Internet security.


Because malware becomes abundant, the Internet, more than just a web sphere, has become an environment where all forms of cyberattacks intermingle.

It is therefore essential for the user to cope with all these attacks, to guard against a few safeties rules, which are:


  1. Always use a private browsing tab.


As the main gateway to the Internet, your browser needs to be configured to address all forms of threats on time. Besides this, it does not save the browsing history the user can browse without the worry of traceability.


  1. Installation of anti-spyware.


Industrial espionage is an issue that should concern any self-respecting company. Nowadays, spywares are present more than ever, and the average user does not escape their invasion.


This software comes in several forms:

  • Key-loggers that record keystrokes while sending a user activity report to the hacker. Keyboard activity can include entering passwords, which represents extreme risks.
  • Trojan Horse, which is a program incorporated in other programs without the user’s knowledge.
  • Backdoor is a program that creates a system flaw on the host machine (infected machine), allowing the hacker to control it.
  1. Using a password management tool online.

What’s more interesting than centralizing all your passwords in a vault protected by a master password? Indeed, the retention of many passwords can be binding.

It becomes interesting to entrust the management of your passwords to a password management tool such as KeePass. This latter makes a correspondence between the username and password that you recorded on the website. That said, even if you forgot your password, the management tool will reveal it to you.

  1. The use of a complicated password.

To detect a password, hackers use a technique known as “brute force attack”, which comprises using multiple passwords by permuting characters or using a dictionary that has the most used passwords.

So, the method is based on trial and error and can be accomplished with software that can test thousands of passwords in a very short time.

To make the task very difficult and impossible, you must use a complicated password that includes capital letters, lowercase letters, numbers, and special characters if possible.

Also, opt for a sufficient length of at least 8 characters. As long as the password becomes difficult to crack-able.

A hacker who tries to guess a complicated password may give up after a few days or even hours because it will require astronomical resources in terms of time, equipment and electricity before being able to crack the password.

  1. Make a regular update of your antivirus.

New threats appear every day and this represents a real problem for antivirus software.

For maximum effectiveness, they must have their virus database up-to-date, thus keeping them abreast of new threats.

The virus database includes virus signatures that allow antivirus to detect and identify viruses. Antivirus labs are continually discovering new viruses and therefore adding their signatures or if you want their fingerprints to identify them and that are available for download as updates.

  1. Avoid public Internet access points.

Public Internet access points, such as a Wi-Fi network in a coffee shop, can pose potential risks of insecurity because they allow malicious people to collect your sensitive data once connected.

For added security, it is best to connect to a personal Wi-Fi protected by password, otherwise, if you are forced to use a public access point, you need to install a VPN to protect yourself.

  1. Avoid opening suspicious emails.

Phishing is a very popular technique! It consists of sending a tampered email to encourage the user to provide his confidential data. It can also consist of dragging into a seemingly healthy file a self-propagating spoof code that will run on the host machine once the user clicks on it.

To avoid these kinds of attacks, it is better not to open a file whose origin is not known or has a suspicious appearance.

  1. Avoid downloading torrent files.

Real virus repositories, torrents download sites represent a real vector of viruses. Given the fact that they host files quite tempting, they are very often solicited. For better security, avoid downloading on such sites and instead favor sites that are deemed reliable.

  1. Regularly update your system and web browser.

To protect yourself and your loved ones against threats of any kind, make sure the entire system is up-to-date. This includes, in addition to antivirus, all other software, utilities, drivers and even operating system.

Indeed, most viruses take advantage of the bugs in these programs to spread and do more damage.

  1. Install and configure a firewall.

A firewall is one of the most important programs in your computer system because it regulates communication between the internal and external networks, thus preventing potential threats.

  1. Use two-factor authentication for sites that offer this feature.

Indeed, once the authenticated user, a secondary code is sent to him generally by SMS or email that he will have, in addition to his username and password, insert to access his account.

Two-step authentication can also be done with mobile applications (Google Authenticator, Microsoft Authenticator, etc.) that generate codes for use in the second step of the authentication process. This method is better than an SMS and is becoming more and more used and recommended.

Why two-step authentication is more secure?

Indeed, to access your account, a hacker must have, in addition to your identifiers, your mobile to receive the SMS code or the code generated by a mobile application, which is not obvious.

  1. Use a WPA2 key.

Cracking a Wi-Fi network can be a child’s play especially if it uses a WEP security key. Indeed, this key is not effective because its encryption algorithm is not complicated. For added security, you need to use a WPA2 key that proves to be a better alternative.


Since security is never 100% guaranteed, it is up to the Internet user to set up a rather restrictive security policy to filter out the possible threats as much as possible. The latter will also learn about new threats and inquire ways to counter them.