6 of the best cybersecurity tips for you in 2024

6 of the best cybersecurity tips for you in 2024

Introduction

The internet has broken age barriers, becoming a resource that caters to all generations. However, with the digital door now wide open, cybersecurity risks inevitably veer into view.

In this blog post, we’ll share common cybersecurity dangers that are looming (and how you can be a more aware digital citizen).

Groups at Risk for Cybercrime

At the end of the day, we’re all susceptible to scams. Below are some unique segments you might find yourself in (without realizing it). 

Gaming

Gamers beware: not all that glitters is gold. Gamers (especially younger gamers/Internet users) are vulnerable to online hacking due to their inherent trust and lack of experience in discerning malicious actors from genuine ones. Younger users often view the internet as a fun and exciting place without fully understanding the potential dangers lurking behind the screen.

Plus, with so many online activities requiring you to share personal information, it leaves less experienced users vulnerable to accidentally oversharing with the wrong people. Online gaming communities, social media, and chat rooms provide ample opportunities for predators to exploit users’ trust and manipulate them into divulging sensitive information or engaging in risky behaviors. 

Additionally, a younger user’s tendency to click on unfamiliar links or download unknown files increases the likelihood of encountering malware and phishing scams designed to steal their personal data.  

Professionals
  • I’ve been on the internet for a long time. I’ll spare you the embarrassing Facebook photos from 2012, but trust me— I’ve done my time. And even still, I’ve fallen for simple phishing scams. I’ve gotten texts exactly like the one below many times. Luckily I knew this was a scam. But if I hadn’t? Who knows.

6 of the best cybersecurity tips for you in 2024

Case in point: one of our Product Managers received this text back in August, posing as our CEO. 

Eager to please the boss, recipients (often interns or junior staff members) don’t fact check or think twice about this message at first. Usually, the text that follows asks them to go and get gift cards of some sort and promises that the company will reimburse them. 

For example, the scammer would ask for $400 in Apple Store Gift Cards for a “board meeting”. Once the employee secures gift cards for the “boss”, the scammer will then ask the employee to send photos of all of the unique gift card codes over text. Once the codes are sent, the scammer will block the employee forcing them to realize only too late it was a scam. 

Professionals are just as easy of a target as any other population. My one piece of advice is to not be so trusting— we can either be overconfident or worried about asking. No one will ever be upset if you ask to verify their identity, especially if they are more senior than you in the workplace. Having the ability to ask for verification goes a long way. 

Service scams

Service scams are mainly targeted at our elderly population. This is due to a combination of factors, including unfamiliarity with the latest technology and a tendency to be trusting. Scammers take advantage of these characteristics through tactics like phishing emails that mimic trusted sources, lottery scams promising big rewards for small upfront payments, or even impersonating relatives in need of urgent financial help. It’s crucial for seniors to remain vigilant and question any online request for personal information or money, and when in doubt, to reach out to a family member or a trustworthy friend for a second opinion before taking any action.

In short: we’re all susceptible to online attacks. Bummer. But staying aware can greatly reduce these types of risks. 

Types of Cybersecurity Risks

Imposter

According to USA.gov, imposter scammers may “call, text, or email to convince you they are someone in authority. They may even use caller ID to make it look like they are calling from an official government or business’ number. To commit identity theft, they try to get you to send money or a gift card or share personal information.”  The CEO impersonator scenario I used above is a perfect example of an Imposter scam.   

Phishing 

Phishing is a malicious attempt to obtain sensitive data such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication. Typically conducted via email, attackers may also use social media, text messages, or fake websites to lure victims.

A common example includes emails that mimic the appearance of a popular service or bank, urging users to “verify” their account details, often leading to a counterfeit website designed to steal information. Another example might be a message claiming that a user has won a contest and must enter personal details to claim the prize.

6 of the best cybersecurity tips for you in 2024

Anthony received this phishing email last week, posing as a receipt for an antivirus product he had not downloaded.

Malware

Malware is sneakier. It’s the virtual equivalent of a Trojan horse that can wreak havoc on your computer or phone. This kind of software can infiltrate your system through deceptive emails, infected websites, or even seemingly harmless downloads. Once inside, it can steal sensitive information, corrupt files, or even take control of your device without you realizing it.

It’s almost like having an uninvited guest in your home, rummaging through your belongings and causing chaos behind the scenes— yikes. 

Protecting against malware requires constant vigilance, regular software updates, antivirus scans (scroll ahead for recommendations on free services), and a healthy dose of skepticism toward any suspicious online activities.

All of these scam categories sound pretty similar. While the definitions are great to know, the tips below will help protect you in any of the above cases.

What You Can Do to Prevent Cybersecurity Risks

1. Use a Password Manager:

Utilizing a reputable password manager can be a game-changer. These tools generate and store complex passwords for each of your accounts, reducing the risk of unauthorized access. Make sure to create a master password that’s both intricate and memorable, and let the manager handle the rest. 

A password manager not only creates more security but also simplifies the often annoying task of managing numerous logins across various platforms. I personally use BitWarden, but do your own research to see what suits you and your lifestyle. 

2. Enable 2FA (Two-Factor Authentication):

Enhance your online security by implementing Two-Factor Authentication (2FA) wherever possible. This adds an extra layer of defense beyond your password, requiring a secondary verification step, typically a code sent to your mobile device. 

Enable 2FA on your email, social media, and your financial accounts to create an additional barrier for potential hackers. This extra step significantly reduces the risk of unauthorized access, even if your password is compromised. 

For this, I look to Duo, Google Authenticator, or Microsoft Authenticator. Apple also subtly added 2FA to the Settings app.

3. Use US Mobile

It’s more common than you think that your personal data is being stolen from companies you’ve relied on for years. 

Some of your most important personal information lives with your wireless carrier. Your address, credit card number, and of course your phone number! If your number is compromised, you’ll be locked out of any online account that uses 2FA, not to mention losing touch with important people.

There are options and US Mobile has the strongest security in the industry and a clean record to prove it. While we bring you the best coverage and the best price, we never cut corners.


Protecting customer data is crucial for our business to maintain trust and comply with legal requirements. Our lead security engineer Avenash said:

“We use robust cybersecurity software to protect against malware, viruses, and other online threats. We employ firewalls to control incoming and outgoing network traffic, and utilize encryption for data transmission and storage, ensuring that data is unreadable to unauthorized individuals.” 

Avenash Kumar, Lead Security Engineer @ US Mobile

We know your information is valuable, so we’ve taken every precaution to make sure it’s safe.

US Mobile requires that users create a strong and complex password when they register so that it’s harder for a hacker to guess. Plus whenever you login, we can send you a notification confirming that it’s you. This way, in the event it’s not you, we can immediately help you secure your account. Simply turn on Multi-factor authentication in your US Mobile settings to use this feature.

6 of the best cybersecurity tips for you in 2024

Caption: US Mobile’s Security Status feature makes it easy to bolster security in a few clicks.

Locked out? We also have Security Questions to keep your account secure from online predators. Additionally, we update and patch our security systems on a regular basis so that it remains difficult for hackers to break in and steal important information.

4. Never share sensitive information over the phone (without verifying):

In the era of increasing digital communication, it’s crucial to maintain a cautious approach, especially over the phone. With that being said, try not to share sensitive information, such as passwords or financial details during phone calls, as these conversations can be intercepted (or made by a scammer). 

Here’s how to do your due diligence on phone calls:

  • Be skeptical of unexpected calls, particularly those claiming to be from banks, tax offices, or tech support. 
  • Verify an unknown caller’s identity and the purpose of the call before divulging any confidential data.
  • If a caller requests sensitive information, verify their identity by calling back on an official number from the company’s website.

5. Review rules from services you use:
Each online service has specific rules and protocols. Take the time to review the security guidelines provided by the platforms you use, especially financial institutions. Understand the types of information they will never request, such as passwords or PINs.

Legitimate banks, for example, will never ask for sensitive information through email or texts. Familiarize yourself with these rules to discern genuine requests from potential scams, ensuring that you never inadvertently compromise your personal data.

The best way to do this? By logging onto the official website of said service. Major institutions and services usually have a “Privacy” or “Safety” tab, or at least some more information in their FAQ. 

6. Use Antivirus software to regularly scan your computer

Strong antivirus software can run daily checkups, regular deep scans, and even see threats coming to eliminate them before they take over your device. There are some incredible options out there that offer the essentials for free, with the option to add more bells and whistles for a premium.

Try these free antivirus programs to scan your computer for malicious files:

  • CleanMyMac X
  • Malwarebytes
  • Avast

Conclusion

I don’t want this to come across like an article based on fear-mongering. However, as technology progresses, it’s important to be aware of your digital surroundings (and how they are being woven into your real surroundings). 

I hope these tips allow you to navigate the ever-evolving landscape of cybersecurity. It’s important to understand the potential risks posed by malware and scammers. It’s like learning to recognize the warning signs of a potential break-in to protect your physical home; being aware of malware threats helps safeguard your digital presence. 

All this to say: a healthy dose of caution and awareness can go a long way in fortifying your defenses against cyber threats. 

What are some of your favorite cybersecurity tips/apps? Let me know below!

Disclaimer: US Mobile does not offer a blanket endorsement of any products/services mentioned herein. We urge readers to engage in their own research and discernment to effectively manage their online security.