phishing is a cybercrime in which you can be contacted by email, phone call, or text by a " legitimate institution " to get your personal information and extort you with it. This data may be used to steal your identity or money and commit crimes in your name. Student loses $3K after clicking fake bank link (CTVNews, 2023). How can I identify a phishing email? There are some key aspects to take into account.      1. Too good to be true . (You won a cellphone, the lottery...)      2. It may seem urgent      3. It has links that seem odd that lead to external sites      4. Attachments (photos, videos, pdf, etc).  Note:  t he only file type that is always safe to click on is a . txt .      5. Unusual sender .  Watch out for misspellings in case the remittent "is" someone you know. Watch this hacker break into a company. How can I protect myself from phishing via emails? Use spam filters in your em...

Yeah, my password's my birthday...

All About Cookies surveyed 1000 people to find out their password behaviors. They found out that 84% of them have unsafe passwords ,  52% have 5 or fewer passwords for all their accounts , and  43% use passwords that contain the name of a pet, loved one, or their birthday. Safe passwords are hard-to-guess combos of letters and symbols that make your password strong. To do this, specialists recommend to add the following characteristics to each of your passwords: Use upper and lower case letters and numbers Use complex symbols (!@#$%^&*). Extension of 10 to 14 characters Do NOT use 1234 ..., your birth date , or easy-to-guess information. Example of a safe password: #1a%9Bjk7Hp*-1     2. Use the two-factor authentication if possible.     3. Use a password manager . Password managers use encryption technology that ensures that only the user with the correct key or password to the manager can access it.     4. Change your passwords e...