Better Online Habits

Cyber Security 101

Welcome

This tutorial is designed for less experienced users who want to learn basic cyber security practices.

There are 5 chapters in this tutorial:

5 chapters

First, Let’s review a few tips and review how the tutorial is structured.

Continue

Tutorial Tips

Please allow yourself the following:

Good posture helps you focus and helps decrease potential health problems.

Each chapter will take about 10 minutes to complete.

Be patient and willing to learn new concepts and vocabulary.

If you have any questions, just reach out via the help link!

When you’re done with this tutorial, you will have several defenses for protection.

Continue

How the guides are made

We’ve created this guide so you can easily understand it. We took out the technical language and only kept the necessary parts. The result is a tutorial that is straight-to-the-point without all the technical jargon.

Each Topic will have the 5 W’s along with a how-to at the end.

  • What is it used for?
  • Who is it made for?
  • Why & When should I use it?
  • Where & How will I get it and set it up?
  • Sources

Product recommendations are made based on data from reputable sources.

You won’t need to spend time searching for which brand is best -we’ve done that work for you already!  There are only two choices in every chapter; the best free option or the best-paid option.

At the end of each topic, you will know how to set up the tool and how to use it correctly.

Next, let’s review a few habits that have a large impact on your internet security.

Continue

User Habits

Here are the 5 essential habits to improve the security of your devices:

Reboot –

Many people overlook rebooting their devices. This should be your first step when a device is not functioning properly. A reboot helps free up resources, clear memory, and make devices run smoother. Do this weekly to stay on top of it.
 

Scan frequently-

Open your antivirus program and select “Scan Now”. You can set up a scheduled scan to happen at regular times; this is covered in a later section. Scan your device once weekly at a minimum. 

lock

Lock your devices-

Use a password protected account on every device and lock them when unattended. This is especially important at work; you never know who will peek in when you are away. Use a 6-digit pin, when possible or a password greater than 12 characters.  

Check links before you click!

Get a link checker such as DrWebb (all browsers). An example is an http://bit.ly from Facebook link that leads to an Amazon page.

It can also lead to a malicious website and you won’t know until you click it.

  

Log out when done-

This is one of the most important tips on this page. Log out of accounts when done to prevent a “session hijack”. This is like holding the door open for a stranger, letting them into your account by accident.

 

 

You’re doing great! Already you know what kinds of practices you need to have to be cyber safe. In the first chapter, we’ll talk about what a password manager is and how to set it up.

Ready for the 1st chapter? —————————————— Chapter 1- Password Managers

Want to see the sources for this section?

Sources

Sources