PDF download Download Article PDF download Download Article

With all the latest technological advancement, especially on the web, people with ill intentions have also expanded their threat up to the cyber world. You can be a victim, not only in the real world, but also as you surf the Internet. Cybercrimes has been so chronic that most have already made a crime punishable by law. As a member of the community, we have a responsibility to prevent cybercrimes in our own little ways.

Method 1
Method 1 of 4:

Preventing Hacking

PDF download Download Article
  1. Refrain from connecting to free Wi-Fi networks from coffee shops or other public places. Connecting your device to public networks exposes it potential hackers that can easily get through the low level security of these kinds of networks. [1]
  2. If you’re about to do some personal transactions like banking or online shopping, do not do it using public computers. Other people who have used the computers before you may have put programs that can record the passwords you type in.
    Advertisement
  3. Keep the passwords of your various accounts to yourself. If you do let someone know, make sure to change it afterwards to prevent that person from accessing your private internet accounts without permission. [2]
    EXPERT TIP

    Brandon Phipps

    Technology Specialist
    Brandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.
    Brandon Phipps
    Technology Specialist

    Protect your personal information online. Use two-factor authentication, complex passphrases, and password managers. Encrypt sensitive data. Install and update antivirus software. Be cautious with emails and avoid sharing personal or financial information.

  4. The Internet is full of free software from unknown sources. These kinds of programs normally carry malicious applications with it and installing it may infect and cause serious damage to your computer. [3]
  5. Advertisement
Method 2
Method 2 of 4:

Preventing Cyber Bullying

PDF download Download Article
  1. Bashers or “trolls” are Internet surfers that purposely agitate other users to start discussion which may later lead to verbal abuse.
    • If you see people posting or replying bad comments to your online posts, do not reply back. Bashers commonly seek attention and will soon back away if they’re not given any thought.
  2. Don’t be emotionally affected by the things you read on the net. Remember that these things are only words and cannot hurt you directly.
  3. If you see people verbally harassing other users, talk to the administrators or moderators of the website and report that person who’s bullying other people.
  4. If you can’t seem to find any way to stop cyber bullies, get off the Internet and shut your computer off. Cyber bullies only exist on the Internet and would cease to be as soon as you log out.
  5. Advertisement
Method 3
Method 3 of 4:

Preventing Online Piracy

PDF download Download Article
  1. Purchase media contents straight from legitimate sources only, like iTunes or Amazon.
  2. Do not share or make copies of music, movies, or any kind of copyrighted media over the internet. Doing so can constitute to online piracy, which is punishable under the federal law.
  3. Report any site that shares pirated contents . If you come across websites that shares illegal contents, contact your ISP or local government units responsible for handling such kinds of issues and report these kinds of illegal activities.
  4. Advertisement
Method 4
Method 4 of 4:

Preventing Online Pornography

PDF download Download Article
  1. Set the antivirus application you’re using to block websites that shows pornographic contents. If you’re connected to a smaller network, contact your network administrator so they can restrict access to such sites.
  2. Speak with the members of your household who could or potentially be viewing pornographic websites. Explain to them the negative effects of opening such kinds of contents on the internet.
    • Remember that sometimes, the toughest problems can be solved or prevented with a proper discussion.
  3. If you’re aware of any online pornographic activities, such as cyber prostitution, in your area, alert your local authorities so they can take the proper actions and respond promptly to the issue at hand.
  4. Advertisement

What Is Cyber Insurance?


Expert Q&A

Search
Add New Question
  • Question
    Who is most likely to be a victim of cybercrime?
    Mitch Harris
    IT Expert
    Mitch Harris is an IT Expert based in the San Francisco Bay Area. Mitch runs his own IT Consulting company called Mitch the Geek, helping individuals and businesses with home office technology, data security, remote support, and cybersecurity compliance. Mitch earned a BS in Psychology, English, and Physics and graduated Cum Laude from Northern Arizona University.
    IT Expert
    Expert Answer
    People who use similar passwords for everything may be at risk, especially if they use Google's password manager tool. Once someone learns your password, they might try logging into other accounts with it.
  • Question
    What is the main cause of identity theft?
    Mitch Harris
    IT Expert
    Mitch Harris is an IT Expert based in the San Francisco Bay Area. Mitch runs his own IT Consulting company called Mitch the Geek, helping individuals and businesses with home office technology, data security, remote support, and cybersecurity compliance. Mitch earned a BS in Psychology, English, and Physics and graduated Cum Laude from Northern Arizona University.
    IT Expert
    Expert Answer
    The main cause of identity theft is trickery. The criminal will pretend to be someone else, like an IT professional, and try to get your password that way. In fact, most cases of identity theft occur after a person voluntarily shares their personal info.
  • Question
    What kind of information gets stolen?
    Mitch Harris
    IT Expert
    Mitch Harris is an IT Expert based in the San Francisco Bay Area. Mitch runs his own IT Consulting company called Mitch the Geek, helping individuals and businesses with home office technology, data security, remote support, and cybersecurity compliance. Mitch earned a BS in Psychology, English, and Physics and graduated Cum Laude from Northern Arizona University.
    IT Expert
    Expert Answer
    Most cybercriminals are looking for really sensitive info, like your social security number. These types of criminals aren't really interested in stealing any suggestive photos off your computer.
See more answers
Ask a Question
      Advertisement

      Tips

      Submit a Tip
      All tip submissions are carefully reviewed before being published
      Name
      Please provide your name and last initial
      Thanks for submitting a tip for review!

      References

      1. Mitch Harris. Consumer Technology Expert. Expert Interview. 16 July 2021.
      2. Mitch Harris. Consumer Technology Expert. Expert Interview. 16 July 2021.
      3. Mitch Harris. Consumer Technology Expert. Expert Interview. 16 July 2021.

      About This Article

      Thanks to all authors for creating a page that has been read 53,329 times.

      Is this article up to date?

      Advertisement