Simple rules for working safely on the Internet! You should know it! Basic rules for Internet safety Forum rules for safe use of the Internet.

If you want to increase the security of your online travel, then read the recommendations below, the implementation of which will help you avoid many problems associated with business or simply surfing the Internet.

The main recommendations here are aimed at developing the ability to use passwords. If you are a more or less advanced user of a computer and the Internet (so, at an intermediate level), then you probably have approximately the following list of passwords.

List of typical passwords for any user

To your mailboxes(usually to two or three mailboxes);
-- To accounts social networks (usually two, three...);
-- To Internet messenger accounts(aka Internet pagers), such as ICQ (popularly ICQ), QIP, Miranda, M-Agent, Skype, Yahoo and others (usually everyone has at least a “login/number” account in two or three of them ;
-- To the forums where you communicate(usually a person registers in 2-10 forums), and this is also a login and password for each forum;
-- To mailing services(usually two or three, where you are subscribed to mailing lists and where you can change settings - refuse or subscribe to mailing lists)
-- To affiliate program accounts(from one to dozens or even more) in which you participate as a partner (username/password is also used).
-- To your account in the electronic payment system(as well as passwords to the key file, to the wallet program itself, or to the operation of confirming the withdrawal of funds from the account, as well as the “secret key” itself to the settings of your wallets - if you decide to configure them yourself, for example, for premium payments on your website). Typically, a user registers in two or more payment systems. And rightly so, because it gives more opportunities!
It turns out, on average, about 10-20 logins, and passwords, as a rule, are a third more! But I haven’t listed everything. It is passwords that turn out to be the most vulnerable point in any security system - no one wants to remember 15 complex passwords, so they use their last name, change the keyboard layout (they write in Russian, but on the English layout or vice versa), use the names of children and loved ones as passwords, your mobile phone numbers, pet names, etc. - these are all completely naive and unreliable passwords, especially if they are repeated!

So, here they are very simple and very important recommendations, the importance of which for you will increase in proportion to your income:

attention!
take it as seriously as possible
to the recommendations below!

1. The password exists only for you!

Never, under no circumstances Neither I nor any serious service (or service) will ask you to give any password, for example, a password to access your page affiliate program(to your personal account), to your mailbox, your bank card, etc.! Consider any requests or demands of this kind as the actions of intruders or, at best, “jokers.” Keep in mind that even if the demand came in a letter from supposedly my address or the address of your bank, do not believe it! The fact is that now it is quite easy to change the name and address of the sender of a letter.

The same applies to any email service (mail.ru, new mail, yandex.ru, etc.) - never, none of them, under any circumstances, will ask you to hand over your password (including for supposedly solving problems with your box).

Absolutely the same applies to electronic payment systems and any banks(no matter where they are located): no bank, no payment system will ever send you a letter asking you to send a password, confirm your plastic card number or its PIN code online!!! There is a whole system of phishing (forgery) and other methods of Internet fraud, the purpose of which is to gain access to your passwords from your accounts, credit cards, payment system accounts, etc. For example, you may receive a letter from a “supposedly bank” and following the link in this letter you will find yourself on the website of “supposedly this bank” (which will look exactly the same as the real one), where you will be asked to enter your passwords... That’s all. .. The only thing that can save you is the knowledge that no bank will ever ask you for this. If you doubt anything, call your bank’s support service (at the number you have written down in advance) and ask - they will tell you everything and give you advice. Don't be shy, they work for the people! Now, with the development of Internet banking, this is especially important. In addition, pay attention to the address in address bar browser through which you open websites.

Moreover, increasingly real letters from payment systems or banks any references to anything are excluded(which is usually specially emphasized in such letters - for security purposes). If you receive a letter from a “supposedly bank” or “supposedly a payment system” and they ask you to follow a link, do not do this (this way you can open the way to a special spyware program or virus). Perhaps the only exception is the moment of registration/activation in the payment system, when you really need to follow the link in the letter received in your mailbox to activate the registration. But in this case (!) - you know in advance that such a letter will come to you and you know why it came to you (as a rule, it arrives instantly at the time of registration). Treat any unexpected mail very carefully! You cannot click on links in SPAM email!!! In no case!!! If you are interested in something and decide to follow the link, then it is better to type this link in the address bar of the browser manually (or copy it first into Notepad, and from there into the clipboard and into the address bar of the browser, but not click on it with the mouse (this will protect you from hidden link substitution). Be careful!

2. Store your passwords in a paper notepad or in a special, secure program!

Never (!) do not store passwords in your electronic mailbox(including in the form of a picture) . All passwords, secret keys, answers to security questions, etc. It is safest to store it in a specially designated for this purpose simple paper notepad (exclude access to this notepad for everyone except you). Designate a separate spread of your notebook for each account - indicate your login and password there, and everything you need to regain control of your account, even from scratch. When you change your password to a new one, simply cross out one and enter another.

Do it:

Go to your email inbox and delete all emails containing passwords!First, of course, write down all the necessary passwords in your paper notebook.
-- Search your local computer(at home, at work, ...) and delete all records of passwords and logins for anything.

Special tip:Buy yourself a separate notebook that you will use only for these purposes. And this notebook should easily unfold and remain open! If it is inconvenient, you simply will not use it. A good option- a paper notepad on a wire spiral. Why? Because you will often have to look into it and holding it in your hand will be inconvenient (especially if you use the ten-finger typing method) - your hands should be free. A notebook with stitched pages looks beautiful, but does not stay open. On the contrary, a notebook with a spring folds out easily and you will feel comfortable working with it.

If you use a special program to store passwords, then duplicate the password database to a special flash drive or external storage (which are stored separately from your computer), so that if it breaks down hard drive or the loss of your computer, you have not lost all your passwords, recovering which later will be a very labor-intensive task. At the same time, remember that “there is always strength”, this means that there is always a certain risk if you store passwords on a computer and not in a paper notepad. You can store passwords for forums and social networks in the browser, but I do not recommend storing the password for your email and online banking in the browser.

3. Make all passwords complex!

All passwords, code words, secret keys, etc. always make COMPLEX to your email mailboxes, payment system programs and any other account, i.e. consisting of at least 11 characters, necessarily including numbers and letters of different registers (the ideal option is a random set of letters, numbers and symbols, for example: e & 2m @ k1E #39DJ8we).

4. Change your passwords regularly!

Don't worry about forgetting your password - you will definitely forget it(unless you decide to specifically train your memory in this way), because the password will not only be unmemorable, the main thing is that you will change your passwords every time there will be a suspicion that the passwords could be spied on or stolen, for example, by spyware detected by the antivirus of your computer. If there were no such suspicions (for example, the antivirus did not respond to a single threat during all this time), change the main passwords anyway at least every year.
Change passwords only after updating the antivirus installed on your computer and after it has scanned the entire computer
(this will reduce the risk of your password being leaked due to active malware).
In addition, the number of passwords you use will increase along with the number of forums and other services in which you register to participate. Therefore, forget about making the password “beautiful”, “convenient”, “memorable”, etc. - beautiful and convenient Your password can only be used by an attacker.

Special tip: If you use manual password entry, you can make your life easier by using a small fragment of the password, say 5-7 characters, in all main (i.e. frequently used, not all) passwords, the same for all passwords. Such a code fragment is a certain sequence of symbols that means something only to you and no one else. This sequence of symbols must be remembered and never (!) written down anywhere! Further, when writing down any password in a paper notepad, designate this universal sequence of characters with any one icon (for example, an asterisk - " * "). For you it will be clear what the “asterisk” means, but for others it will not. Thus, even if someone gains access to your notepad, he will not be able to use the main passwords). Naturally, if you yourself forget what it means " asterisk", then you will lose access to your accounts (mailbox, your “personal account” in the affiliate program, etc.), so as a secret sequence of characters, choose something that only you know, but that you will never forget Also, where possible, be sure to set up a password recovery feature for your mobile phone number.

Special tip:This sequence of characters (your secret code word), which you denote by the asterisk symbol, should not be simple and easy to select. The ideal option is something very cleverly coded, but clearly understandable and memorable for you. Example: "pr01EsK".

5. Use mnemonics to remember your most frequently used passwords!

How to remember complex password, which you use often? (For example, for your mailbox and your messenger)

Special tip: Most often, you probably use a password for your mailbox and a password for chat communication using a messenger (ICQ, M-Agent, etc.). It is precisely because of the frequent access to your mailbox that you want to make the password for it simpler or store the password in your browser or email client.
Under no circumstances should you simplify the password for your mailbox!
The fact is that in most services (including affiliate programs, electronic payment systems Webmoney, RBK Money, Z-PAYMENT, etc.), if you have forgotten your password, the support service will send it to your email . Consequently, an attacker can get hold of almost all of your passwords by knowing just one - from your email inbox. Naturally, if you do not want to lose control over your messenger, then make the password complex for it too. The passwords for your ICQ and your mailbox should not match!!! Passwords should never be the same.

However, regarding passwords that you use frequently: You you can use mnemonics and thus, you will easily remember the most complex password for your mailbox or messenger (but still write down your password in notebook to completely prevent its loss). How to remember?

For example, your password might look like this:
*moy1GODvRAYU
* is your secret code word or a sequence of symbols known only to you and not written down anywhere (you can’t forget it), and then you can read it like this: “my first year in paradise” (naturally, you must also remember where which register is for letters you use). From experience I can say that the register is easy to remember, you don’t even have to doubt it.

Another example:
ost125KGdoKMS*
We read: there are 125 kilograms left until the candidate for master of sports and then a secret sequence of symbols instead of an “asterisk”. This example is good for athletes. Let's say in the sum of three competitive movements (bench press, deadlift and squat) you need to perform 505 kg for a weight category of 75 kg, and as soon as the athlete has moved further, he changes the password to his box. Agree, in this situation it is not only easy to remember a complex password, but also pleasant to change it! ;-)

But such a password is not only easy to remember, but also impossible to guess! Consequently, the use of mnemonics allows you to make a password not only complex and, at the same time, memorable, but also unpredictable, which is very important for controlling your mailbox. For all others (programs, forums, etc.) - feel free to type random characters. If you decide for each program, forum, etc. come up with passwords using mnemonics, you will soon begin to avoid the procedure of changing the password itself, because you will spend too much time on it. Therefore, do not deceive yourself - use mnemonics to remember only the most frequently used passwords, and simply write the rest randomly in a notepad - “as you wrote it yourself,” or using a program with a “password generator” function, of which there are many.

6. Enter the password from your address book!

When changing the password, first write it down in your notebook and only then (i.e. from the notebook!) enter it into the input field.This rule eliminates possible errors when entering a password into a notebook. The easiest way to come up with strong password randomly hitting the keys in any text editor, then supplement what you get with letters of different cases and numbers. You can immediately write a random set of characters into a notepad- this becomes a very convenient way, but only after you are able to give up the desire to make all passwords meaningful. However, first of all, write down the password you come up with in your paper notebook, and only then(while looking in a notepad, and in no case copying from the screen) type it in the required input field. This way you will avoid possible errors with entering a password, and even more so, you will insure yourself against immediately forgetting the entered password (which, oddly enough, happens to people very often).

7. When working from someone else's or public computer, delete the history!

What if you were forced to log into your account from someone else’s computer?, then before entering your username and password, disable the function of saving personal information in the browser you are using (otherwise, anyone from this computer will be able to log into your account - for example, to your email inbox). After working on someone else's computer, delete the history for the period of time you used it. However, you should remember that “someone else’s computer” (especially in an Internet cafe) is always a high risk. You may not be aware of programs installed on other people's computers - spyware, keyboard monitors (which are often installed for network administration purposes), etc. If you still had to use “someone else’s computer” to enter one of your main passwords (from email, from online banking, etc.), then at the first opportunity (!) change the passwords that you used on someone else's computer!

If you are entering a password from someone else's computer, then put a checkmark in the "Someone else's computer" field, and if there is none, then before entering your password, go to your browser settings and disable the "saving passwords" function.. This can be done in a few seconds if you know where it is. And if you don’t know, then find out in advance, find and remember. Remember: knowledge is power!

8. Use an updated antivirus + firewall!

Use a comprehensive, constantly updated software protection from malware(viruses, Trojans and spyware etc.). If you DO NOT use protection, then all the above recommendations are almost meaningless. Go to the settings of your security programs and set the parameters to ensure high security(usually everything is clearly written there, and if you don’t understand something, look for visual videos on YouTube or write to the user support service and they will explain everything to you). It is comprehensive protection, at least “antivirus + firewall” or antivirus with a firewall function, that can keep data relatively safe.

9. SPAM is dangerous!

DO NOT open attachments to letters from recipients unknown to you, and DO NOT click on links or pictures in received spam.Although, there are viruses that act on behalf of recipients recorded as known to you, so in any case, configure your antivirus to scan all files downloaded from the Internet. Opening the received e-mail files (Word - .doc, Excel - .xls, etc.) don't allow macros(after all, your friends may not even realize that they are sending you a virus along with a letter). Ask those who write to you to indicate clear email subjects- this measure protects against accidental deletion of a normal letter along with spam. In addition, avoid “hot places” - for example, all kinds of “erotic-crack sites” - this is a favorite habitat for viruses of all stripes.

10. Set your browser to safe mode!

First, use the "update browser version" function(developers are constantly improving the functionality and security of their product, do not neglect this).
And secondly, set your browser to the most secure mode for surfing the Internet. Read articles on the Internet about how to increase the security of using your favorite browser. It won't take much time, but on the contrary, it can help save a lot of time and nerves.

With strict security settings, problems may sometimes arise when downloading files from sites you visit or when displaying all sorts of “bells and whistles” in them. In such cases, either add the site you need to the list of trusted ones (for the browser Internet Explorer this is adding the site to the "trusted sites" zone - menu Settings/Internet Options/Security), or use manually switching settings for this page, or (but only as a last resort!) temporarily Lower the overall security level in your browser's Internet Options. I remind you that you must have configured different security parameters for both the “trusted nodes” zone and the “Internet” zone in general. If you are engaged in e-commerce, then I recommend setting the most stringent security settings for the general “Internet” zone (disable all sorts of them in “Internet Options” / “Security Settings” Java Script, ActiveX, etc.).

In general, I recommend using a browser Mozilla Firefox . It's free, easy to download and install, and working with it is infinitely more pleasant than with a regular one. Internet Explorer`om. If necessary, install the necessary extensions (plugins), for example, a plugin for removing ads or a site reputation plugin, to do this, take advantage of the offer to go for extensions (plugins) using the link that the browser will offer you when updating.

If you cannot open the page you need on a reliable site you know, then it may be that your firewall or antivirus is doing something weird (but the browser has nothing to do with it) - then for these security programs, indicate that this site can be trusted. Look through the settings of these programs and you will see everything.

Always follow the security recommendations offered by the resource you use.(for example, website, postal system, payment service or mailing server) or program(for example, Keeper Classic, necessary for working with Webmoney). Take your time and do everything as recommended. If you can use additional security settings that a web resource offers, then use them! For example, go to your mailbox settings and enable restricting access by IP address. Next, create a complex answer to the security question that is used to recover your mailbox password (and be sure to write down this unique answer in your paper notepad). For example, you can select the question “what is the name of your dog” (although you may not have any dog) and write down “JimmK007*” as the name (this answer can be read as follows: Jim Carrey is agent 007, and “asterisk” is this is your code word). And so on, use all possible security settings.

Mnemonic technology helps not only to remember, but also subsequently to easily enter the password from a notepad into the required input field. At the same time, be sure to keep in your paper notepad an indication of the type of question used (for example, “what is your dog’s name”) and the answer to the security question itself! Otherwise, it may happen that you wrote down the answer, but forgot which question... Remember that your mailbox is the key to many of your passwords! Following the security recommendations of a particular web resource will not be difficult for even the most inexperienced user (nowadays everything is done for people), and if difficulties arise, the support service of the corresponding resource will always answer and help you.
Remember the truth: knowledge is power!

Type in the search bar a request to search for security holes in the email services you use, payment systems and other accounts that are important to you!For example, a request may sound like “security holes in mail.ru” or “how to protect a mailbox on mail.ru”, etc.
You will find a lot the most useful tips- use them, however ignore any methods that require you to enter your personal data(otherwise you’ll send your passwords straight to the hacker, who, under the guise of helping, does exactly the opposite). Spend your time on this, otherwise you will lose much more in the future. In a good situation, for example, if you noticed a leak of funds in time and contacted the support service and blocked your accounts, then you might save the money, but what if not? Then who will return the time spent on earning them?
No one will return the time of your life to you! Therefore, find out in advance how to quickly block (by phone or via the Internet) the accounts you use.

Special tip:Try to create your email accounts only on those email services that support secure ( SSL) connection.

Special tip:Do not store large amounts of money in your electronic accounts. As soon as the amount has become significant for you, withdraw funds from your electronic account by transfer to a bank account or into your own hands. By and large, this is the only measure that reliably allows you to protect your money.

13. Do backup the files you need on removable media!

This applies to everyone. I have twice experienced what “hard drive death” means and I wouldn’t wish it on my enemy. The first time this happened was when I was writing my Ph.D. thesis... This is generally a separate topic: on the computers of many dissertants, hard drives break down (after my bitter experience, I began to remember such stories about others), and in general, it was noticed that what The more technologically advanced and advanced the technology, the more sensitive it is to the human condition - after all, everything that exists ultimately consists of energy... I am sure that with the massive transition of humanity to computers developed and operating using nanotechnology and ultra-low energies, a real problem of interaction will arise computer with the mental state of the user. This will create considerable difficulties and endless new opportunities...

But let's return to the realities of the present day. If you do not copy important files (for example, a copy of your website, customized scripts, etc.) to a removable hard drive or large flash drive, then you are risking a lot. As soon as you have made a lot of changes to files that are important to you, copy them to a replaceable hard drive, flash drive, floppy disks, etc.

Special tip:get yourself a separate portable hard drive - for the Archive (for important files, for example, key files, licenses, important documents). Keep it only at home and nowhere else. Never take it anywhere. Never plug it into someone else's computer! It doesn’t matter how much you trust the owner of this computer - he may not even know what’s going on on his machine! Are there many of your friends who know everything about their computer? That's it... Copy all important files to this removable disk. And on this disk, store the key file from your electronic wallet management program (for example, the Keeper Classic program). Separately, I emphasize once again: store the key file only on removable media(this file will only be useful to you when reinstalling Keeper or the operating system). If you still don’t have one, then archive the key file (after changing its name and extension (Keeper allows this)) into a password-protected archive. Make the password as complex as the system allows, and simply delete the original (unarchived) key file (and from the basket too). Write down the password itself in your paper notepad; part of the password should be a secret sequence of characters that you remember, but write down only with the asterisk symbol.

14. Free programs can be dangerous!

Be careful and do not download or install again. free programs from sites that have no reason to trust.Along with such a program (or under its guise), you can install a virus or spyware. If you are an avid experimenter, then it is better to get yourself a separate computer (or a separate virtual operating system, or at least a separate account) for experiments and install whatever you want there. Naturally, then it should not store confidential data, installed programs for working with electronic payment systems, and the like.

15. Turn off the "keyboard monitor"!

I also recommend NOT using programs to record all keys pressed.(“keyboard scanners” or “keyboard monitors” - your passwords will also be stored in their memory, since these programs record all actions with the keyboard - every key pressed). All your passwords should be stored only in your notebook (and, possibly, additionally in a special program for storing passwords), and preferably with a “code fragment” (remember about the “asterisk”? - see paragraph 3 above - Special advice).

16. Don't be a fool!

Don’t get involved in the games “magic wallets”, “reading letters - highly paid remote work on the Internet”, “send us 100 bucks and you will receive 1000”, etc. Don't be fooled by this!
If some supposed "employer"
asks you to pre-deposit a certain amount of money (it doesn’t matter under what pretext and why - to open an account for you, make a pre-payment, register you in something, etc.), i.e. in fact asks you for money BEFORE you receive your earnings, then these are scammers , this is guaranteed to be deception in its pure form or in the form of a financial pyramid (in the second case, you yourself can become an unwitting deceiver). Never buy into this. Well, if you buy it, it’s your own fault, as they say. Then learn from your mistakes. Eat good principle: If you lose money on something, think of it as a paid lesson. Draw all the necessary conclusions so that the lesson will benefit you.

Remember these two simplest and truest principles that help you see deception and fraud:

1. Know firmly: If you haven’t earned anything yet, and some “employer” is already asking you for money, then this is definitely a scam!

2. Know firmly: If you are offered to “earn” decent money, but there is no real product or service (that people really need and would sell), then this is a scam.

The difference between normal civilized network marketing (or MLM) and financial pyramidsThis is exactly what it is - in network marketing (in MLM companies, for example, in the Oriflame company) there is a product or service that is sold that people need, but in the financial pyramid there is no product, or there is only its appearance, but in reality money is simply transferred from the pockets of some people to the pockets of others. So don't "throw the baby out with the bathwater" ;-) ! Those. Do not confuse real network marketing with financial pyramids and other scams.

I wish you an interesting and useful surfing on the Internet!

Best regards, Vadim Levkin

In the field of development information technologies Currently, projects that teach schoolchildren about cybersecurity issues have become highly relevant. Among the projects presented on the network, a special role is occupied by the portal “Setevichok.rf”, which was developed and maintained by a group of schoolchildren with the expert support of the NP “Safe Internet League”. Resource "Setevichok.rf"- a specialized portal for training and consulting schoolchildren on cybersecurity issues.

The organizer of the project is “School Know-It-All Blog” www.e-parta.ru Information and educational portal for teenagers.
The project has a positive expert opinion from the Ministry of Education and Science of the Russian Federation.

    • Helpline “Children Online” is a free all-Russian telephone and online counseling service for children and adults on problems safe use Internet and mobile communications .
    • Hotline of the Friendly Runet Foundation
    • Federal program for safe children's Internet Gogul
    • Parental Controls Overview
    • Internet and children. Security tips from Kaspersky Lab
    • Rules for safe browsing on the Internet from Microsoft

Internet Safety Reminder

Every year there are more young people on the Internet, and schoolchildren are among the most active users of the Runet. Meanwhile, in addition to a huge number of opportunities, the Internet also brings problems. This guide should help you stay safe online.

A computer virus is a type computer programs, distinctive feature which is the ability to reproduce. In addition to this, viruses can damage or completely destroy all files and data controlled by the user on whose behalf the infected program was launched, as well as damage or even destroy the operating system with all files as a whole. In most cases, viruses are spread via the Internet.

Anti-malware methods:

  • Use modern operating systems that have a serious level of protection against malware;
  • Constantly install patches (digital patches that are automatically installed to improve the program) and other updates to your operating system. Download them only from the official website of the OS developer. If there is an automatic update mode, turn it on;
  • Work on your computer as a user, not an administrator. This will prevent most malware from installing on your personal computer;
  • Restrict physical access to the computer for unauthorized persons;
  • Use external media information, such as a flash drive, disk or file from the Internet, only from trusted sources;
  • Do not open computer files obtained from untrusted sources. Even those files that your friend sent. It’s better to check with him whether he sent them to you.

Tips for staying safe on public Wi-Fi networks

Wi-Fi is not a type of data transmission, not a technology, but just a brand. Back in 1991, the Dutch company registered the “WECA” brand, which stood for the phrase “Wireless Fidelity,” which translates as “wireless precision.” Another abbreviation has reached our time, which is the same technology. This is an abbreviation for "Wi-Fi". This name was given with a hint of the highest standard of audio technology, Hi-Fi, which means “high precision”.

Safety tips for working on public Wi-fi networks:

  • Do not share your personal information over public Wi-Fi networks. When working in them, it is advisable not to enter access passwords, logins or any numbers;
  • Use and update antivirus programs and firewall. This way you will protect yourself from downloading a virus to your device;
  • At using Wi-Fi Turn off File and Printer Sharing. This function is closed by default, but some users activate it for ease of use at work or study;
  • Do not use public WI-FI to transmit personal data, for example to access social networks or email;
  • Use only a secure connection via HTTPS, not HTTP, i.e. when typing a web address, enter “https://”;
  • On your mobile phone, disable the “Connect to Wi-Fi automatically” function. Don't let it happen automatic connection devices to Wi-Fi networks without your consent.

Basic tips for safety on social networks

Social networks are actively entering our lives, many people work and live there permanently, and a billion people are already registered on Facebook, which is one seventh of all the inhabitants of the planet. Many users do not understand that the information they post on social networks can be found and used by anyone, including those who may not have good intentions.

Basic social media safety tips:

  • Limit your friends list. Your friends should not include random or unfamiliar people;
  • Protect your privacy. Do not include passwords, phone numbers, addresses, your date of birth or other personal information. Attackers can even use information about how you and your parents plan to spend the holidays;
  • Protect your reputation - keep it clean and ask yourself: would you like other users to see what you upload? Think before you post, write, or upload anything;
  • If you are talking to people you don’t know, do not use your real name and other personal information: name, place of residence, place of study, etc.;
  • Avoid posting photographs online that show you in a location that could indicate your location;
  • When registering on a social network, you must use complex passwords consisting of letters and numbers and with at least 8 characters;
  • For social networks, mail and other sites, you must use different passwords. Then if you are hacked, the attackers will have access to only one place, and not all at once.

Basic tips for working safely with electronic money

Electronic money is a very convenient method of payment, but there are scammers who want to get this money.

Electronic money appeared quite recently and it is precisely because of this that in many countries it is still not spelled out in laws. In Russia, they function and are already spelled out in the law, where they are divided into several types - anonymous and non-anonymous. The difference is that anonymous ones are those in which operations are allowed to be carried out without user identification, and in non-anonymous ones, user identification is mandatory.

You should also distinguish between electronic fiat money (equal to state currencies) and electronic non-fiat money (not equal to state currencies).

Basic tips for working safely with electronic money:

  • Link your mobile phone to your account. This is the most convenient and fastest way to restore access to your account. A linked phone will help if you forget your payment password or access the site from an unfamiliar device;
  • Use one-time passwords. After switching to enhanced authorization, you will no longer be in danger of theft or interception of your payment password;
  • Choose a complex password. Criminals will have a hard time guessing a complex password. Strong passwords are passwords that are at least 8 characters long and include lowercase and uppercase letters, numbers, and multiple symbols such as dollar sign, pound sign, Exclamation point and so on. For example, $tR0ng!;;
  • Don't enter your personal information on sites you don't trust.

Basic tips for using email securely

Electronic mail is the technology and the services it provides for sending and receiving electronic messages that are distributed across computer network. Typically, an email mailbox looks like this: user_name@domain_name. Also, in addition to transmitting simple text, it is possible to transfer files.

Basic tips for using email securely:

  • You need to choose the right mail service. On the Internet there is huge selection free email services, but it is better to trust those you know and who are first in the ranking;
  • Do not include personal information in your personal email. For example, it is better to select “music_fan@” or “rock2013” ​​instead of “topic13”;
  • Use two-step authentication. This is when, in addition to the password, you need to enter a code sent via SMS;
  • Choose a complex password. Each mailbox must have its own strong, hack-resistant password;
  • If you have the opportunity to write your own personal question, use this opportunity;
  • Use multiple mailboxes. The first is for private correspondence with recipients you trust. This email address do not need to be used when registering on forums and websites;
  • Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files;
  • After finishing work on the mail service, before closing the tab with the site, do not forget to click on “Exit”.

Basic tips to combat cyberbullying

Cyberbullying - harassment by messages containing insults, aggression, intimidation; hooliganism; social boycotting using various Internet services.

Basic tips to combat cyberbullying:

  • Don't rush into battle. The best way: seek advice on how to behave and, if there is no one to whom you can turn, then calm down first. If you start responding to insults with insults, you will only inflame the conflict even more;
  • Manage your cyber reputation;
  • Anonymity on the Internet is imaginary. There are ways to find out who is behind an anonymous account;
  • You should not lead a hooligan virtual life. The Internet records all your actions and stores them. It will be extremely difficult to remove them;
  • Maintain your virtual honor from a young age;
  • Ignore the single negative. One-off offensive messages are best ignored. Usually aggression stops at the initial stage;
  • Ban the aggressor. In instant messaging programs and social networks, it is possible to block sending messages from certain addresses;
  • If you are a witness to cyberbullying. Your actions: speak out against the stalker, show him that his actions are assessed negatively, support the victim who needs psychological help, inform adults about the fact of aggressive behavior online.

Basic Safety Tips mobile phone

Modern smartphones and tablets contain quite adult functionality, and now they can compete with desktop computers. However, there are still very few protection measures for such devices. Testing and searching for vulnerabilities in them is not as intensive as for PCs, the same applies to mobile applications. Modern mobile browsers have almost caught up with their desktop counterparts, but expanding functionality entails greater complexity and less security. Not all manufacturers release updates that close critical vulnerabilities for their devices.

Basic tips for mobile phone security:

  • Nothing is truly free. Be careful, because when you are offered free content, there may be some hidden content. paid services;
  • Think before you send an SMS, photo or video. Do you know exactly where they will end up?
  • It is necessary to update the operating system of your smartphone;
  • Use antivirus programs for mobile phones;
  • Do not download applications from an unknown source, as they may contain malicious software;
  • After you leave the site where you entered personal information, go to your browser settings and delete cookies;
  • Periodically check which paid services are activated on your number;
  • Only give your mobile number to people you know and trust;
  • Bluetooth should be turned off when you are not using it. Don't forget to check this sometimes.

Basic tips for gaming account security

Modern online games are colorful, exciting entertainment that unites hundreds of thousands of people around the world. Players explore the world given to them, communicate with each other, complete tasks, fight monsters and gain experience. They pay for pleasure: they buy a disc, pay for a subscription or purchase some options.

All these funds go towards maintaining and developing the game, as well as security itself: authorization systems are being improved, new patches (digital patches for programs) are released, and server vulnerabilities are closed. In such games, you should be afraid not so much of your opponents as of the theft of your password, on which the authorization system of most games is based.

Basic tips for the security of your gaming account:

  • If another player behaves badly or causes trouble for you, block him from the list of players;
  • Complain to the game administrators about the bad behavior of this player, it is advisable to attach some evidence in the form of screenshots;
  • Do not provide personal information in your game profile;
  • Respect other participants in the game;
  • Do not install unofficial patches and mods;
  • Use complex and different passwords;
  • Even while playing, you should not disable your antivirus. While you are playing, your computer can be infected.

Basic tips for fighting phishing

The usual theft of money and documents today will not surprise anyone, but with the development of Internet technologies, attackers have moved to the Internet and continue to do their “favorite” business. This is how a new threat emerged: Internet fraud or phishing, the main goal of which is to obtain confidential user data - logins and passwords. On English language phishing is read as phishing (from fishing - fishing, password - password).

Basic tips to combat phishing:

  • Keep an eye on your account. If you suspect that your profile has been hacked, then you need to block it and inform the resource administrators about it as soon as possible;
  • Use safe websites, including online stores and search engines;
  • Use complex and different passwords. Thus, if you are hacked, the attackers will have access to only one of your online profiles, and not all of them;
  • If you have been hacked, then you need to warn all your friends who are added as your friends that you have been hacked and, possibly, spam and links to phishing sites will be sent on your behalf;
  • Set a strong password (PIN) on your mobile phone;
  • Disable password saving in the browser;
  • Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files.

Essential tips for protecting your digital reputation

Digital reputation is negative or positive information about you online. Compromising information posted on the Internet can seriously affect your real life. “Digital reputation” is your image, which is formed from information about you on the Internet. Your place of residence, study, your financial situation, character traits and stories about loved ones - all this accumulates on the Internet.

Many teenagers are frivolous about publishing personal information on the Internet, not understanding the possible consequences. You won’t even be able to guess that a photo posted 5 years ago was the reason they refused to hire you.

The number of Internet users in Russia is growing every year; according to Mediascope for the period from October 2016 to March 2017, it increased by 2% and reached 87 million people, which indicates 71% of the country’s total population. At the same time, the goals of Internet users are varied; communication on social media. networks, searching for the necessary information, purchasing goods and services, selling goods and doing business.

At the same time, the number of cyber threats is growing; the media constantly reports reports of the theft of passwords from mailboxes amounting to millions, the release of famous TV series before the premiere (we are talking about the HBO series “Game of Thrones”), or interference in elections different countries(who doesn’t know, Russian hackers helped Trump become US President by rigging voting data).

But the media only covers high-profile cyberattacks, which generate a great public outcry, ignoring everyday cybercrimes, which, according to experts, by 2018 could reach 2 trillion rubles in damage, which will affect the wallet of almost every tenth RuNet user, because our users neglect basic Internet safety rules.

To prevent users of our blog from becoming one of these “bad” statistics, I have prepared 10 rules that must be observed and adhered to.

1. Strong password

A password is the basis of security, which most RuNet users openly neglect, using simple passwords or the same for all resources, mail, social networks, forums and even personal accounts of payment systems.

And if large services care about the security of their users’ data, then small forums, online trackers, online stores neglect this and become a tasty morsel for hackers, because when the database is hacked, they also get access to users’ emails, because they have a password for everything services are the same.

On the advice of experts, the password should consist of at least eight characters, including letters in different case, numbers and Special symbols in a chaotic order or in an order understandable only to the user.

Passwords must be different for key services such as a mailbox, Personal Area banking services, the main social network. If you have difficulty coming up with a password, use a password generator, for example, randstuff.ru, but do not forget to write them down on paper so as not to forget.

    1Password (supports Mac, iOS, Android, Windows)

    LastPass (Web, Mac, iOS, Android, Windows support)

    Dashlane (Web, Mac, iOS, Android, Windows)

    OneSafe (Mac, iOS, Android, Windows)

    iCloud Keychain (iOS, Mac)

    Splikity (iOS, Android, Chrome, Firefox, Safari)

Don’t forget to change your passwords every three to six months, thereby reducing the risk of hacking; some services already have a forced password change, in certain periodicals, mainly this social network and electronic wallets.

2. A good antivirus program

You should not rely on built-in protection, even if you have latest version Windows 10, experts advise installing antivirus software third party developers, because they are more effective, fortunately now there is plenty to choose from, including free versions, the most popular of which are:

    Avast Free Antivirus

    AVG AntiVirus Free

    Bitdefender Antivirus Free Edition

    Kaspersky Antivirus Free

    ZoneAlarm Free Antivirus+

  • Avira Free Antivirus

    Adaware Antivirus Free

    Comodo Antivirus

    Panda Free Antivirus

    Qihoo 360 Total Security

At the same time, do not forget about updates to both the operating system itself and third party applications, which are installed after reboot. It is better if your Internet connection allows you to set the settings to autoload.

3. Connection security

One of the most important aspects of security when working on the Internet, as well as the safety of your login and password when working in various Internet services, is the use of an encrypted connection via HTTPS protocol, which can be checked in the address bar; it is visually displayed as a padlock.

The presence or absence of this icon can signal to you that the site is secure, and also whether it is phishing if, for example, you followed a link to an online savings bank and ended up on an unsecured site with a similar name, as in the example in the screenshot below.

Therefore, pay attention to where you go, especially via links from SMS and messages from subscribers not from your circle or spam.

4. Linking to a phone number

Most major Internet services have additional protection measures, one of which is linking your account to a mobile phone number, which this moment is considered the most reliable available, for example, the same code word, which, in fact, is a second password.

This function is mainly used in online banking and electronic wallets, because even if your login and password are captured by attackers, it will be technically difficult to intercept an SMS in order to complete the transaction or action they need. Therefore in postal services and social networks now also have the ability to link to a mobile number. I strongly recommend that you take advantage of it immediately in order to protect your information as much as possible.

5. Give up “pirate”

It just so happens that in our country it is not customary to pay for someone else’s intellectual work and the majority prefer not to buy software, but to download it for free from various torrent trackers or other similar resources. At the same time, without suspecting that more than 76% of such software has viruses, Trojans and other malicious code, with the help of which they not only steal confidential information about the user, but can also use the device without the owner’s knowledge, for example, in hacker attacks or connect it to cryptocurrency mining .

In one thing only licensed Windows XP experts found up to 63 different viruses, Trojans, spyware and other malicious code. At the same time, when downloading and installing such a “pirate”, antivirus programs do not see most of the malicious code, so if you are still using unlicensed software, you are at risk.

6. Filter your information

With the advent of social networks, publicity has become commonplace; many, without thinking about the consequences, openly share information that attackers can use for their own purposes, from the year and date of birth, full name, nicknames, ending with the name of their favorite dog, which, inappropriately, is also a password in Classmates.

Information about the user is collected to apply methods to him social engineering, when, based on the data, scammers can slip you a phishing site or send you an email from your boss (from a similar mailbox) with a link to a Trojan, which will subsequently result in some damage for you, or they will simply guess the password to your mailbox and from there to all services where you are registered, and all because of the name of your beloved dog...

7. Free Wi-Fi danger

When using points Wi-Fi access Be careful in public places, although few people think about this and the word free Wi-Fi makes people excited, it still increases the risk of losing your personal data.

Therefore, before connecting, make sure that the Wi-Fi network name (SSID) is from a valid source. Don't connect to random unsecured Wi-Fi networks. If possible, use it network Virtual Private Network (VPN). A VPN allows you to work on a separate, secure, private network even when connected to the public. Or you can use an app like Hotspot Shield, which sets up the VPN automatically.

Compliance with the above rules will significantly reduce the risk of losing your personal data or reduce it to zero. But the main thing is to be more careful, because according to surveys, most users become victims of scammers due to their carelessness.

For example, in an online survey conducted by Mail.Ru Group, in which 1,783 people aged 15 to 64 years old, who live in cities with a population of over 100 thousand people and access the Internet at least once a week, took part, users became victims of fraud for three reasons: they used simple passwords, downloaded viruses, and went to fraudulent sites.

Hello, dear friends!

Every day we use the Internet. Everyone has already become accustomed to his existence, to the fact that he exists.

This technological progress, which gave us, helps us stay informed about all the events in the world, helps us find the information we need, watch movies online and a lot of other benefits.

And the most important and important thing in my opinion is that with the help special programs, we can be closer to each other, despite the distances.

This is all wonderful. But the Internet is not as harmless at first glance as it might seem.

After all, no matter how you look at it, the Internet is a huge world, and you don’t always meet only kind and honest people along the way.

There are enough evil trolls there, and just not good people.

So let's talk a little today about how to make sure that our life on the Internet does not suddenly turn from a fun, carefree journey into a terrible reality with elements of a horror film from modern reality and subsequently into a headache.

To do this, you need to develop habits and rules on the way to safe internet and understand:

There is even a holiday on the Internet - Safe Internet Day:

Safe Internet Day.

It has been celebrated since 2004. And it was created in order to draw the attention of users to this problem.

The Internet also has its own laws, but in general there is chaos here and there, in which it is very easy to get lost.

Of course, it is not possible to achieve complete security on the Internet.

Write in the comments how you protect yourself on the Internet and whether you think this problem is relevant and I hope that you will find mine useful:

Golden rules for internet safety.

WATCH A CARTOON ABOUT MASYANYA FROM THE INTERNET:

Sincerely, Larisa Mazurova.

5.6.1. General rules

They may lead in a completely different direction than the text information indicates.

2. Do not send sensitive personal or financial information unless it is encrypted during transmission!

Please remember that regular emails are not encrypted.

3. Be careful when working with websites!

Fake websites, similar to those of large companies, are designed to deceive customers and collect their personal information. Make sure that the websites you interact with contain privacy and security statements and review them carefully.

4. Make sure the URL you want appears in the “address” or “host” field of your browser.

Some sites may look similar to the site you need, but are actually fake. Take a few extra seconds, check, and, if necessary, type the URL of the site you need personally.

5. When transferring confidential information look for the padlock symbol in the bottom right corner of the webpage.

This symbol indicates that the site is running in secure mode. You must see it BEFORE you enter sensitive information.

6. When leaving network application do so in accordance with established procedures.

Don't just close your browser! Follow instructions when leaving the safe area to ensure your safety.

7. Avoid performing any banking transactions in places where Internet services are publicly available,

for example in an Internet cafe.

It is very difficult to determine whether such computers are free of hacker programs that capture your personal information and account information. If you need to carry out an operation from a public computer, be sure to

change your PIN code from your computer after you have used the computer public access.

It has great importance, since there is a risk of logging keystrokes (including numbers bank card And credit card, as well as PIN) using special programs built into a public computer, without your knowledge.

5.6.2. Basic rules for handling login and password

1. Login is your unique identifier, which, together with a password known only to you, makes it possible to prevent unauthorized access to the network by another person under your name.

Never share your password with others!

2. Use strong passwords or PINs for your online accounts.

Choose words that will be difficult for others to guess, and use different passwords for each account you have.

Use letters and numbers, as well as combinations of capitals and lowercase letters, if passwords or PIN codes differentiate them.

3. Be suspicious of any company or person who asks for your password, passport number or other confidential information.

Do not respond to emails asking for your personal information! remember, that all actions performed under your

login/password are legally considered to be completed by you.

5.6.3. Features of safe operation in wireless networks

U wireless networks They have a lot in common with wired ones, but there are also differences. In order to penetrate a wired network, a hacker needs to physically connect to it, but in the wireless version, he just needs to install an antenna in a gateway located within the network coverage area.

Therefore, in wireless network segments, the degree of threat of hacker attacks and, consequently, the risks of a whole host of security-related problems increases significantly.

For example, attackers can not only use a fake access point to distort traffic passing through radio channels and eavesdrop on it to extract confidential information, but also attack computers, causing denials of service, and simply jamming radio communications.

5.6.4. Basic rules for fighting viruses

Computer virus is a program that violates the integrity of information on your computer, in some cases even leading to the failure of the equipment included in your computer.

Today, computer viruses are an integral part of information contained in both local and global networks.

However, the influence of viruses can be neutralized by adhering to the rules below.

1. Install only proven anti-virus programs.

Despite the large selection of anti-virus systems, you should only use packages that have proven themselves in our market.

viruses are inherent specifically to the Runet, i.e. Russian part of the Internet.

2. Periodically update your antivirus program.

Antivirus scanners can only protect against those computer viruses, data about which is contained in the anti-virus database.

This is not enough to guarantee absolute protection, if only because new types of virus programs appear and spread very quickly. In this regard, update antivirus databases need to be done regularly. The more often this simple operation is performed, the more secure the workplace will be.

3. Be careful with files in emails.

Never open suspicious files that come from people you don't know.

4. Never run programs sent by an unknown person.

This rule is well known and does not need explanation. However, files received from “reliable” correspondents (acquaintances, colleagues and friends) can also be infected. Your friends may not know that unauthorized letters are being sent from their computer: the virus is capable of sending messages on someone else’s behalf, unnoticed by the computer owner!

Before opening any file, you must scan it with anti-virus tools. Naturally, good antivirus packages scan automatically.