Secure Browsing Online - Improve Browser Security

Secure Browsing Online - Improve Browser Security

5 Actionable Tips for Secure Browsing Online, improve your browser security for Safer Web Browsing from KT – Head of Security at Tresorit.

As you browse websites every day, you create a digital footprint, and expose yourself to malicious attackers, who could steal your confidential information or even take full control over your devices.  Its time to take control of your data with our helpful tips for secure browsing.

Our security expert KT explains common risks of unsecure browsing online, and how you can protect yourself from those by implementing the below tips.

Malvertising campaigns

Online advertising is a common way to monetize a website. But even well-known and trustworthy sites are a target of “malvertising” (malicious advertisements).

Hackers breach the security of third party ad providers, and insert malicious code into their ads. Pop-up ads or tempting free downloads trick users to download and execute infected programs, provide sensitive information, or they directly steal data from the user’s profile on a given website.

Tip 1.  Block ads and third-party trackers.

Several softwares can do this without ruining the navigation experience:

  • Adblock Plus, a free, reliable tool to block all sorts of ads: banners, pop-ups and videos. You can configure which kind of ads are “acceptable” and which aren’t
  • Disconnect is a software that blocks trackers and allows for private search, keeping your online activity and data private.

Outdated software with security vulnerabilities

With every new update for your browser, the software creator fixes serious security vulnerabilities which can be used to take full control over your computer. If you visit an infected website, your browser automatically runs the malicious code, which can even be used to take full control over your computer.

Tip 2. For Secure Browsing Update your browser regularly

Run software updates regularly. These provide security improvements, product enhancements and bug fixes that can both improve your user experience and protection.

Outdated software plug-ins

Plug-ins such as Flash, may start automatically when you enter a website. If the website contains infected code, the plugin will automatically run the code exposing your device to risks. Plug-ins that are most prone to vulnerabilities are Java, Adobe Reader and Silverlight.

Tip 3. For Secure Browsing Disable plug-ins from running automatically

Always update your plug-ins or delete the ones you don’t use.
To prevent malicious code from infecting your computer, visit the plug-ins page of your browser and disable them from running automatically.

On Chrome and Firefox you need to check each plug-in permission individually, while Safari allows for all plug-ins to be disabled at once. Web browsers keep on changing the way they display plug-in permissions, so make sure to check your permissions periodically and learn how to manage them.

Leaked passwords

If a website is hacked, and your password exposed, hackers may use the leaked password to try accessing your accounts in other online services, such as your online bank account, email or social network accounts.

Tip 4. for secure browsing, Use 2-step verification

Where available, this solution allows you to be notified when someone accesses your account, and adds an extra layer of security.

Tip. 5 Use different passwords on every website

For secure browsing use strong passwords and choose different ones for each site. I recommend using a password management application such as LastPass or KeePass. They are secure, and can help you to automatically generate strong passwords for each site.

+1: To stay on top of your online privacy, I recommend subscribing to https://haveibeenpwned.com/, run by acknowledged security expert Troy Hunt. You can check whether your password for a certain account has been leaked, and if so, change that password immediately on any website where you use it.

Thanks to KT’s efforts, Tresorit was one of the first cloud services to integrate the highest level of security without sacrificing user experience.
A best-in-class security talent, KT and his team are among the top 5 global finalists in 2015, for mastering various Capture the Flag (CTF) security challenges. They have been invited to some of the most prestigious international security competitions, including DEFCON CTF in Las Vegas where they qualified 11th in the Finals, after solving various cryptographic and reverse engineering challenges.
KT was recently acknowledged by Microsoft for discovering a system vulnerability that otherwise could have exposed billions of Microsoft users and enterprise networks to hacker attacks.