{"id":31434,"date":"2023-01-13T03:07:00","date_gmt":"2023-01-12T16:07:00","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/2023-cybersecurity-resolutions\/31434\/"},"modified":"2023-01-13T03:07:17","modified_gmt":"2023-01-12T16:07:17","slug":"2023-cybersecurity-resolutions","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/2023-cybersecurity-resolutions\/31434\/","title":{"rendered":"New Year&#8217;s resolutions for a secure 2023"},"content":{"rendered":"<p>Amid the many dramatic events of 2022, you could be forgiven for not noticing that <a target=\"_blank\" href=\"https:\/\/securelist.com\/ksb-2022-statistics\/108129\/\" rel=\"noopener\">numerous unwanted records<\/a> were set during the year in terms of the number of information leaks, serious computer security incidents, and other problems of the digital world. We here at Kaspersky all really hope that 2023 will be calmer, better \u2014 and want to do our bit to make that happen. You can too! Just adopt the following six simple resolutions to dramatically increase your personal security online and make the web a less scary place.<\/p>\n<h2>1. Kiss passwords goodbye<\/h2>\n<p>Last year did bring one major <strong>improvement<\/strong> in network security: the giants Apple, Google, and Microsoft simultaneously introduced passwordless sign-ins. Instead of a password, your device stores a unique cryptographic key for each site. There\u2019s no need to type it in, and it\u2019s extremely difficult to steal. You can read more about this interesting technology in our <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/passkey-future-without-passwords\/44418\/\" rel=\"noopener nofollow\">article<\/a>, but here we\u2019ll limit ourselves to a recently published GIF illustrating the login process:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2023\/01\/13030632\/2023-cybersecurity-resolutions-01.gif\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2023\/01\/13030632\/2023-cybersecurity-resolutions-01.gif\" alt=\"\" width=\"320\" class=\"aligncenter size-full wp-image-46763\"><\/a><\/p>\n<p>To date, not many sites support passwordless authentication, but you should still try to make the switch wherever it\u2019s offered. After all, it will slash the risk of your account being hijacked! It\u2019s also convenient \u2014 because you don\u2019t need to think up a password, memorize it (or, god forbid, write it down somewhere!), and later enter it.<\/p>\n<p>Chrome, Edge, and Safari already support the technology on both desktop and mobile platforms.<\/p>\n<h2>2. Go disposable<\/h2>\n<p>Information leakage remains one of the biggest digital risks for all of us. User data gets stolen from <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bbc.com\/news\/world-australia-63056838\">ISPs<\/a>, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.theguardian.com\/australia-news\/2022\/dec\/01\/medibank-hackers-announce-case-closed-and-dump-huge-data-file-on-dark-web\">insurance companies<\/a>, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/techcrunch.com\/2022\/08\/25\/doordash-customer-data-breach-twilio\/\">delivery services<\/a>, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/54-million-twitter-users-stolen-data-leaked-online-more-shared-privately\/\">social networks<\/a>, and even <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/techcrunch.com\/2022\/10\/03\/los-angeles-school-district-ransomware-data\/\">school databases<\/a>. The stolen data is then used to perpetrate various scams.<\/p>\n<p>Unfortunately, there\u2019s little we users can do to prevent leaks. But we can ensure there\u2019s less information out there about us, and make it harder to match: that is, comparing the names and phone numbers in two stolen databases wouldn\u2019t give an attacker any more info on us. To achieve this, we recommend giving minimal information to non-critical services (primarily online stores and commercial digital services) by not specifying your last name or social media accounts, and generally skipping optional fields. And use disposable e-mail addresses and phone numbers as your contact information. Numerous services provide temporary phone numbers for receiving confirmation texts, as well as one-time e-mail addresses \u2014 just google \u201cdisposable phone number\/e-mail address\u201d. Some paid services of this kind even offer disposable credit card numbers, which makes online shopping even safer.<\/p>\n<h2>3. Get away from toxic social media<\/h2>\n<p>Last year contained way too many negative events, plus the waves of hate on social media reached new heights. Some social networks, such as Twitter, were thrown into disarray due to technical reasons. If social media gave you the jitters in 2022, this year it\u2019s time to part company for good. Incidentally, we\u2019ve compiled a list of tips on how to <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/how-to-delete-instagram\/25025\/\" rel=\"noopener nofollow\">walk away<\/a> without losing valuable data.<\/p>\n<p>That said, some prefer not to quit, but to migrate, for example, to Telegram or Mastodon.<\/p>\n<h2>4. Stop doomscrolling<\/h2>\n<p>Social networks and news sites can consume hours of our time and lots of nervous energy. To avoid endless checking of news and posts, set a time limit on your phone for social networks and news apps. Start with an hour a day, and try to stick to it. Many vendors offer this feature: Apple\u2019s name for it is Screen Time, Google\u2019s is Digital Wellbeing, and Huawei\u2019s is Digital Balance. And if your children are spending too much time on social networks, <a href=\"https:\/\/www.kaspersky.com.au\/safe-kids?icid=au_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksk___\" target=\"_blank\" rel=\"noopener\">Kaspersky Safe Kids<\/a> can help.<\/p>\n<p><input type=\"hidden\" class=\"category_for_banner\" value=\"safe-kids\"><br>\n\u00a0<br>\nThose prone to deceive themselves by making up for the missing time on their devices should enable additional self-control tools in the settings of the social network itself. YouTube also has a such feature, called Take a Break.<\/p>\n<h2>5. Keep work and private life separate<\/h2>\n<p>Separating work and private life is good for many reasons. It aids both physical and mental health since work doesn\u2019t interfere with family-and-friends time, and domestic matters don\u2019t distract you during working hours. And your employer gets improved cybersecurity because you don\u2019t mix personal and work information, apps, and so on. Ideally, the separation should be physical, which means different phones and computers for work and private life. It remains only to remember not to use personal sites, e-mail, and social networks on your work device, and vice versa.<\/p>\n<h2>6. Observe digital hygiene<\/h2>\n<p>Use security software on all computers and phones. For each site that still requires a password, make it unique. Regularly update all apps and the operating system. These tips are nothing new, yet millions of people continue to ignore them, some out of ignorance, others out of laziness. You can avoid all the hassle by entrusting the whole routine to <a href=\"https:\/\/www.kaspersky.com.au\/premium?icid=au_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">a comprehensive solution from Kaspersky<\/a>. Among its many features are automatic updates for outdated apps, fixes for insecure Windows settings, a password manager for all platforms, and, of course, the best anti-spam, anti-phishing, and anti-malware protection in the business\u00a0 \u2014 \u00a0all packed into a sleek interface that\u2019s simply a pleasure to use. More details available on our website.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Six simple steps for personal digital security in 2023.<\/p>\n","protected":false},"author":2722,"featured_media":31436,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[961,187,43,131],"class_list":{"0":"post-31434","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-leaks","9":"tag-passwords","10":"tag-privacy","11":"tag-tips"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/2023-cybersecurity-resolutions\/31434\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/2023-cybersecurity-resolutions\/25071\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/2023-cybersecurity-resolutions\/20563\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/2023-cybersecurity-resolutions\/10385\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/2023-cybersecurity-resolutions\/27654\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/2023-cybersecurity-resolutions\/25393\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/2023-cybersecurity-resolutions\/25705\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/2023-cybersecurity-resolutions\/28265\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/2023-cybersecurity-resolutions\/27517\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/2023-cybersecurity-resolutions\/34518\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/2023-cybersecurity-resolutions\/11230\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/2023-cybersecurity-resolutions\/46761\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/2023-cybersecurity-resolutions\/19993\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/2023-cybersecurity-resolutions\/20578\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/2023-cybersecurity-resolutions\/29662\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/2023-cybersecurity-resolutions\/33150\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/2023-cybersecurity-resolutions\/28716\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/2023-cybersecurity-resolutions\/25758\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/2023-cybersecurity-resolutions\/31145\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/31434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=31434"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/31434\/revisions"}],"predecessor-version":[{"id":31435,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/31434\/revisions\/31435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/31436"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=31434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=31434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=31434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}