There's this feeling when you have done something completely stupid, but not life‑destroyingly stupid; when you know that it was on a teeny‑weeny level, but you wonder who and what it might have cost.
We’ve all been there.
Maybe while shopping online without using a safe payment service? Downloading a dodgy PDF file? Using free Wi‑Fi without a VPN? Too many “cyber overshares” that help the bad guys create fake versions of us? …Right?
The thing is, no matter who we are, we all make mistakes. Little ones, big ones. But the last thing we want to do is make a mistake that really ends up costing us. So, let's talk about some everyday habits that may be leaving you wide open to cybercrime.
1. Reusing the Same Password for Everything
Imagine you have one password. And it’s the password to all your accounts. Your email account. Your bank account. Your video streaming subscriptions. Social networks. Your phone…
You know the drill. It’s a pain, but hey – at least you remember it, right?
But here’s the thing… If someone gets their hands on that password, they have every single door to your accounts open, wide and waiting for them to walk in. What a score for a hacker!
Now to the solutions: a password manager, that is. Set it and forget it.
This useful piece of software will remember and input all your monstrous logins while you just have to memorise one main combination for it (and again, please, make it a phrase).
2. Skipping Two‑Factor Authentication
You’re busy. So many tabs, deadlines, you know how it goes. You get this extra prompt when logging into your account. “Send code? OK.” That’s how you know it’s your email. So you just hit OK.
You’ve done this a million times. Right?
Here’s the thing: that code? That’s an extra confirmation that you are who you say you are. If a hacker has your password, and no one to verify your code, they have just one thing to break in with – as opposed to two things. Simple.
2FA is like a second lock on your door.
So make sure to enable it on everything.
3. Clicking on Suspicious Links (“Phishing”)
You get one of these emails: “Your bank urgently needs information from you!” “Your phone number needs to be verified!” …UGH, your palms get sweaty, your heart is thumping… you mean you gotta check this? Of course you do.
Legit companies don’t ask for your username and password. They just don’t.
They may ask you to login and check your account, but they will never directly ask for the password. There’s an emoji red‑flag right there. So in doubt, just go to the bank’s or Amazon’s website yourself, not through the link on the email.
4. Not Updating Software
Windows update. MacOS updates. Android updates. iPhone updates. Apps updates. We get bombarded with these every day, and we click “Later” on them with all the sincerity in the world, fully intending to do it properly later.
And then? Later never comes.
Problem is: hackers love legacy software. And there is a lot of it. Never‑updated, never patched, never looked after – it’s like a smashed window to your home.
So, how do you fix it? Set your apps to update automatically. Every Windows, MacOS, Android or iOS, does that.
Set it to check on your behalf and when you next power‑up your gadgets, you will never miss a patch again. You’ll barely even notice the thing happened, and you’ll be safer because of it.
5. Using Public Wi‑Fi without a VPN
You sit in the café, drinking coffee, eating some cake, writing important work emails on your laptop. Life is good. Oh. Did you check who else can listen in on this public network? You haven’t? Well, public Wi‑Fi is like shouting your passwords out in the open.
Don’t be a muppet. Use a VPN to encrypt your data and prevent prying eyes from accessing it. Like an invisibility cloak on the internet. Easy, safe.
6. Oversharing on Social Media
Birthday on Facebook? Check.
Doggo’s name in the pet description? Check.
Mother’s maiden name in your profile pic’s caption? Check.
Nice cat picture there, but that might be all the information a crook needs to create a fake you. And guess where all these details go into? Into verifying your account if the crook needs to do that.
No, seriously. Hackers connect the dots. Piece together bits and bobs of your life, then go bonkers through security questions that use your personal info.
Okay, deep breath. Not everything has to go online. Check your privacy settings. Lock down details. Think twice before posting exactly where you are right now.
7. Downloading Random Files or Apps
“Must have” browser plugin? Free movie app? Fancy checking out that new photo‑editing software that everyone is talking about?
You might be downloading malware. Like, an actual virus, to your computer.
Stick to official stores. Check reviews. If it looks dodgy, it probably is.
8. Ignoring Strange Behaviour on Your Devices
Phone doing funky stuff? Laptop randomly freezes? Browser keeps popping up advertisements, even though you are not in the safe‑search zone? Weird. Oh, so weird. Could be malware. Could be spyware. Hmmm. Stranger things have happened, and they can still happen.
Run antivirus software and malware‑checking apps, just in case. If needed, nuke the machine and reinstall from scratch. Better safe than sorry, right?
And if your personal information has already been compromised, you may be eligible for compensation. To see if you're eligible visit https://data-breach.com
9. Falling for “Tech Support” Scams
Phone rings. “Hello, this is Microsoft. We see that your computer is infected, and we need to take control to help you clean it up”. Chill-pills for 20 minutes, while you give them remote access. Realisation they are charging your card and hacking your data. Life is real.
No. Tech companies do not cold call. Ever. If someone is bothering you, end the call and deal with your laptop / computer / phone with someone you trust.
10. Throwing Away Old Devices without Wiping
Throwing old phones in the bin? Recycling laptops? Selling them to charity shops? The next owner might be going through your digital attic, looking for some gems. Photos, conversations, passwords and even financial data from long since deleted apps – they are all there. All gone if you wiped it properly.
Wipe old devices properly, before you get rid of them. Factory‑reset and then run secure‑erase programs on it to make extra sure there is nothing left for new owners to find.
The Silver Lining: You’re In Control
Here’s the good news: you can do this. You’re cleverer than the hackers when you’re being mindful. Yes, technology is constantly evolving and adapting. But we can too.
It’s just a case of mindset. It’s much easier than you might think. One change here. Another there. You will build some excellent habits. You will stop clicking where you shouldn’t. You will start defending your cyber home like a pro before you know it.
In fact, think of this as like the routine you have with brushing your teeth and locking your front door every day. It just becomes part of your day. It just happens. And that is peace of mind, that is worth all the extra few seconds in your day.
Related Categories
Ryan Terrey
As Director of Marketing at The Entourage, Ryan Terrey is primarily focused on driving growth for companies through lead generation strategies. With a strong background in SEO/SEM, PPC and CRO from working in Sympli and InfoTrack, Ryan not only helps The Entourage brand grow and reach our target audience through campaigns that are creative, insightful and analytically driven, but also that of our 6, 7 and 8 figure members' audiences too.