Cybersecurity can be a complicated topic, but it’s a necessary one. Contrary to popular belief, you don’t need to hire a professional or be a tech whiz to protect your PC from hackers. In reality, simple steps that take just 5-10 minutes to implement can offer all the practical protection most users need.

1Install a Password Manager

Ideally, each of your passwords should be long, complex, and unique to each account. This approach makes them difficult to crack and limits damage if one account is compromised.

However, this can quickly become a problem when you need to keep track of dozens, if not hundreds, of complex passwords. For context, I have 300 user accounts on different websites, all with unique passwords that are 20-character long random alphanumeric strings.

Bitwarden extension with 300 login credentials

To help keep all this organized, we have password managers—tools that auto-generate and securely store unique passwords for all your digital accounts. Each time you access an account, the password manager will fill out your username and password.

You only need to remember one master password, and the manager takes care of the rest. You just need to be sure tocreate the most secure master passwordyou can.

Authenticator apps on phone

I personally useBitwardenas my password manager of choice, but there areother options available. Overall, this should be the first, most basic step you take to improve your cybersecurity. It’s quick to set up and extremely useful in protecting your online presence.

2Enable Two-Factor Authentication

While protecting your accounts with strong passwords is crucial, you should also be aware that as technology progresses, these passwords will become easier andeasier to crack.

As such, to add an extra layer of protection, you shouldenable two-factor authentication (2FA)on all your accounts that support it. This ensures that even if someone cracks your password, they still can’t get in without an additional authentication code.

The Yubico Yubikey 5CI laying on a notebook

Typically, 2FA involves receiving a code via SMS or an authenticator app. While SMS is better than nothing, I’d recommend using an authenticator app like Google Authenticator or Authy for added security. It takes just a few minutes to set up, and it’s one of the most effective ways to protect your accounts.

Use Hardware Security Keys

If you want to take your 2FA game to the next level, consider usinghardware security keys, otherwise known as USB security keys. These are physical devices that you plug into your computer or phone to verify your identity. They’re incredibly secure and virtually impossible to hack remotely.

YubiKeys are the gold standard here, and I’d personally recommend theYubico YubiKey 5 NFC, as that’s the one I use myself. That said, there areother options available on the marketthat you can look into and pick the one that best suits your needs and requirements.

Windows 11 Updated

3Regularly Update Your Apps and Operating System

All of our apps and even the operating systems we use have bugs and vulnerabilities—it’s just the world we live in. Developers are constantly searching for these weak points and releasing updates with bug fixes to prevent hackers from exploiting these vulnerabilities.

As such, it’s crucial that you routinely update your apps and operating system (OS) to access all the latest security patches. Ideally, automatic updates are the most convenient option, but it can sometimes be a problem, especially if an app or the OS decides to update itself in the middle of your work.

A lock in a circuit type structure representing encryption

If you find automatic updates problematic, you can manually update your apps. Windows users candisable automatic updatesand switch to manual updates.

However you do it, automatically or manually, remember to regularly update your system to enhance your cybersecurity.

proton vpn running on phone

4Enable Full-Disk Encryption

This option might not be that useful for desktop PC owners, but it’s a must-have for portable devices like laptops or smartphones. This is because small portable devices have a higher chance of getting stolen. And you don’t want the thief to have access to your personal files, photos, and other sensitive information, do you?

Most modern operating systems offerbuilt-in encryption tools: on Windows, it’s called BitLocker, on macOS, it’s FileVault, and on Linux, you can use LUKS. There are also third-party options, like VeraCrypt, that can be used toencrypt your drives on most major operating systems.

A server room in neon lights

5Use a VPN, Especially When Accessing Public Wi-Fi

If you are someone who uses public Wi-Fi a lot, you shoulddefinitely consider investing in a Virtual Private Network(VPN) to encrypt your internet traffic. Without a VPN, other users (e.g., hackers) on public Wi-Fi can potentially snoop into your online activities and see what you are doing.

6Set Up a Secure DNS Server

Without getting too technical, by default, your internet service provider (ISP) handles all yourDomain Name System (DNS) requests. This means your ISP can see every website you are trying to visit—and potentially, can even sell your browsing data. If you don’t want prying eyes over your internet traffic, you should considerswitching to a more secure DNS server.

I personally useCloudflare 1.1.1.1, which is known for its speed and privacy. Alternatively, you can switch toOpenDNS or Google DNS, both of which are great options.

Robber running away after door alarm goes off

7Enable Login Alerts

Most major online services offer the option to receive alerts when someone logs into your account from a new device or location. When enabled, you’ll get an email notification alerting you that someone just logged into your account, along with some useful information, like the IP address and login device.

You could ignore this email if you (or someone you allowed) logged in. However, if you find the activity suspicious and don’t know who made the login, you may deauthorize the device or IP from your account, and then quickly change your password to protect your account.

Bitwarden Login Attempt Alert

8Take Routine Backups (Consider Cloud Backups Wisely)

One of the major security threats isransomware attacks, where a hacker or virus will lock all data on your system, then threaten to delete everything unless you pay the “ransom”.

While prevention is the best cure—which you’re able to do by avoiding downloading software from suspicious websites and keeping apps and software up to date—you also need to have a backup plan, literally.

A laptop with a USB drive and an external hard drive next to it and a backup icon.

My PC is set to automatically back up all data every week. At a minimum, you should alwayskeep a backup of all your important files.

9Use a Webcam Cover

Webcam hackingis a real thing, and even Mark Zuckerberg covers his webcam. A simple sliding webcam cover is cheap, easy to use, and gives you peace of mind.

If you’re using a desktop, like I am, consider getting a webcam with a built-in privacy shutter. That isn’t an option if you use a laptop with a built-in camera, but you can findplenty of slim, attractive webcam coversthat won’t interfere with closing your laptop.

There you have it—9 quick and easy ways to boost your cybersecurity. None of these steps require advanced technical knowledge, and most can be implemented in just a few minutes. The internet can be a dangerous place, but with these precautions, you’re well on your way to a safer online experience.