Simple cybersecurity guide for non-geeks in 2024

There is no surefire way of completely protecting yourself and your digital life against cybercriminals, data loss and so on. (Just being honest!) But a few simple cybersecurity habits will go a long way in minimising the risk.

Cybersecurity doesn’t have to be complicated! A few straightforward practices will go a long way to keep your digital life secure. Here’s a condensed, jargon-free guide to help minimise the chances of running afoul of cyber criminals and other online nasties!

Heads up! We may earn a commission for any products or services purchased via links in this post. The money we make through these links helps keep the lights on and the wheels turning. Thanks for supporting us!

Keep software current to stay ahead on cybersecurity

Software updates may seem tedious, arriving at the most inconvenient times and potentially causing disruptions to your device’s performance. But, these updates are not merely for introducing new features or improving user interface. A substantial part of these updates involves enhancing the security of your devices and fixing vulnerabilities that might have been identified since the last update.

Understanding software updates

Software updates, sometimes referred to as ‘patches’, are released by software developers to address issues or enhance functionality within their programs. Among these improvements are often fixes for ‘bugs’ or vulnerabilities in the system, which if left unaddressed, could potentially be exploited by hackers. These security loopholes can range from minor issues, having little impact on the user, to major vulnerabilities, which if leveraged, can lead to massive data breaches.

Why are updates essential?

Cybercriminals are constantly evolving their methods, looking for new vulnerabilities to exploit in widely used software. When these vulnerabilities are identified by the software companies, they develop a fix or patch to eliminate the weak spot and release it as a part of a software update.

If users do not apply these updates, they are effectively leaving the door open for cybercriminals. Running outdated software is akin to leaving your front door unlocked – it makes it easier for an intruder to enter.

Risks of not updating

Outdated software not only makes your devices an easier target but also increases the potential damage if a breach occurs. Cyber attacks can result in loss of personal data, financial damage, and in the case of smart home devices, potential physical security risks. It’s important to consider the updates as your first line of defense against these threats.

Update all your devices

The importance of software updates extends across all devices you use. This includes not just your computer, but also smartphones, tablets, smart home devices, and even seemingly ‘non-smart’ devices that connect to the internet. Remember, cybercriminals can potentially exploit any device connected to the internet.

Keep up with updates

One simple strategy to keep your software up to date is to enable automatic updates. Most devices and software offer this feature in the settings menu, allowing updates to be installed as soon as they’re released, often overnight when the device is not in use.

If automatic updates aren’t an option, consider setting a regular schedule to manually check for and install updates. This habit can greatly enhance the security of your devices.

Strong passwords are essential for good cybersecurity

Use strong, unique passwords

Passwords are your first line of defense against cyber threats. Just as you wouldn’t use a flimsy lock for your front door, you shouldn’t compromise when it comes to your digital passwords. They may seem like just a string of characters, but they form the primary barrier between your personal information and potential cybercriminals. This article highlights the importance of using strong, unique passwords and introduces password managers as a key tool in managing these digital keys.

The strength of your password matters

Consider passwords as the digital equivalent of your home’s lock. The stronger and more complex it is, the harder it will be for a burglar to break in. The same principle applies to your digital security. A strong password, comprising a mix of uppercase and lowercase letters, numbers, and symbols, is not easy to guess and much harder for hacking tools to crack.

Simple and commonly used passwords are incredibly easy for hackers to guess. Passwords like ‘123456’, ‘password’, or ‘admin’ are equivalent to leaving your digital front door wide open. Hence, it’s vital to use complex and unpredictable passwords for every online account.

The risk of password duplication

Using the same password across multiple platforms is another common mistake. While it might be easier to remember, if a cybercriminal cracks that one password, they have the keys to all your online accounts. This is known as a ‘domino effect’ and can lead to a disastrous breach of your digital privacy and security.

The role of password managers

Remembering multiple complex passwords for different accounts can seem like an impossible task. This is where password managers come into play. These are secure applications that store all your passwords in an encrypted format. You only need to remember one master password to access your password vault, and the password manager does the rest.

Password managers can also generate strong, random passwords for you, eliminating the risk of creating predictable or weak passwords. They are designed with strong encryption algorithms to ensure your passwords are stored safely.

We use this!
Bitwarden - a trustworthy password manager

Bitwarden is a slightly less well-known password manager. That doesn't mean it's any less good. With no known major security breaches (at the time of writing this), an excellent free plan (with features that most other password managers charge you for) and great paid updates, we highly recommend checking out Bitwarden if you need a password manager to take care of your passwords.

We earn a commission if you make a purchase, at no additional cost to you.

Double down on cybersecurity: The role of two-factor authentication

While strong and unique passwords provide a solid first line of defense, they aren’t impenetrable. Here is where two-factor authentication (2FA) steps in. This article delves into the importance of enabling 2FA and how it provides an additional layer of security for your digital life.

Understanding two-factor authentication

Two-factor authentication, also known as 2FA, is a cybersecurity protocol that requires two forms of verification before allowing access to an account. It’s akin to a second lock on your door, providing an extra layer of protection even if the first one is broken.

Typically, the first factor in 2FA is something you know (your password), and the second factor is either something you have (like a unique code sent to your mobile device) or something you are (such as a fingerprint or face scan).

Why is two-factor authentication important?

The main purpose of 2FA is to make it harder for potential intruders to gain unauthorized access to your accounts, even if they have managed to crack your password. Without the second factor, they would still be locked out.

Imagine a hacker manages to guess or steal your password. If you’ve enabled 2FA, they’ll be prompted for a second verification step. Unless they have access to your phone to receive a unique code, or to your fingerprint or face scan, they’re still locked out.

Enabling two-factor authentication

Most online platforms today offer 2FA as an option. It’s usually found in the settings under security or privacy. While it may take an extra moment to log in to your accounts, the additional security is worth the time.

The second factor in 2FA varies depending on the platform. Some send a unique code to your email or mobile device. Others might use biometric data, such as a fingerprint scan or face recognition, especially on smartphones. There are also dedicated 2FA apps like Google Authenticator or Authy that generate timed codes.

Two-factor authentication: A small step, a big leap in security

Even with 2FA enabled, it’s crucial to continue practicing other security measures, such as regularly updating your software and using strong, unique passwords. No single security measure is foolproof, and each one adds another layer of protection against potential threats.

Stay safe on public Wi-Fi

From coffee shops to airports and libraries, public Wi-Fi networks have become ubiquitous. They offer a convenient way to stay connected on the go. But while these networks provide a great service, they also come with significant security risks. This article will delve into why public Wi-Fi can be risky and how you can protect your data when using these networks.

Understanding the risks of public Wi-Fi

Public Wi-Fi networks are usually unencrypted, which means that the data you send and receive over the network isn’t secure. Hackers can easily intercept this data, gaining access to sensitive information like passwords, emails, and credit card numbers. This is often done through a method known as “Man-in-the-Middle” attacks, where the attacker positions themselves between the user and the connection point.

Furthermore, cybercriminals often set up rogue Wi-Fi hotspots that mimic legitimate networks. Unsuspecting users might connect to these networks, giving the attacker direct access to their device and data.

How to safeguard your data

Despite these risks, there are steps you can take to protect your data when using public Wi-Fi:

  1. Limit your activity: Avoid accessing sensitive information, such as your bank accounts or any other financial or personal data, while connected to a public network.
  2. Use HTTPS: When browsing, check for ‘https’ at the beginning of the web address. This indicates that the site uses encryption to secure the data transferred between your device and the site.
  3. Turn off sharing: On a public network, disable file sharing options and make sure your firewall is active.

The role of a VPN

One of the most effective ways to ensure your online activities remain private is by using a Virtual Private Network (VPN). A VPN encrypts the data leaving your device until it reaches its destination. Even if someone intercepts your data, all they would see is encrypted information.

VPNs work by creating a secure, encrypted tunnel between your device and the VPN server. They also mask your IP address, adding an extra layer of privacy. Today, there are many VPN services available, with options to fit different needs and budgets.

Smart homes, secure homes: Protect internet-connected devices

Smart home devices, from thermostats to security cameras, bring convenience and efficiency to our lives. But, as with any technology that connects to the internet, they also carry security risks.

Hackers can potentially exploit vulnerabilities in these devices, gaining unauthorized access to your home network and data. This article will guide you through crucial steps to secure your smart home devices.

Risks of smart home devices

Every smart device in your home represents a potential entry point for cybercriminals. By hacking into a weakly protected device, they can infiltrate your home network and compromise your privacy and security. For example, a hacked security camera could provide a live feed of your home to an intruder, while a compromised smart speaker could listen in on your conversations.

Manufacturers often release software updates that patch security vulnerabilities and improve functionality. Regularly updating your devices ensures they have the latest protections against potential threats. Where possible, enable automatic updates to maintain the most up-to-date security.

Beware of phishing

Phishing scams deceive users into voluntarily providing sensitive information, often by masquerading as a trustworthy entity. This article aims to educate readers about phishing scams, their implications, and how you can protect yourself from becoming a victim.

Unpacking phishing scams

Phishing scams typically come in the form of an email, text message, or phone call that appears to be from a legitimate source, such as a bank, social media platform, or reputable company. The scammer tricks the user into divulging sensitive information like usernames, passwords, credit card numbers, or social security numbers, under various pretexts.

For example, a phishing email might alert you to a security breach in your bank account, urging you to confirm your credentials, or warn you about a parcel delivery failure, asking for personal data to resolve the issue.

The dangers of phishing

The consequences of falling victim to a phishing scam can be severe. If scammers gain access to your sensitive data, they could potentially drain your bank account, make fraudulent purchases, steal your identity, or even compromise your entire digital life.

How to protect yourself from phishing scams

There are several ways to arm yourself against phishing attempts:

  1. Scrutinize unsolicited communication: Be wary of unexpected emails, text messages, or calls that ask for personal information. Legitimate organizations usually do not request sensitive data via these channels.
  2. Check for email red flags: Phishing emails often have misspellings, poor grammar, or unofficial email addresses. The tone may be urgent, pressuring you to act quickly.
  3. Hover over links: Without clicking, hover over any hyperlinks in emails. This action will reveal the actual URL. If it doesn’t match the text or seems unrelated to the supposed sender, it’s likely a scam.
  4. Be cautious with attachments: Be wary of unsolicited emails with attachments, as they can contain malware. Only open attachments from trusted sources.
  5. Enable two-factor authentication (2FA): Using 2FA on your accounts provides an extra layer of security, making it more challenging for phishers even if they obtain your username and password.
  6. Report suspicious activity: If you come across a potential phishing scam, report it to your email provider and the supposed sender. This action helps protect others from the same scam.

A safety net for your digital life: Keep regular backups

Data is one of the most valuable assets. From precious photos and personal documents to work files and financial information, losing such data can be devastating. One of the most effective ways to safeguard your digital life is to regularly back up your data. This article will walk you through why data backup is so crucial and how you can do it effectively.

Understanding the value of backups

A backup is essentially a copy of your data stored in a secondary location. In the event of a cyber attack, device loss, or even just accidental deletion, having a backup means you won’t lose everything. It’s the digital equivalent of an insurance policy for your valuable data.

Without regular backups, you risk losing everything stored on your device in an instant. This loss can stem from various incidents such as hardware failure, theft, natural disaster, or a ransomware attack, where cybercriminals encrypt your data and demand payment to unlock it.

How to back up your data

External drives: External hard drives or USB drives can be used to store copies of your files. The benefit of this method is that your data remains physically close to you. However, these drives can also be lost, damaged, or stolen, so they shouldn’t be your only backup.

Cloud services: Cloud backup services like Google Drive, Dropbox, or Apple’s iCloud offer a more robust solution. They automatically sync your files to the cloud, allowing you to access them from any device with an internet connection. They also have high levels of redundancy, meaning your data is stored in multiple locations for added security.

While backing up your data is a crucial step, it’s equally important to ensure your backups are secure. If you’re using a cloud service, this means protecting your account with strong passwords and enabling two-factor authentication (2FA).

Remember, the goal is to keep your data out of the wrong hands, even when it’s backed up.

Check this guide!
How to back up your digital life

The importance of regularly backing up data cannot be understated. From family photos and personal documents to important work files, our lives are increasingly stored in digital form.

But, despite its importance, data backup often remains a misunderstood and neglected practice for many.

With the 3-2-1 rule, you can protect your data against a wide variety of threats, from hardware failure to natural disasters.

We earn a commission if you make a purchase, at no additional cost to you.

Your digital bodyguard: Use antivirus software

woman in black shirt using laptop computer

Cyber threats come in various forms, each with its unique way of compromising your digital safety.

Viruses and worms can corrupt your data or degrade your device’s performance. Spyware can monitor your activities, stealing sensitive information such as passwords or credit card numbers. Ransomware can lock you out of your system, holding your data hostage until a ransom is paid.

Given these threats, it’s clear that some form of protection is necessary. That’s where antivirus software comes in.

The role of antivirus software

Antivirus software acts as a digital bodyguard for your device. It monitors for any malicious activity, scrutinizes suspicious files, and blocks or removes threats before they can cause harm. It’s your first line of defense against many of the threats that lurk in the digital landscape.

Modern antivirus software doesn’t just protect against viruses. It also guards against a range of malware, including spyware, ransomware, and phishing attacks. Some even come with features such as firewalls or parental controls, offering a more comprehensive security solution.

Keeping your antivirus software up to date

However, it’s not enough just to install antivirus software and forget about it. Cyber threats are continually evolving, with new strains of malware appearing regularly. To combat these emerging threats, antivirus software must be kept up to date.

Manufacturers regularly release updates that equip the antivirus software with the tools it needs to tackle the latest threats. These updates can include new virus definitions, improved detection techniques, or fixes for any software vulnerabilities. By ensuring your antivirus software is updated, you can stay one step ahead of cybercriminals.

Guard your digital gates: Understand and manage app permissions

Apps often request access to various data and features on our devices – a concept known as app permissions. While some of these permissions are necessary for the app to function correctly, others might be superfluous, encroaching on your privacy. This article will explore the importance of reviewing and managing app permissions.

The scope of app permissions

From accessing your camera or microphone to reading your contacts or location, apps can request a wide range of permissions. Sometimes these permissions are essential; for instance, a navigation app needs your location to provide directions. However, not all apps require broad access to function, and some might ask for more permissions than necessary.

Unchecked app permissions can lead to privacy risks. For instance, an app with access to your contacts could potentially share this information with advertisers. Similarly, an app that can access your microphone could theoretically listen in on your conversations.

Reviewing and managing app permissions

Here’s how you can maintain control over your app permissions:

  1. Understand before you install: Before downloading an app, understand what permissions it requests and why. If an app asks for access that doesn’t align with its purpose, consider it a red flag.
  2. Regular reviews: Regularly review the permissions for each app on your device. Both Android and iOS offer ways to view and manage app permissions through their settings.
  3. Restrict unnecessary permissions: If you find an app with permissions it doesn’t need, restrict them. You can usually do this through the settings on your device.
  4. Update your apps: App updates often include security patches and might also reduce the permissions the app requires.

The digital vault: Encrypt your data for enhanced security

Encryption provides an added layer of protection for your sensitive data, turning it into an unreadable code that can only be deciphered with the correct key.

What is encryption and why is it important?

Encryption, at its core, is a method of disguising data so that only authorized parties can understand it. It transforms readable data, known as plaintext, into an encoded version, called ciphertext. This process requires a key, and only with this key can the ciphertext be converted back to its original form.

This mechanism is vital for protecting sensitive information from being accessed by cybercriminals or prying eyes. Even if an unauthorized party manages to intercept the data, without the correct key, they will see nothing but gibberish.

Implementing encryption in your digital life

While the concept of encryption may seem complex, applying it to your everyday technology use is surprisingly straightforward:

  1. Device encryption: Most modern smartphones, computers, and tablets have built-in encryption capabilities. For example, iPhones automatically encrypt data when you set a passcode, while Android devices usually have an encryption option in the security settings. For computers, both Windows and Mac provide built-in encryption tools, namely BitLocker and FileVault, respectively.
  2. Encrypted communication: For sensitive conversations, consider using communication apps that offer end-to-end encryption, like Signal or WhatsApp. This encryption ensures that only you and the person you’re communicating with can read the messages.
  3. VPNs: A Virtual Private Network (VPN) encrypts the connection between your device and the internet, protecting your data from potential eavesdroppers, especially on unsecured public Wi-Fi networks.
  4. Encrypted cloud storage: When using cloud storage services, opt for providers that offer encryption, like Google Drive or Dropbox. However, always remember to use strong, unique passwords and enable two-factor authentication for an added layer of security.


Navigating the digital world can often feel like walking a tightrope. But, with the right precautions it’s not only manageable… It’s empowering!

Think about it: by staying on top of updates and creating strong, unique passwords, you’re taking active steps to keep your personal information safe. It’s not rocket science, it’s just smart web-surfing.

Enabling two-factor authentication adds another layer of security, while being careful on public Wi-Fi networks is a simple way to protect your data.

Similarly, securing your smart home devices and staying sharp against phishing scams can significantly reduce your vulnerability. Regularly backing up your data is like having a safety net—yes, things can go wrong, but you’ve got a plan.

With updated antivirus software and smart management of your app permissions, you’re staying one step ahead. And through data encryption, you’re putting your information in a virtual safe.

Cybersecurity and keeping your digital information is not about fear, It’s about feeling confident and secure in your digital life! Remember, you’re not just a bystander. Putting in place a few simple cybersecurity habit places you in control.

Related articles

Still the BEST camera to film walking videos in 2024? GoPro HERO 11 Black review

We do an in-depth review of the GoPro Hero 11 Black action camera to find out how it holds up for filming POV walking videos.

The complete guide to Microsoft PowerToys (2024)

With 22 utilities and counting, Microsoft PowerToys is an increasingly useful selection of tools to help improve how Windows works for you!

How to fix Dropbox Updater runtime error

Are you getting an annoying runtime error for Dropbox Updater when you fire up or shut down your computer? Read on, as we may have a fix for you!

Hey GoodGeeky, make me a travel itinerary! Using AI!

Say goodbye to stressful holiday planning and hello to personalized trip itineraries. Introducing the GoodGeeky AI-powered travel assistant!

Find the perfect Christmas present with this FREE AI-powered gift guide!

Looking for the perfect gift for the geek in your life? Check out our brand new AI-powered gift guide!
I'm a writer, content creator and all-round creative. When I'm not writing for GoodGeeky, I film and edit YouTube videos, write books (which never seem to get finished), practice martial arts (while trying not to do my knees in or get kicked in the face), build websites and intranets, and work for The Man.