Five online security myths that could put you at risk

When it comes to internet security, there are some myths that just won’t die – and putting our faith in them can have serious consequences. Today, we debunk some of the most common myths and show you how to protect your online accounts from scammers and cybercriminals.
An older woman walks through the rain holding an open umbrella while looking at her smartphone.
Rain or cyberthreats – protection matters! Stay covered online, too.
  by Kieran – Reading time: 2 min.

 

In this blog post...


Have you ever heard that goldfish can only remember things for a few seconds? Or that bats are completely blind? Both sound plausible, but they’re actually myths.

False assumptions like this can be hard to stamp out. And while misconceptions about goldfish are probably harmless, the same can’t be said about online security. So, today we’ll highlight five common myths and explain why they could have devastating consequences.

Myth 1: "There is nothing in my inbox that would interest a hacker"

When the news reports on large-scale hacking attacks, the targets are usually politicians or corporations, with cybercriminals attempting to steal confidential data and sell it for a high price.

But hacking is no longer just the result of planned, coordinated actions by organized groups. That’s because most attacks today are automated. All it takes is a poorly protected email address or an outdated operating system, and you’re a target. Bots scour the internet for vulnerabilities and exploit them, targeting both individuals and companies.

This often involves identity theft, the sale of personal data on the dark web, or the use of hacked accounts to send spam and malware.

And even if you might think you have nothing to hide: You do! Because everyone has data that should stay private: login credentials for online accounts, health information, personal photos, or confidential chats. All of this can be exploited for blackmail or scams. Even if such information seems like it would be of little value, it is often worth a fortune to criminals.

Just because you’re not a celebrity or a politician doesn’t mean you are safe from cyberattacks, because everyone has vulnerabilities. Online security is important for everyone.

Myth 2: "A secure password is enough to keep me safe."

At least 12 characters, a mix of uppercase and lowercase letters, and a few special characters. The requirements for a secure password are now well-known.

But even the most secure password is useless if it becomes public in the event of a data breach. Time and again, major portals and platforms fall victim to hacking attacks in which user data is exposed.

If you use the same password for multiple platforms, cybercriminals can access not only the hacked account but all accounts secured with that same password. That’s why it’s important to use a unique password for each account.

To ensure you’re as protected as possible:

  1. Never use the same password for multiple logins.
  2. Check your existing password with mail.com’s free and secure password checker.
  3. Use a password manager to create complex and unique passwords for each website and manage them securely. Alternatively, try the passphrase method, which helps you create different complex passwords and remember them easily.
  4. Enable two-factor authentication (2FA). This way, a stolen password alone is no longer enough to log into your account.

Myth 3: "I can’t be fooled by a phishing message!"

The days when phishing messages were riddled with spelling errors and written using poor translation software are (unfortunately) over.

These days, scammers don’t just copy real logos, names, or phrasing. They even use seemingly trustworthy email addresses. This is called spoofing.

Furthermore, cybercriminals are increasingly using artificial intelligence in phishing scams. This allows them to create personalized messages that not only address you by name but are also extremely difficult to spot as fakes.

Myth 4: "Another software update!? It can wait..."

A new security update always takes some time. The device has to have enough charge and cannot be used during the update. This can be quite annoying, which is why it’s tempting to simply postpone the update.

But that’s exactly what you shouldn’t do!
 
Software updates aren’t just unnecessary formalities that add new bells and whistles. Because while cybercriminals are constantly finding new ways to attack systems, developers are working to patch these vulnerabilities as quickly as possible. Every postponed update extends the time during which your device is vulnerable.

Myth 5: "Smartphones are protected right out of the box."

Apple likes to advertise the high security standards of iPhones and iPads, giving the impression that users hardly need to worry about security when using them. But appearances can be deceiving, because whether it’s an iPhone, Samsung Galaxy, or Google Pixel: any smartphone can become a target for cybercriminals.

The biggest risk? The users themselves! Anyone who opens links from emails, scans QR codes, or logs into various websites without thinking makes it easy for attackers.

Phishing, quishing, and Trojan horses all exploit these lapses in caution. To ensure you’re fully protected despite all these risks, you should always carefully verify the link or sender before entering your personal information anywhere. You should also follow this same precaution before downloading a new app.

And even if you have an additional antivirus program installed on your phone or computer, that by no means guarantees complete protection! Because these programs are designed to handle specific threats like malware, but can be outsmarted by Trojans or phishing attacks.

So, stay vigilant and don’t let these myths lull you into a false sense of security. And if you still don't have a mail.com account, you can create your free email address here.

2 people found this article helpful.

Related articles

Received an email from the IRS? Read this before you click

When and how to send an anonymous email

Don’t let hackers score: How to keep your inbox safe this Super Bowl season