What is anti-phishing or internet hygiene

Phishing has existed since the beginning of the Internet and technology is constantly improving. The number of attacks using phishing will only increase, and therefore will allow hackers to make big profits. In today’s world, there are a few things you can do to help reduce the risk of phishing.

  1. Check your online accounts regularly. If you do not visit your Internet account for a while, someone may use it. Make it a rule to change your passwords regularly. Always monitor the information on the movement of funds in your account to make sure that no fraudulent transactions have taken place.
  2. Keep your web browser up to date – all popular web browsers keep getting security updates, so don’t neglect them.
  3. Think before you click It’s okay to go to links from trusted web resources, but clicking on links in random emails or instant messaging may not be a good idea. Hover over links you’re not sure about, and see if they really lead to where they should lead. Phishing emails can be disguised as a company you know. By following the link, you can see a site similar to the real one, emails may even contain your name. It is best to go directly to the source yourself without clicking on a potentially dangerous link.
  4. Check the security of the site: be careful about providing confidential financial information online. As long as you are on a secure website, you should have no problems. Before submitting any information, make sure that the site URL begins with “https” and that the address bar has a closed lock icon. Also, check the security certificate of the site, it must correspond to the resource on which you are. If you receive a message that a website may contain virus files, do not open this resource. Never download files from suspicious emails or websites. Search engines can show links, which can lead users to a phishing page that offers low-priced products. If a user makes purchases on such a website, cybercriminals will receive credit card information.
  5. Use a firewall: High-quality firewalls act as buffers between you, your computer, and attackers. You should use two different types: a desktop firewall and a network firewall. The first option is the type of software, and the second option is the type of hardware. When used together, they dramatically reduce the chances of hackers and phishers targeting your computer or your network.
  6. Explore phishing techniques: Today, many online resources describe the methods used by hackers, if you learn about them earlier, you have a chance not to fall victim to one of them. The specialists responsible for information security in companies must constantly train colleagues and imitate phishing for all users in the company.
  7. Be careful with pop-ups: it is often disguised as components of a website. Although they are too often phishing. Many popular browsers allow you to block pop-ups, you can allow them in each case. If an unnecessary window still appears, do not click the “cancel” button, such buttons often lead to phishing sites, instead of click on a small “x” to close it.
  8. Never share personal information: You should never share personal or financial information online. If necessary, always try to go to the original source yourself, checking all the factors that this is exactly the resource you need.

This is just a minimal list of simple rules that should become a habit for users in today’s world. More sophisticated phishing emails execute hidden code if the mail simply opens on the target computer.

One of the options to reduce risks is to use specialized software packages from leading companies in the field of information/network security.

See also

More details


How to ensure the reliability of the company – provider of information security services?

We are all familiar with the word “cyberattack” and have repeatedly heard about cases of interference in the information environment of company in order to destabilize the work and/or obtaining of information containing confidential data by criminals. Unfortunately, we must state that cybercrime today is moving side by side with advanced information technology.

More details


What are DDoS attacks?

Articles about DDoS attacks are very common online. What is the purpose and consequences of such an attack?