(Technopedia: Last updated: May 13, 2021)
1. Multifactor authentication sounds like something vaguely related to math courses. Multifactor authentication is a login method that uses multiple methods to verify the identity of the user before allowing them to access a system. Multifactor authentication is a more secure method of login. Multifactor authentication takes two forms of known authentication and requires a third to allow a user to login. A password is usually the first step in the login process.
2. Youâ€™re still using the term hyperlink to describe links on a website. A hyperlink is a clickable word or phrase that takes you to another location when tapped or clicked. A hyperlink can be associated with an image, text, or buttons. While the term hyperlink is an accurate term for linked text on a web page, it has fallen out of use. Hyperlinks are simply referred to as links these days.
3. You think all website addresses are required to begin with WWW. When the World Wide Web was first created, the use of WWW wasnâ€™t intended to become a standard feature of domain names. Instead, it was an accidental setting that became a fixture of website addresses. Modern web browsers can take visitors to the right location (in most cases) without the need for WWW in a domain name. For example, techopedia.com resolves to the same location as
www.techopedia.com. Unfortunately, there are still instances where companies do not set up website addresses to resolve to the correct location without typing WWW. But as a general rule, every website address does not need to begin with WWW.
4. Your idea of a strong password is adding a number or symbol to your favorite p@ssw0rd. Strong, unique passwords are essential to keeping your data secure. Adding numbers or symbols to a password you use most isnâ€™t the best way to secure your accounts. Password cracking is typically automated so you need to rethink your password creation strategy. Consider using a password manager to generate and securely store passwords.
5. You scan any QR code you encounter because itâ€™s faster than typing. Quick response (QR) codes are commonly used to make it easier to open websites or get other information about a business. They can save keystrokes and get you to the web page or form you need in fewer keystrokes, but they can also be used for other less helpful activities.
Malicious QR code usage is gaining popularity as scammers seek to take advantage of its convenience. Consider the source of the QR code before scanning. (Read also: The Dangers of QR Codes)
6. You believe your personal data isnâ€™t valuable enough to be stolen by cybercriminals. Access to your personal data is valuable because it can be used for identity theft, to gain access to accounts that require answers to security questions, and to conduct financial transactions in your name. Though individual records may not fetch a high price, getting your identity back can take a lot of time and effort.
7. You donâ€™t think of your router as a household device that needs any attention. If you havenâ€™t updated the name and password for your wifi network or logged into your routerâ€™s administrative dashboard, you should consider getting to it soon. Techrepublic reports on how using default router information can leave your network open to attack. Consider changing your network name (SSID) and password as well as the password associated with your routerâ€™s administrative dashboard.
8. Youâ€™ve been ignoring notifications to update software you use every day. Do you find yourself hitting â€śremind me laterâ€ť or â€śsnoozeâ€ť for a really long time? Keeping software up-to-date is an important part of protecting your data and by extension, your network. Unpatched software is a prime target for exploitation. Check for updates and install them regularly to avoid trouble in the future.
9. You think keyboard shortcuts are like hidden levels on a video game youâ€™ve never played. While they can seem like mysterious button combinations that require a lot of concerted effort to master, theyâ€™re easy to learn with a few repetitions. Microsoft and Apple provide extensive listings for all available keyboard shortcuts. Other popular software makers, like Adobe also provide handy lists of keyboard shortcuts for each of their programs.
10. You think itâ€™s better to leave your computer on all the time. While it may be more convenient to leave your machine on, it can result in slower responses from applications and hardware. Thereâ€™s no hard and fast rule for how often you should reboot or shut down your computer; Itâ€™s a good idea to reboot regularlyâ€”some recommend doing so weekly.
Michelle Greenlee is a freelance technology writer with more than 15 years of website development experience and a frequent contributor to techopedia.com. Sheâ€™s passionate about improving user experience though clear communication and has created technical content for a range of brands and publications. Her work has appeared in IBM Security Intelligence, Business Insider, GE Digital, HP Enterprise, and TechTarget. She has covered digital marketing, website development, enterprise software, cybersecurity, and big data analytics. (techopedia.com/contributors/michelle-greenlee)