We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What are Some Internet Security Fundamentals?

Mary McMahon
By
Updated: May 16, 2024
Views: 8,481
Share

Internet security fundamentals are designed to protect individual Internet users from security risks which accompany use of the Internet. Following even the most basic security fundamentals will make your browsing experience much safer, and will also secure your personal information from predators. Being a victim of identity theft is the thing you want to avoid above all, because it can take weeks or years to clear your credit history. Security fundamentals serve several purposes: they protect you from identity theft, minimize potential damage to your computer through viruses and hijackings, and make the Internet safer for others to use as well, through a network of protected computers and users.

The most basic security fundamentals have to do with the ways in which you secure and provide your information. Change your passwords frequently, and use alphanumeric codes, or difficult pass phrases. Resist the temptation to use passwords that include your name, or the names of your children or pets. Familiar objects and locations should also be avoided, to make it more difficult to guess your password. If you suspect that an online account has been compromised, act immediately to change your password and alert the site of the breach.

Another precept of security fundamentals involves being very careful about how and when you disclose information. Do not release personal information such as your address, credit card number, phone number, or bank account number to unreliable sources. Sites with expired security certificates should be avoided, and use common sense before releasing this kind of information: if you can purchase an item locally, for example, try to choose that option over ordering it online. If you do release this kind of information, make sure that you know who it is being sent to, and how it will be used. Never release sensitive information like your passport or social security number, and always use encrypted forms to send sensitive data.

Many people are victims of phishing, a type of scam in which the victim is contacted by someone who is claiming to represent someone else. Some phishing scams, like those surrounding Nigerian money, are obvious. Others are more subtle: you may receive communications from a company claiming to be your bank, credit card company, educational institution, or cell phone provider, for example. The email might say that additional information is needed, and request you to provide it. Do not respond to emails like this: the best course of action is to call your company directly if you have questions, and be aware that most financial institutions do not carry out business via email. Banks will also not ask for usernames, passwords, and other sensitive information, because they follow security fundamentals of their own to protect customers.

Additional security fundamentals include protecting your computer and Internet connection. Breaches in security can result in viral infections, and in some cases, a hacker may hijack your computer and use it to send out unwanted email or launch attacks on a website. Avoid this by having a firewall in place, keeping your operating system current with updates, and using a less vulnerable browser such as Opera, Safari, or Mozilla Firefox.

By following basic security fundamentals to protect yourself, you can reduce the risks of Internet browsing. You will never be able to fully protect yourself, however, so make sure that you get frequent copies of your credit report, and always report suspicious transactions to your financial institution immediately. If you are on a network such as one found at a school or office, make sure to follow additional security fundamentals as recommended by your network administrator to protect the network as a whole, in addition to yourself.

Share
EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary McMahon
By Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a EasyTechJunkie researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Discussion Comments
By Melonlity — On May 05, 2014

@Soulfox -- that is not always practical. For example, what if there is an application you must use and it won't run under the operating system you have determined is the safest? Do you abandon the operating system you need for that application for the sake of being more secure?

That would probably be a mistake as even the operating systems that have a dubious reputation for security have third-party programs available that will address those issues. Again, research and see what is available, but the chances are good you can find a solution to address security problems regardless of what operating system you have.

By Soulfox — On May 04, 2014

One of the most fundamental things one can do in terms of Internet security take place before a computer or operating system is bought -- research. If you are concerned about security, have a look at available operating systems and see how they rate when it comes to security. If security is your highest concern, go with the operating system that offers the highest security.

Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a...

Learn more
Share
https://www.easytechjunkie.com/what-are-some-internet-security-fundamentals.htm
Copy this link
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.