top of page

Thanks for subscribing!

Want to get notified when I create new content?

  • Writer's pictureKyser Clark

How the Average Person can Navigate the Digital Wild West Safely



I like to think of the Internet as the modern-day Wild West. It's teeming with opportunity yet fraught with danger at every turn. Cybercriminals roam like bandits in this landscape, seeking out those they deem easy marks. You might consider yourself an unlikely target, believing that a lack of wealth, fame, or influence shields you from the crosshairs of these digital outlaws. Yet, it's precisely this underestimation that makes you an ideal target. These modern-day bandits thrive not by targeting the heavily fortified but by exploiting the minor vulnerabilities of the many, accumulating their wealth one unsuspecting victim at a time.


Your digital identity, no less than any treasure of the Old West, holds immense value. Its protection doesn't hinge on the chance of being overlooked by marauders but on the robustness of your defenses. With the expertise of an ethical hacker and a seasoned guide through the perilous trails of the internet, this guide is your map of the territory. Drawing from the tools of the trade in cybersecurity, ethical hacking, and penetration testing, we'll demystify the complexities of cybersecurity, offering practical, straightforward advice to fortify your online presence.


Just as old pioneers wouldn't venture into unknown territories unprepared, neither should you navigate the digital landscape without your defenses up. This guide is your compass and rifle in the wild digital expanse, empowering you to stake your claim safely in the modern world's vast, uncharted digital frontier. Summary

  • Embrace Multi-factor Authentication (MFA)

  • Craft Strong and Unique Passwords

  • Don’t Put Personal Information on Social Media

  • Keep Your Software Updated

  • Avoid Storing Passwords in Your Browser

  • Question Everything: Become Aware of Phishing

  • Avoid Public Wi-Fi

  • Avoid Public Charging Stations

  • Avoid Public Charging Stations

  • Change Default Device Passwords

  • Change Default Device Passwords

  • Avoid Sponsored Links

  • Be Picky With Your Personal Information

  • Smart Devices: Avoid Them if You Can and Implement Isolation if You Can’t

Embrace Multi-factor Authentication (MFA)

Understanding MFA: Imagine your online account as a safe. A password alone is like a primary lock. MFA adds a second lock that only opens with a key that changes constantly. Even if someone learns your password, they can't get in without the second key.


Practical Steps: Activate MFA on as many accounts as possible, especially those holding sensitive information like emails, banking, and social media. You should prefer using an authenticator app, which generates temporary codes. If this sounds complex, think of it as a simple app on your phone that gives you a new, short code to enter in addition to your password. If an app isn't an option, use email verification. SMS text verification should be your last choice due to SIM swapping vulnerabilities. However, it's still much better than no extra protection.


Craft Strong and Unique Passwords

Why It Matters: A complex password is akin to a high-quality lock on your door. It's much harder for a thief (or cybercriminal) to bypass. Using the same key (or password) for every lock makes it easy for one to break into all your locks (accounts).


How to Do It: For your most critical accounts, like your bank and email, use long passwords, include a mix of characters, and don't resemble anything personal or easily guessed. It's okay to simplify a bit for less critical accounts but still avoid obvious choices. If managing all these passwords sounds daunting, consider using a phrase or a base password with variations for different sites. Password managers are generally acceptable according to the vast majority of cybersecurity professionals. However, I personally don't use one because of the many data breaches Last Pass has received.


Don’t Put Personal Information on Social Media

Why This Is Crucial: The bits of personal information shared online can collectively paint a detailed picture of your life, making it easier for someone to impersonate or target you.


Making It Safe: Limit the amount of personal detail you share, such as your full birth date, your address, or vacation plans, especially in public-facing posts. Adjust your privacy settings so only friends can see your posts, and think twice before sharing photos that reveal too much about your life, especially those of your children.


Keep Your Software Updated

The Basics: Software updates often contain fixes for security flaws discovered since the last update. Ignoring updates is like leaving a window unlocked for thieves.


Easy Updates: Turn on automatic updates on all devices. This can usually be done in the settings menu of your phone, computer, or app. It ensures that your device is installed when a security update is available, closing off avenues for attackers.


Avoid Storing Passwords in Your Browser

Understanding the Risk: When your browser remembers your password, it's stored in a way that can potentially be accessed by malware or if someone gains physical access to your computer.


Better Practices: Instead of letting your browser remember your passwords, use a handwritten list or a reputable password manager in a safe place. Many security professionals generally consider handwritten lists insecure since your house can be broken into. Still, I consider it more secure than storing it on a digital device. Think of it this way: on a digital device, potential attackers can come from all over the world due to the internet. When the list is handwritten, the potential attackers are limited to those of your neighborhood. Plus, if you have your house locked up and your password list in a safe, you will know if your passwords have been compromised, which can't be said about a digital list. The most secure location for your passwords is in your memory. There is no known way to read human minds (yet). 


Question Everything: Become Aware of Phishing

Recognizing Phishing: Phishing is when you receive a message trying to trick you into giving away personal information or clicking on malicious links. They can look very convincing, pretending to be from companies you know.


Protective Measures: Be skeptical of unexpected emails or messages asking for information or urging you to click on links. Verify the authenticity by contacting the company through official channels, not by replying to the message.


Avoid Public Wi-Fi

The Danger with Public Wi-Fi: Public networks are convenient but not secure. Cybercriminals can easily intercept data you send and receive, from passwords to financial information.


Safe Connectivity: Use a Virtual Private Network (VPN) on public Wi-Fi. A VPN encrypts your internet connection, making it difficult for anyone on the network to eavesdrop on your activities. Think of it as sending your internet traffic through a secure tunnel that no one else can access or see into. If you're unsure which VPN to use, look for reputable providers with solid user reviews. Remember, the goal is to make it as hard as possible for would-be attackers to access your data. Avoid public Wi-Fi when possible, but if you must do it out of necessity, ensure you use a VPN and good anti-virus software. 


Avoid Public Charging Stations

Understanding the Risk: Like connecting to an untrusted Wi-Fi network, plugging your device into a public USB charging station can expose it to data theft or malware.


How to Charge Safely: Plug your charger into an electrical outlet rather than a USB port in a public place. If you must charge in public and only USB is available, consider carrying a portable power bank or a USB data blocker, which allows charging without data connections. Again, only plug devices into public charging ports in emergency situations, and NEVER accept a charging cable from a stranger. Some cables may look legitimate, but they can be loaded with malware that steals data or infects your device for other malicious activities. 


Minimize Bluetooth and Wi-Fi Exposure

Why It's a Concern: Leaving your Bluetooth and Wi-Fi on and discoverable can make your devices visible to nearby cyber attackers, who might try to connect to your devices to access data or install malicious software.


Simple Security Step: Turn off Bluetooth and Wi-Fi when not in use, and avoid connecting to unknown Bluetooth networks or devices. You can make your device non-discoverable in your device settings, reducing the risk of unauthorized connections.


Change Default Device Passwords

Why Default Passwords are Risky: Many devices come with pre-set, easily guessable passwords that manufacturers assume you will change—but many people don't. These are often the first passwords hackers will try.


Securing Your Devices: Immediately change any default passwords on new devices to something only you would know. This includes your Wi-Fi router, smart home devices, and other gadgets. Create complex passwords that combine letters, numbers, and special characters.

Avoid Sponsored Links

Understanding the Hazard: Despite their prime positioning, sponsored links are not guaranteed to be safe. They're often the highest bidder's territory, a mix of legitimate businesses and malicious entities masked as trustworthy sources.


Navigating Safely: Exercise skepticism with sponsored links. Delve deeper into search results for organic, credible sources. This practice shields you from the clever disguises of online predators, ensuring your search leads you to safe and genuine destinations. My personal strategy is to NEVER click a sponsored link, and I recommend you do the same.


Be Picky With Your Personal Information

The Value of Discretion:

Today, in the information age, data is the most valuable resource in the world. Indiscriminate sharing can make you vulnerable. Businesses often request more information than necessary, exposing you to unnecessary risks.


Preserving Your Privacy: Adopt a policy of minimal disclosure. Challenge requests for personal information and offer it sparingly. This approach isn't just about being secretive; it's a proactive stance on protecting your digital identity from those who might exploit it for their gains. For example, my local mechanic check-in form asks for a home address when I drop off my car for maintenance or repairs. Just because they ask for it doesn't mean I have to give it to them. Also, you should ask, "Why do I need to give you my social security number?" or "Do I have to give you my social security number?" when doing business with a company. Also, strive to never write your social security number on check-in forms if you don't have to. I've found that I don't have to most of the time. That said, I don't necessarily mistrust the company I'm doing business with, but I have no idea how they store my personal information. Companies can have the best intentions to secure your information, but they often fail due to how hard it is to implement cybersecurity from threat actors.

Smart Devices: Avoid Them if You Can and Implement Isolation if You Can’t

Assessing the Risk: The allure of the Internet of Things (IoT) and smart devices lies in their promise to simplify our lives. Yet, beneath this convenience lies a critical vulnerability: a lack of robust security measures. Manufacturers, in their rush to capture market share, often overlook the necessity for regular updates and strong protective features, exposing your home network to potential cyber threats.

Adopting a Defensive Posture: Before introducing smart devices into your home, it's crucial to weigh their convenience against the cybersecurity risks they introduce. Ask yourself whether the benefits of a connected appliance truly outweigh its potential to compromise your network's security. Minimizing the number of these devices can significantly reduce your exposure to cyber risks. I mean, come on, do you REALLY need to have an internet-connected toaster or a mobile app for your toothbrush?

Strategic Isolation: If you decide that a smart device is indispensable, mitigate its potential threat through network segmentation. This involves connecting your IoT devices to a guest network or a separate network designed specifically for them if your router allows for such a configuration. This step may sound complex, but most modern routers provide straightforward instructions for setting up a guest network. This shields your primary network from direct attacks through vulnerable smart devices and confines any potential breach to a more contained and manageable area, safeguarding your data's integrity.


If you want to read more about the dangers of IoT and Smart Devices, read my other article: Consumer Tech & Cyber Risks.


Conclusion

In the vast and untamed digital Wild West, mastering the art of cybersecurity is not a skill reserved for the sheriffs and tech outlaws alone. It's an essential survival tactic for every pioneer braving this modern frontier. Adopting the strategies outlined in this guide can significantly diminish the shadows of risk cast by cybercriminals lurking behind every virtual tumbleweed.


Cybersecurity, much like the layered walls of a frontier fort, relies on the strength of its combined defenses. No singular tactic is a silver bullet against the threats of the digital badlands, but together, they forge an impenetrable stronghold around your slice of the online world. Begin with a step or two—perhaps the equivalent of setting up your first barricades—and expand your fortifications as the land becomes familiar.


The journey to secure your digital homestead is ongoing, a constant push against the ever-encroaching wilderness. Yet, this endeavor need not be daunting. Armed with the insights from this guide, you're equipped to navigate the challenges confidently, ensuring you can reap the bounties of the internet while keeping the bandits at bay. In the digital Wild West, your information is a valuable commodity. Still, with the right precautions, you can enjoy the frontier's vast opportunities without fear, safeguarding your treasure against the outlaws of the online world.

38 views0 comments

Related Posts

See All

Thanks for subscribing!

Want to get notified when I create new content?

bottom of page