Phishing — How to Recognize It Before You Get Hooked
Modern phishing looks legitimate — always check the domain, never log in from a link, and treat urgency as a red flag.
Modern phishing looks legitimate — always check the domain, never log in from a link, and treat urgency as a red flag.
Default social media settings expose everything — spend five minutes switching to the most restrictive options that still work for you.
Encrypt the phone before factory reset, sign out of everything, remove SIM and memory cards, and verify nothing personal remains.
Length beats complexity — a long random passphrase is far stronger than a short password with special characters.
Your recovery email can reset everything else — secure it with a unique password and 2FA before anything else.
Print or write down your 2FA recovery codes and store them physically — they are your only way back in if you lose your device.
Honest security question answers are easy to research — use fictional answers and store them like passwords.
Never send passwords in plain text messages — use a password manager sharing feature or a self-destructing link service.
SMS 2FA still blocks most attacks and is far better than nothing — but an authenticator app protects you from SIM-swapping too.
A verification code sent to your phone is the key to your account — no real company will ever ask you to read it to them.
Notes apps and chat messages offer no real security for passwords — use a dedicated password manager instead.
A SIM PIN prevents thieves from using your SIM in another phone to receive your verification codes — set one up in 30 seconds.
Device encryption makes your data unreadable without your login — enable it so a stolen device does not mean stolen data.
Public Wi-Fi makes your traffic visible to others on the network — avoid sensitive logins or use a VPN to encrypt your connection.
Default router passwords are public knowledge — log in and change both the admin and Wi-Fi passwords to lock down your home network.
Routers have software vulnerabilities just like phones and computers — set a quarterly reminder to check for firmware updates.
Your phone auto-joins remembered Wi-Fi names, which attackers can spoof — remove old public networks and disable auto-join.
Photos embed GPS coordinates and other metadata — strip this data before sharing images directly via email or messaging.