Cybersecurity can be a complicated topic, but it’s a necessary one. Contrary to popular belief, you don’t need to hire a professional or be a tech whiz to protect your PC from hackers. In reality, simple steps that take just 5-10 minutes to implement can offer all the practical protection most users need.
1Install a Password Manager
Ideally, each of your passwords should be long, complex, and unique to each account. This approach makes them difficult to crack and limits damage if one account is compromised.
However, this can quickly become a problem when you need to keep track of dozens, if not hundreds, of complex passwords. For context, I have 300 user accounts on different websites, all with unique passwords that are 20-character long random alphanumeric strings.
To help keep all this organized, we have password managers—tools that auto-generate and securely store unique passwords for all your digital accounts. Each time you access an account, the password manager will fill out your username and password.
You only need to remember one master password, and the manager takes care of the rest. You just need to be sure tocreate the most secure master passwordyou can.
I personally useBitwardenas my password manager of choice, but there areother options available. Overall, this should be the first, most basic step you take to improve your cybersecurity. It’s quick to set up and extremely useful in protecting your online presence.
2Enable Two-Factor Authentication
While protecting your accounts with strong passwords is crucial, you should also be aware that as technology progresses, these passwords will become easier andeasier to crack.
As such, to add an extra layer of protection, you shouldenable two-factor authentication (2FA)on all your accounts that support it. This ensures that even if someone cracks your password, they still can’t get in without an additional authentication code.
Typically, 2FA involves receiving a code via SMS or an authenticator app. While SMS is better than nothing, I’d recommend using an authenticator app like Google Authenticator or Authy for added security. It takes just a few minutes to set up, and it’s one of the most effective ways to protect your accounts.
Use Hardware Security Keys
If you want to take your 2FA game to the next level, consider usinghardware security keys, otherwise known as USB security keys. These are physical devices that you plug into your computer or phone to verify your identity. They’re incredibly secure and virtually impossible to hack remotely.
YubiKeys are the gold standard here, and I’d personally recommend theYubico YubiKey 5 NFC, as that’s the one I use myself. That said, there areother options available on the marketthat you can look into and pick the one that best suits your needs and requirements.
3Regularly Update Your Apps and Operating System
All of our apps and even the operating systems we use have bugs and vulnerabilities—it’s just the world we live in. Developers are constantly searching for these weak points and releasing updates with bug fixes to prevent hackers from exploiting these vulnerabilities.
As such, it’s crucial that you routinely update your apps and operating system (OS) to access all the latest security patches. Ideally, automatic updates are the most convenient option, but it can sometimes be a problem, especially if an app or the OS decides to update itself in the middle of your work.
If you find automatic updates problematic, you can manually update your apps. Windows users candisable automatic updatesand switch to manual updates.
However you do it, automatically or manually, remember to regularly update your system to enhance your cybersecurity.
4Enable Full-Disk Encryption
This option might not be that useful for desktop PC owners, but it’s a must-have for portable devices like laptops or smartphones. This is because small portable devices have a higher chance of getting stolen. And you don’t want the thief to have access to your personal files, photos, and other sensitive information, do you?
Most modern operating systems offerbuilt-in encryption tools: on Windows, it’s called BitLocker, on macOS, it’s FileVault, and on Linux, you can use LUKS. There are also third-party options, like VeraCrypt, that can be used toencrypt your drives on most major operating systems.
5Use a VPN, Especially When Accessing Public Wi-Fi
If you are someone who uses public Wi-Fi a lot, you shoulddefinitely consider investing in a Virtual Private Network(VPN) to encrypt your internet traffic. Without a VPN, other users (e.g., hackers) on public Wi-Fi can potentially snoop into your online activities and see what you are doing.
6Set Up a Secure DNS Server
Without getting too technical, by default, your internet service provider (ISP) handles all yourDomain Name System (DNS) requests. This means your ISP can see every website you are trying to visit—and potentially, can even sell your browsing data. If you don’t want prying eyes over your internet traffic, you should considerswitching to a more secure DNS server.
I personally useCloudflare 1.1.1.1, which is known for its speed and privacy. Alternatively, you can switch toOpenDNS or Google DNS, both of which are great options.
7Enable Login Alerts
Most major online services offer the option to receive alerts when someone logs into your account from a new device or location. When enabled, you’ll get an email notification alerting you that someone just logged into your account, along with some useful information, like the IP address and login device.
You could ignore this email if you (or someone you allowed) logged in. However, if you find the activity suspicious and don’t know who made the login, you may deauthorize the device or IP from your account, and then quickly change your password to protect your account.
8Take Routine Backups (Consider Cloud Backups Wisely)
One of the major security threats isransomware attacks, where a hacker or virus will lock all data on your system, then threaten to delete everything unless you pay the “ransom”.
While prevention is the best cure—which you’re able to do by avoiding downloading software from suspicious websites and keeping apps and software up to date—you also need to have a backup plan, literally.
My PC is set to automatically back up all data every week. At a minimum, you should alwayskeep a backup of all your important files.
9Use a Webcam Cover
Webcam hackingis a real thing, and even Mark Zuckerberg covers his webcam. A simple sliding webcam cover is cheap, easy to use, and gives you peace of mind.
If you’re using a desktop, like I am, consider getting a webcam with a built-in privacy shutter. That isn’t an option if you use a laptop with a built-in camera, but you can findplenty of slim, attractive webcam coversthat won’t interfere with closing your laptop.
There you have it—9 quick and easy ways to boost your cybersecurity. None of these steps require advanced technical knowledge, and most can be implemented in just a few minutes. The internet can be a dangerous place, but with these precautions, you’re well on your way to a safer online experience.