Saturday, November 16, 2024
Google search engine
HomeGuest BlogsThe Ultimate Internet Safety Guide for Seniors in 2024 by Katarina Glamoslija

The Ultimate Internet Safety Guide for Seniors in 2024 by Katarina Glamoslija

Katarina Glamoslija
Katarina Glamoslija

Updated on: January 11, 2024


Staying safe online can be really overwhelming — most users have their photos, credit cards, personal communications, financial information, and devices exposed to hackers every single day without even knowing that they’re in danger.

In this article, I’m going to explain the most common online threats facing seniors today, such as:

  • Viruses and malware.
  • Phishing.
  • Data breaches/password theft.
  • Social media scams.
  • Banking fraud.
  • Privacy violations.
  • And more…

If this list has made you feel nervous, don’t worry! The vast majority of cyber attacks can be easily prevented with the proper tools, some basic education, and plain old common sense.

And the good news is that the best security software has been designed with ease of use in mind. In addition to defining the most dangerous cyber threats (and giving you practical tips to avoid them), I’ve personally selected highly secure antivirus programs, password managers, and even virtual private networks (VPNs) that can keep you safe with a minimal amount of setup and that are very easy to use.

My #1 antivirus is Norton, which has 100% malware detection rates, is very easy to use on all devices, and also comes with an excellent VPN and a free password manager.

My internet safety guide for seniors is your one-stop shop for internet security assistance in 2024. So whether you’re looking for the best deals online, or you just want to safely keep up with family, friends, and finances online, keep reading to learn how to stay safe online.

Try the Best Antivirus on the Market in 2024

What Are the Most Common Online Threats Affecting Seniors?

What Are the Most Common Online Threats Affecting Seniors?

Seniors face pretty much the same risks online as everybody else — hackers have an ever-expanding array of tools to fleece users out of their money, steal user data, destroy devices, and spread dangerous files and scams across the web.

Some common online threats affecting seniors are:

  • Malware. Software designed to damage a computer, steal data, or financially exploit unsuspecting users. Common malware types include ransomware, trojans, and spyware (we will discuss these more later in the article).
  • Data breaches. The release of personal information (such as email addresses, usernames, passwords, and even credit card numbers and social security numbers) to the general public and dark web servers. Recent high-profile data breaches have affected millions of Facebook and LinkedIn users.
  • Scams. Hackers are constantly coming up with new ways to deceive users into giving away their personal information and money, including scam emails, text messages, websites, social media accounts, and online dating profiles.
  • Identity theft. Using another person’s personal information (e.g. name, social security number, credit card, etc.) without permission.

Fortunately, a lot of these attacks can be prevented with a few simple tips and by following a few simple steps, and I will also show you what to do if you unfortunately fall victim to cybercrime.

How to Best Protect Yourself (& Your Personal Info) Online

How to Best Protect Yourself (& Your Personal Info) Online

Download a good antivirus program. Using good antivirus software is the easiest way to stay safe online. The top antiviruses on the market include real-time malware protection to block viruses before they can run, anti-phishing tools to block scam websites, and additional extra features like firewalls, Wi-Fi scanners, VPNs, password managers, software updaters, data breach monitors, and more. Norton is my #1 antivirus choice — it’s really easy to use and provides a ton of automatic security tools to keep all of your devices safe.

How to Best Protect Yourself (& Your Personal Info) Online

Always go to the source. Hackers use deceptive pop-up windows, email links, text messages, websites, phone calls, and more to try and rush and pressure users into bad decisions. Maybe a legitimate government agency really is texting you, or your utility company sent you an email, or your old friend wants you to download an email attachment. But you should always try to confirm that the information you’re getting is authentic by using a trusted contact method like giving that agency, company, and friend a call. Always be skeptical — if it sounds too good to be true, it probably is!

How to Best Protect Yourself (& Your Personal Info) Online

Only go on secure websites. A website is considered secure if the address starts with “https://” (instead of “https://”). A quick way to check if the website is secure is to look for the padlock icon next to the address bar, which indicates the website you’re using has a secure encrypted TLS connection. The HTTPS Everywhere browser extension is a great free tool to help ensure you’re using encrypted web connections whenever possible.

How to Best Protect Yourself (& Your Personal Info) Online

Avoid pirate sites. Downloading (or torrenting) music, movies, and TV shows for free is tempting, but it’s best not to use torrenting websites. These websites are generally unsafe, and they’re always full of malicious links and malware downloads. If you do download pirated content, make sure you’re running a powerful antivirus program with effective real-time malware detection. It’s also good to use a VPN when downloading files — a VPN hides your actual IP and prevents your internet service provider from monitoring your online activity (ExpressVPN is my favorite VPN for torrenting).

How to Best Protect Yourself (& Your Personal Info) Online

Use a variety of passwords. The best way to keep online accounts safe is to use different and complex passwords for each account. Remembering so many different passwords is difficult, so it’s advisable to use a password manager. Read about our favorite password managers here — my personal favorite is 1Password.

How to Best Protect Yourself (& Your Personal Info) Online

Keep your system updated. It’s important to keep your operating system and programs updated as software developers are constantly patching security vulnerabilities. I recommend you set your computer to automatically install updates when they become available. If you don’t keep your device updated, you’re at risk of exploit attacks, which is when hackers can take advantage of a known security weakness.

How to Best Protect Yourself (& Your Personal Info) Online

Don’t be afraid to ask for help! Computer running slowly? Weird email? Incredibly cheap products? Strange notifications? Make sure you have a trusted family member or human to speak with. And some antiviruses like Norton have a remote access tool, which allows tech support operators to get into your computer and solve problems 24/7.

How to Spot Online Scams

How to Best Protect Yourself (& Your Personal Info) Online

Some of the most common online elder fraud scams are:

  • Romance scams. Criminals pose as interested romantic partners on dating websites or social media, and exploit seniors for money.
  • Lottery and charity scams. Hackers appear to represent legitimate charities, lotteries, or sweepstakes and then convince seniors that they have won a contest or persuade them to make a donation.
  • Tech support scams. Criminals claim to be tech support and flag a fake computer or mobile device issue. They offer to solve the problem by using a program to take over a device to gain personal information.
  • Grandchild scam. Criminals pose as grandchildren who ask for financial assistance.
  • Government impersonation scam. Criminals claim to be government employees and demand payment or personal information regarding taxes, social security, pensions, etc.

How to Best Protect Yourself (& Your Personal Info) Online

Most of the time, online scammers will be very insistent and demand that you act quickly, whether it’s giving them access to your device, giving them personal information, or sending them money. It’s important that you resist the pressure to act out of urgency and take the time to assess the situation properly. Here’s a few techniques you can use to determine if you’re communicating with a legitimate person or a scammer:

  • Don’t click on links and don’t download anything. If you’re even slightly suspicious about the communications you’re receiving, don’t follow any links or download any files.  Unsafe links and files can steal your data, damage your devices, and much more. Good internet security software like Norton can block unsafe links and suspicious downloads in real time.
  • Go to the source. Google the charity, lottery, tech department, or even government office potentially being impersonated. You can usually contact these organizations via phone or email and verify if you’re being contacted by a scammer or an honest person.
  • Ask yourself clarifying questions. Ask yourself, “Why would a tech support person need you to download a file? Or, “How did you win a sweepstake that you never entered in the first place?” By asking yourself these types of questions, it will likely expose whether the message is from a legitimate source or not.
  • Use Google. Most scammers aren’t very creative. There’s a good chance the scam being run on you has been used before — copy-paste text from an email, or just type in a few words describing your situation, followed by the word “scam”, and see if the same scam has been attempted on other people.

Scammers reach out to users via phone call, text message, email, and even plain-old snail mail. But one of the most common and dangerous techniques is called phishing.

Phishing

How to Best Protect Yourself (& Your Personal Info) Online

Phishing is the act of creating fake websites, phone numbers, or email addresses that mimic legitimate sources for the purpose of getting information, stealing money, or deploying malicious programs on user devices.

The first major phishing attacks occurred in 1996, when a hacker program called AOHell was released. AOHell had the ability to send out fake mass emails to America Online users, which essentially said, “this is AOL customer support, please reply to this email with your username and password to verify your account”. Similar to a weekend fishing trip, these attacks sent out thousands of lines but only succeeded in catching a few victims willing to provide their account information. Thus, phishing was born.

Nowadays, millions of phishing messages are sent every day via email, social media, or text message (known as ‘smishing’). These messages may inform you that you have money waiting for you, ask you to fill out a survey, or may even trick you into reimbursing a government or financial institution.

How to Best Protect Yourself (& Your Personal Info) Online

How to Best Protect Yourself (& Your Personal Info) Online

Identifying phishing attacks can be tricky, as phishing messages can look very official and will often link to websites that are pretty convincing copies of legitimate sites. Banking websites and online retailers are very commonly imitated for phishing attacks.

How to Best Protect Yourself (& Your Personal Info) Online

Most of my tips for spotting the online scams above will work to help you identify phishing sites, but here are some specific tips to help you if you feel like you may be the target of a phishing attack:

  • Don’t click on links. Phishing messages and smishing messages frequently contain links that can lead you to unsafe sites.
  • Check the email address and not just the sender name. It’s really easy to deceive someone with a fake sender name when sending emails. When this happens, the sender name may be familiar, but the email address doesn’t match the sender name.
  • Look for typos. Phishing attacks frequently use similar spellings as the brands they are trying to spoof, for example “amazn.com”, or “support@micr0soft.com” to fool users.
  • Use Google. Look up the organization being imitated on Google, and compare the legitimate website to the potential phishing site.

Phishing pop-up ads that appear while you’re browsing the internet are also very common. Some ads will ask you to claim a prize, or you may even receive a fake notification from Microsoft or Apple claiming something is wrong with your device. It’s best to not click on any pop-up ads that appear on your screen and simply click on the X in the corner to close the window — legitimate Windows notifications don’t pop up in the middle of your browser screen.

Don’t assume that only strangers can send you phishing messages. Real accounts can be hacked and it’s possible to receive phishing messages from your friends. Look out for impersonal, vague, or out of character language in the message. And if you do receive a message or email from a friend asking you to click on a link, follow the steps above to try and determine if you’re being phished. Also, if possible, simply reach out to your friend with a phone call or text to determine if they sent you the message.

How to Respond to Identity Theft

How to Best Protect Yourself (& Your Personal Info) Online

Identity theft can be glaringly obvious — for example, if somebody starts spending all of your money or maxing out your credit cards. But some identity theft is a lot more subtle, with small purchases or loans being taken out without victims ever noticing.

So, what should you do if you’ve already been attacked, and cyber criminals have gained access to your accounts? Of course, the first step is to notify all of the relevant financial institutions and cancel your credit cards so that criminals can’t continue spending your money! However, if you’ve been extensively hacked, scammers will still be able to access your accounts and steal any new card numbers or account information as long as your device is compromised.

The good news is you don’t need to throw your computer out the window! You need to close up all of the backdoors in your system, but this could be challenging for advanced and inexperienced users. So, I highly recommend you use a professional identity theft protection service to assist you with this process.

Norton LifeLock’s identity theft protection is the safest choice for anyone in the US. It includes insurance against identity theft losses and live phone assistance with making the necessary changes to compromised accounts. LifeLock tech support staff can even use remote access tools to log into your computer and remove any malware that hackers may have installed on your device.

Users in Canada and the EU can use McAfee’s identity theft protections, which use international credit bureaus to monitor and detect fraudulent use of your accounts.

If you’re outside of these nations, I suggest that you quickly follow the steps below and also seek help from your bank or financial institution.

  • Notify your bank. Your bank will immediately freeze your accounts, preventing any further losses, and it will also begin the process of reimbursement for the funds stolen from your account.
  • Run an antivirus scan. It will detect and remove any surveillance malware from your device that could be used to steal future financial information and prolong the identity theft attack. Make sure you’re using a reputable antivirus program like Norton or Bitdefender.
  • Change your passwords. Once your system is free of malware, change your passwords. I recommend using a high-quality password manager for this process, like 1Password.
  • Bookmark this article. Make sure you refer to this article to prevent falling victim to future attacks, and for knowing what steps to take in the event you become a victim to cybercrime.

Identity theft attacks can occur when users fall victim to a scam, or without any user error — like when a user’s information is leaked in a data breach.

Data Breaches

Data breaches occur when a hacker breaks into a company’s servers, steals the company’s data, and publishes the private data stored by that company — this information can include millions of usernames, passwords, personal information, and even financial information. Sometimes, the data from these breaches is exposed publicly, with everyone on the internet simultaneously gaining access to this information, while others breaches are secretive, with the information being shared among hackers in the dark web for weeks or months until the breach is discovered.

Breaching major corporations is seen as an accomplishment for hackers. There’s constant competition among hackers to take down the biggest targets, with little regard for the real-world consequences experienced by everyday people whose information will wind up all over the web.

Data breaches are becoming increasingly common: in 2013, Yahoo was hacked and 3 billion records were exposed. In 2021, information from 530 million Facebook users got publicly leaked. Financial institutions aren’t immune either — in 2019, 885 million First American records were breached, exposing bank transactions, social security numbers, and more.

So, data breaches are scary, but what can you do about them? There’s nothing an average user can do to prevent Facebook from getting hacked, but there’s a lot you can do to keep yourself safe in the event that your information has been breached:

  • Use unique passwords. If you have a different password for each of your online accounts, then a data breach won’t result in a devastating privacy violation when hackers get their hands on one of your account passwords. If you have the same password for most of your accounts, hackers can use that password for multiple sites to gain access to your accounts.
  • Change your passwords regularly. Many breaches go unreported for months before being found, so it’s smart to be proactive and constantly change your passwords. It’s quick and easy to update your passwords with a password generator — most password managers like 1Password have excellent password generators.
  • Use a breach monitoring tool. You can manually enter your emails and usernames into haveibeenpwned.com, which is a massive public registry of all of the publicly available breached account information. Norton also includes a built-in data breach monitoring tool with its 360 package. Many password managers like Dashlane also have data breach monitoring and alert you if your email was involved in a breach.

The vast majority of privacy experts online recommend using a password manager to create, store, and automatically fill complex and randomly generated passwords. I’ll tell you all about password managers in the next section, but I’ll tell you now that 1Password is my favorite password manager for security, price, and ease of use.

How to Keep Your Passwords & Online Accounts Secure

How to Best Protect Yourself (& Your Personal Info) Online

Password security is incredibly important, and it can actually be pretty easy to maintain good password hygiene with the right tools. Simple passwords like birthdays or your pet’s name and a zip code can be cracked by hackers in under a minute. And if you use the same password for every account, once that password is found, all of your accounts are compromised.

Having a password manager is a great tool to keep you safe online. Password managers work for Windows, macOS, iOS, and Android devices — they generate unique passwords, they store all of your passwords in one securely encrypted vault, and they can automatically fill passwords, addresses, financial information, and more with a single click.

For example, I use 1Password on my PC, smartphone, and Samsung Galaxy tablet. Whenever I open my browser on my PC, I log into 1Password using my master password, which is a secure password that only I know (it’s not stored on 1Password’s servers anywhere). Once I’m logged into my password vault, 1Password’s logo pops up in any login field whenever it sees a website it recognizes — I simply tap the logo and watch my username and password fill in automatically. When I’m creating a new account, the same thing happens except that when I tap the 1Password logo, it brings up a secure password generator, which automatically creates a unique password and saves that password in my vault.

All of these passwords are synced in real-time across all of my devices, and I can even log into 1Password on most of my devices with a quick fingerprint scan. I don’t have to worry about memorizing passwords, losing passwords, or having my passwords cracked by hackers — 1Password does all the work for me and uses advanced technology to prevent criminals from accessing my account.

Here are the most important features to consider when looking for a password manager:

  • Secure encryption. By encrypting your data, password managers ensure that there is no way for your information to be stolen in a data breach. 256-bit AES encryption is the industry standard, but some apps use 128-bit AES or XChaCha20, which are also good.
  • Two-factor authentication (2FA). A required second step to log into an account after entering your password. This could be a temporary one-time password, a USB token, or a notification sent to your phone.
  • Password auditing. Flags weak and repeated passwords in your vault so you know exactly which passwords you need to change in order to stay safe online.
  • Data breach monitoring. Automatically notifies you if any of your saved logins have been breached.
  • Biometric login. Log into your password manager using a fingerprint or face scan.
  • Secure password sharing. If you’d like to share your password with your partner/spouse or trusted caregiver/family member, a good password manager can help you share logins securely rather than sending your password through a text message or email.

Check our list of the best password managers in 2024 to learn more.

How to Use Emails Safely

How to Best Protect Yourself (& Your Personal Info) Online

To begin with, always check the sender’s email address to make sure it’s coming from a legitimate source. Look out for addresses that look similar to a known brand but with slight variations (for instance, @costco-special-offers.com rather than @costco.com). And always be wary of clicking on any links promising you cheap products or asking you to fill out a random survey to receive free services. Your friends can also be hacked — you should be very suspicious of any downloads or links that your friends send you. Always confirm with them directly through a trusted medium (e.g. telephone) that they sent you a file or link.

If you think the email is a scam, place the email in your spam folder (or report it as an unsafe email). If you’re given the option to block the sender, do that, too! Your email provider will remember this and prevent messages from that email showing up in your inbox.

Because your email will have a lot of personal details, it’s important to keep the login details secure. The best way to do this is with a password manager, which will generate a complex password for your email account, securely store the password, and automatically fill it in when you log in.

I also recommend users enable two-factor authentication (2FA) with their email login, which requires users to enter a second form of authentication in addition to their password when they log in. Gmail offers 2FA compatibility — so when I log into my Gmail account, I have to enter my password and also a one-time code that is generated by my password manager. This means that even if my email password is stolen, my account can’t be broken into (except in the unlikely event that a hacker gains access to my password manager).

How to Protect Your Privacy and Stay Safe on Facebook

How to Best Protect Yourself (& Your Personal Info) Online

All of your activity on Facebook is being tracked, analyzed, and sold to advertisers and businesses, but all of your browsing outside of Facebook is also being logged.

Staying Safe on Facebook

Cyber criminals are also able to take advantage of Facebook users by creating fake Facebook accounts and exploiting unaware individuals. If you receive any unsolicited communication or interaction from someone you don’t know on Facebook, whether it’s a message or a friend request, consider the following:

  • The profile picture. Is there a picture that looks unique and confirms their identity, or are they using what looks like a random stock photo?
  • Personal details. Check out how much information they’ve provided about themselves on their profile. Typically real profiles will have some personal details, while a cyber criminal won’t have any work history, family members, or life events listed.
  • Followers/Friends. Look at how many friends/followers they have and if they’re interacting with them. A real person on social media will usually have a few friends or family interacting with them. A criminal will have very few or zero comments or posts from friends on their Timeline.
  • Mutual friends. If you don’t have any mutual friends with someone, and you don’t recognize them, it’s probably a spam account.

In general, it’s not a good idea to respond to or engage with messages from people you don’t know. Criminals send out messages in the hopes of luring seniors to give up financial or personal information.

One of the easiest things to steal is a Facebook user’s account information. Once a user has been tricked into giving up their Facebook information, hackers will use the victim’s profile to spam friends with more junk links and surveys designed to steal more user data.

You’ve probably already seen what it looks like when Facebook accounts get hacked — users start posting and sending messages about sales, surveys, or job opportunities that are clearly generic or copy-pasted. If you try to message them back for more details, you don’t get any response! That’s because your friend’s account is now being run by a spam bot, which sends out automated messages in the hopes of hacking more users.

If you receive a strange message, delete the message. Then contact your friend immediately via a different communication method (phone call, email, text, or by informing a loved one with access to your friend) and confirm that they sent you the message. If they didn’t send you the message, they will know their account has been hacked. Also, if your friends inform you that they’ve received a suspicious looking message from you and you didn’t send it to them, you’ve probably been hacked. If this happens, immediately change your password. Then go to www.facebook.com/hacked and follow the steps there to secure your account ASAP.

How to Use Online Banking & Online Shopping Safely

How to Use Online Banking & Online Shopping Safely

Banking and shopping online through legitimate channels is very secure, but there are a few common mistakes that can cost you a lot of money.

Here are some tips to stay safe when you’re banking or shopping online.

How to Stay Safe When Banking Online

How to Use Online Banking & Online Shopping Safely

First, make sure you’re using your bank’s official website or mobile app. You can locate your bank’s website on the back of your debit or credit card, or on a piece of official correspondence sent from them (e.g. your monthly statement). Most larger banks have official mobile apps that you can download from the Apple App Store on your iOS device or Google Play Store on your Android device.

Setting up your online bank account will require you to have access to your routing number and account number. You will also need to use a strong password that is unique to that account. Don’t include any personal information in the password itself (for example, your birth date or name) and never share your full password with anyone. As I’ve mentioned above, a password manager is the best way to keep you protected — check out our favorite password managers.

If possible, don’t log into your online banking on a public network (like a coffee shop or a library) — only use a secure Wi-Fi network (like your home network) to access the account. By using an unsecure network, you may be vulnerable to hackers accessing your personal information. If you’re using a public computer, always make sure to log out of your online banking session when you’re done! The best way to keep your public internet use secure is to install a VPN on your device, which will encrypt all of your data with unbreakable 256-bit AES encryption (I think ExpressVPN is the best VPN on the market in 2024).

Another major threat for users accessing banking information online is keylogging. Keylogging is a dangerous type of malware that allows cyber criminals the ability to record everything that you type into your keyboard (even on mobile touch keyboards). Keyloggers can be particularly alarming when you’re typing in your bank account or credit card number into your bank’s website. Some hackers will even use the screen capture tools on your devices to record your on-screen activity and steal data that way (this is a process known as screenlogging).

The best way to combat keylogging and screenlogging is to use a good antivirus that can detect this type of malware (again, my top choice is Norton).

How to Stay Safe When Shopping Online

How to Use Online Banking & Online Shopping Safely

When shopping online, take the following safety precautions to purchase items securely:

  • Don’t click on ads. If you see a nice deal on a third-party website, don’t click on the deal. Instead, go directly to the company’s website to ensure that the offer is legitimate.
  • Use an online payment company account. Where possible, instead of entering your credit card information into a shop’s website, use a digital payment company like PayPal or Venmo as a middle man. By using a third party payment service like PayPal, you avoid giving your credit card information directly to the merchant.
  • Stick with trusted brands. Instead of shopping on an unknown website for a good deal, stick with brands and retailers you’ve used before or that have a good reputation.
  • Read reviews. If you’re unsure whether an online retailer is legitimate, read the reviews of the retailer online and decide for yourself if the website can be trusted — be wary if there aren’t any bad reviews, as this usually means a vendor is scrubbing their reviews to hide misconduct. Also check the site URL in Google’s Transparency Report to confirm that the site is safe to access.

How to Protect Your Privacy Online

How to Protect Your Privacy Online

Most websites use trackers on their webpages to gather data about what users are clicking on, how long they spend on certain pages, and much more. This data helps companies make their websites better for users and more profitable for businesses. The big problem is that many of these trackers continue monitoring you after you leave a website — many Facebook users are shocked to find out that Facebook is actually recording every website they click on.

This web tracking has become a pretty annoying part of the internet, and for many users it raises the important issue of online privacy and the consequences of what happens when it’s invaded. Even if you don’t mind that Facebook’s advertisers may be able to find out that you have a medical condition before you do (by tracking your searches and browsing history), there can also be security consequences if a substantial amount of your tracked data is released in a data breach.

An effective and easy way to protect yourself from these trackers is to download an ad-blocker and cookie/tracker blocker. Avira’s Browser Safety extension is my personal favorite — it’s free and available for Opera, Chrome, and Firefox. Another effective option is to install a virtual private network (VPN) on your device. VPNs mask your internet protocol (IP) address and can hide your online activity from hackers and trackers. Many VPNs come with ad-blockers and cookie/tracker blockers as well. Private Internet Access has a really good ad/tracker blocker.

If you’re a Google Chrome user, you’re vulnerable to a new advanced method of tracking called FLoC — short for “federated learning of cohorts”. FLoC was designed to be less invasive, but unfortunately, it’s still a disaster for online privacy. There’s currently no way to opt out of FLoC on Chrome. The best way to avoid FLoC is to use a more secure browser, like Firefox, and start using a privacy-oriented search engine like DuckDuckGo instead of Google. To see if FLoC is being used on your browser, you can use our FLoC Checker Tool.

How to Prevent Malware & Viruses from Infecting Your Device

How to Prevent Malware & Viruses from Infecting Your Device

Malware is an umbrella term to encompass any program or code that is harmful to a computer system. Malware attacks can range from devastating attacks to minor nuisances, and many types of malware can infect your device without you ever noticing that you’ve been compromised.

Here are some of the most common types of malware:

  • Virus. A malicious program that repeatedly copies itself, taking up space on your hard drive and causing your computer to crash.
  • Trojan. Pretends to be a legitimate file to gain unauthorized access to your device in order to steal data, install other malware, or even give hackers remote access to your computer.
  • Spyware. Allows hackers to quite literally spy on your computer and track your browsing history online.
  • Adware. Clutters your desktop with pop-up ads, inserts unwanted results in your search bar, and even redirects your browser while you’re online.
  • Ransomware. Encrypts and locks your device unless you pay a ransom to recover your account.
  • Rootkit. Gains extremely deep access to your system, allowing it to hide from antivirus scanners and make changes to the operating system and other essential components.
  • Cryptojacker. Uses your computer as part of a larger network to mine cryptocurrency. This can put a ton of strain on your computer, causing slowdown, crashing, and even permanent damage to your hard drive.

To protect yourself against these types of malware and others, it’s important to use safe practices when browsing online. For instance, don’t download email attachments from people you don’t know, don’t download files from untrustworthy websites, and of course, download a good antivirus program.

Diagnosing and removing malware manually is an extremely complicated and time-consuming task — and you can actually do significant harm to your device while trying to remove malware. If your computer is running slowly, you’re seeing strange pop-ups, or you’ve been navigating to unsafe websites, you need to run an antivirus scan.

Antiviruses offer on-demand malware scanning to remove existing malware on your computer, and they also provide real-time threat detection to block malware files before your system is compromised. Norton is my favorite overall antivirus, but TotalAV is also a great option, especially for beginners looking for an exceptionally easy-to-use program with a decent free version.

Check out our list of the 10 best antivirus software in 2024 to decide which antivirus program is best for you.

How to Stay Safe on Your Smartphone & Tablet

How to Stay Safe on Your Smartphone & Tablet

Smartphones are basically pocket computers, so all of the threats we’ve discussed above also apply to Android devices, iPhones, iPads, and even smart watches. I’ll quickly cover a few mobile-specific threats in this section, though.

Mobile Malware

Apple’s iOS products can’t get most traditional malware files — it’s part of the super-strict design and protocols involved with developing apps for Apple’s App Store. The best way to stay safe on iOS is to make sure you keep your device updated.

However, Android devices can get infected with ransomware, spyware, trojans, and a variety of dangerous malware files. In fact, the supposedly secure Google Play Store is one of the most common sources of Android-based malware.

There are some great Android security apps that can analyze all of the apps and files on your device to determine if you have malware running — Norton’s mobile security app is really good.

Privacy-Invading Apps & Fleeceware

A lot of apps may not qualify as malware, but they are designed to steal your information and trick you into overpaying for them. The practice of using apps to gain access to a user device and steal data is known as permission abuse.

Many apps on the Google Play Store and the Apple App Store ask for a lot of permissions to run on your phone. You should always be skeptical of these kinds of requests, because permission abuse is a huge problem with mobile apps — they steal browsing data, track your location, monitor your app usage, and more, all in an effort to harvest data and sell it online. You should only download apps that you feel 100% comfortable with.

You should also be on the lookout for fleeceware applications. These apps advertise amazing results and free trial periods, but they’re actually extremely basic, and they include ridiculously overpriced subscription plans. For example, one fleeceware app claims to do accurate palm readings — it comes with a 3-day trial, and then charges users $50 a week after that! There are fleeceware astrology apps, photo editors, calculator apps, and so many more. Recent studies have shown thousands of fleeceware apps in both Apple’s App Store and the Google Play Store.

Public Wi-Fi Networks

Hackers can use public Wi-Fi to invade your devices. If you connect to public Wi-Fi, you should always make sure that you’re connecting to the correct network (ask an employee at the library, coffee shop, etc. what the network is called) and don’t navigate to banking sites or enter any financial information online.

Many mobile security apps include Wi-Fi scanners, and many of the top VPNs on the market are a great tool to protect your data on public networks — they can flag unsafe Wi-Fi networks and also encrypt your traffic and protect your privacy while you’re browsing on a public Wi-Fi network.

Smishing

Smishing is a type of phishing attack that targets SMS users (SMS is better known as text messaging). These seemingly urgent messages will try and induce users to click a link by threatening victims with legal action or promising them rewards. The last few years have seen an incredible rise in the number of smishing attacks. You should never follow a link in a text message from an unknown phone number. And always follow up through legitimate channels if you think you’re being contacted by an untrusted source.

Most smishing messages will be pretty easy to figure out. They often say things like, “Your Amazon delivery is here, click this link to verify Vn78jy.azn”. Be wary of text messages — follow my steps above for phishing messages and get a mobile security app like Bitdefender with real-time web protections that can block phishing links before you open them.

Staying Safe

To reduce security risks, ensure you only download apps from authorized app stores — for Apple it’s the Apple App Store, and for Android it’s Google Play. Most importantly though, install an antivirus security app onto your device.

Some good features to look out for in mobile antivirus programs are:

  • Real-time malware protection.
  • App privacy detection.
  • Wi-Fi monitoring.
  • Parental controls.
  • Anti-phishing protection.
  • VPN.
  • Anti-theft protection.

Norton is my favorite internet security app for iOS and Android, but you can check out our top mobile antivirus guides for iOS and Android and decide for yourself.

Bottom Line

Bottom Line

While you can’t stop cybercrime, you can take many precautions to avoid becoming a target and greatly reduce your chances of becoming a victim. Keep in mind some of the key ways to stay safe online:

  • Download an antivirus program. Install a good antivirus on your computer and mobile device to protect yourself from malicious threats online. Norton is a great option.
  • Don’t click on pop-ups or suspicious looking links. Whether it’s an ad or a link from an unknown sender, it’s not worth the risk of infecting your device or compromising your personal information. Delete the message and close the pop-up.
  • Get a good password manager. To enhance your online safety, you should use a password manager. It’s essential to protect your accounts with strong and unique passwords, and password generators can assist in creating these, as well as storing them and auto-filling them for you. 1Password is my top pick.
  • Make sure to regularly update your system. It’s crucial to pay attention to update notifications and promptly install the latest updates. These updates often include important security patches that address new vulnerabilities and protect you from potential exploit attacks.
  • Ask a tech-savvy friend. A close friend, relative, and even a neighbor that knows their way around should be able to help in case of a suspected online attack. Don’t be afraid to ask for help!
  • Use common sense and be critical. If it’s too good to be true, it probably is. Before you download a file or click on a link, consider if the website or source is trustworthy.
  • Download a VPN. A good VPN can greatly enhance your privacy online, especially while you’re using public Wi-Fi. ExpressVPN is my favorite all-around VPN, and you can learn more about VPNs here.

Frequently Asked Questions

How can I keep myself safe from online threats?

The best way is to use common sense when browsing online, install an antivirus program, and use a password manager and a VPN.

Common sense means: Don’t follow links from suspicious sources, be mistrustful of messages or websites that ask for personal information, and reach out to a more knowledgeable person if you’re feeling unsafe online.

An antivirus suite like Norton is easy to use and will offer you advanced protection against malware, phishing threats, and so many other forms of cyberattacks.

A good password manager is a great tool — it creates virtually unbreakable passwords for each of your accounts online and stores all of your passwords in an encrypted vault so you will never forget your passwords (1Password is my favorite password manager).

A VPN hides your actual IP address from hackers, masks all of your online activity, including the websites you visit and the files you download, and protects all of your data with military-grade encryption. ExpressVPN is the best VPN on the market in 2024.

What are the best ways to keep my financial information safe when online shopping?

You should never click on ads, use a third-payment service like PayPal, routinely monitor your bank accounts, and only visit trusted websites to keep your financial information safe.

Ads on social media, pop-up ads, and even sponsored posts on the top of Google searches can frequently take you to unsafe or sketchy websites. It’s best to simply go to the website of the vendor you’re searching for than to try and navigate there using ads. Many antivirus suites like Norton also include web shields that can block unsafe websites.

Online payment services like PayPal and Venmo add an extra layer of protection — you won’t give your credit card number directly to a merchant. Further, only shop on trustworthy websites — ones you’ve purchased from before or are highly rated. You can look for user reviews on Google or even Reddit to get a better idea about an online vendor’s quality.

And make sure to keep on top of the transactions in your bank accounts (you could even consider contacting your bank and activating transaction notifications for your accounts). Report any unauthorized activity to your bank as soon as you can, and follow my tips above to stay safe if you think your identity has been stolen.

It’s advisable to use a password manager to secure accounts you make on retailer websites. Create strong, unique passwords and store them safely. There are many great password managers to choose from — my top pick is 1Password.

How do I protect my privacy online?

The best way to protect your privacy is to prevent trackers from monitoring your online activity with an ad-blocker and cookie/tracker blocker. By installing a blocker to your browser, you will prevent websites from recording your activity and selling it to third-parties. Avira’s Browser Safety extension is my personal favorite — it’s free and available for Opera, Chrome, and Firefox.

Many VPNs also come with built-in tracker blocking tools, and they encrypt your internet connection to make it harder for hackers and big businesses to track you online. Private Internet Access is an excellent VPN with tracker-blocking capabilities.

For Chrome users, FLoC (federated learning of cohorts) is a new method of tracking online activity. We have prepared a guide about FLoC to inform users and provide protection advice.

What can caretakers do to help seniors stay safe online?

You can assist a senior to stay safe online by helping them install easy-to-use programs and online tools to protect their internet activity.

In addition to referring to this article to get a better idea of the risks facing seniors online today, it’s also a good idea to purchase a top antivirus (Norton), password manager (1Password), and VPN (ExpressVPN).

Moreover, answer any questions or concerns they may have and keep a close eye on their social media accounts and banking activity to help keep your loved ones safe online.

Important: SafetyDetectives owns the content and visuals in this article. We encourage you to share our content and visuals, provided you include a mention of SafetyDetectives with a link to the original article as the source. We appreciate your help in protecting our copyrights and enabling us to continue providing accurate and valuable information about cybersecurity.
RELATED ARTICLES

Most Popular

Recent Comments