https://www.spiceworks.com/it-security/identity-access-management/articles/what-is-multi-factor-authentication/

5 simple Cyber habits to start practicing before Cybersecurity Awareness Month

Spread the love

Cybersecurity threats are no longer an abstract problem that only governments or multinational corporations need to worry about. Every individual with a smartphone, laptop, or social media account is at risk. Phishing emails, weak passwords, unpatched apps, and ransomware attacks all prey on daily digital behaviour. In fact, the 2024 Verizon Data Breach Investigations Report highlighted that 74% of breaches involved a human element, including error, misuse of privilege, or social engineering (Verizon, 2024).

With Cybersecurity Awareness Month 2025 approaching in October, now is the ideal time to strengthen your digital hygiene. Just as you wash your hands to reduce the spread of germs, practising good cyber habits reduces the likelihood of falling victim to online threats. The best part? These steps do not require technical expertise. Here are five simple habits you can begin today to secure your digital world before October.

1. Strengthen your passwords and use a Password Manager

Weak or recycled passwords remain one of the leading vulnerabilities in cyber incidents. Attackers exploit password reuse across multiple accounts in what is known as “credential stuffing.” For instance, if one online shopping platform is breached, attackers will test the stolen credentials across banking, email, and social accounts. According to the UK’s National Cyber Security Centre, “123456” remains one of the most commonly used passwords worldwide (NCSC, 2024).

Action steps:

  • Use long, unique passwords (at least 12–16 characters).
  • Avoid personal details that can be guessed from social media.
  • Adopt a password manager to store and generate strong credentials.

This habit alone significantly reduces the risk of unauthorized access.

2. Turn on Multi-Factor Authentication (MFA) everywhere

Passwords are a single layer of protection that can be compromised. Multi-Factor Authentication (MFA) requires a password plus an additional factor such as a code, biometric, or push notification. Google found that enabling MFA can block up to 99% of automated account takeover attempts (Google Security Blog, 2024).

Action steps:

  • Enable MFA on your primary email, social media, and banking accounts.
  • Choose an authenticator app over SMS codes when available, as SIM-swapping can bypass text verification.

Though it may feel inconvenient initially, MFA is one of the strongest defences against online intrusion.

3. Think before you click: Stay alert to phishing

Phishing remains the most successful attack method globally. Fraudsters now use artificial intelligence tools to generate convincing emails, SMS messages, and even voice calls. Europol’s Internet Organised Crime Threat Assessment (IOCTA) reports that phishing is increasingly combined with ransomware and business email compromise, making vigilance essential (Europol, 2024).

Action steps:

  • Double-check sender email addresses carefully.
  • Hover over hyperlinks to inspect their true destination.
  • Treat urgent messages demanding immediate action with scepticism.
  • Verify requests through another channel if unsure.

The habit of pausing to think before clicking is one of the simplest yet most effective ways to avoid compromise.

4. Keep your devices updated

Ignoring updates leaves devices open to known exploits. Cybercriminals regularly scan the internet for outdated systems with unpatched vulnerabilities. The Cybersecurity and Infrastructure Security Agency (CISA) regularly warns that most exploited flaws are not new but rather known weaknesses that organisations and individuals failed to update (CISA, 2025).

Action steps:

  • Enable automatic updates for operating systems, browsers, and apps.
  • Regularly restart devices so updates can finish installing.
  • Do not neglect IoT devices such as routers and smart TVs, which are often forgotten but equally vulnerable.

A few minutes of updating can prevent major breaches.

5. Back up your data regularly

Backups are your insurance against cyber incidents, device theft, or natural disasters. Ransomware attacks are particularly devastating if you have no way of recovering encrypted files. Following the 3-2-1 backup rule, three copies, two media formats, one off-site, ensures resilience (CISA, 2025).

Action steps:

  • Automate cloud backups for essential files.
  • Use an external hard drive as a secondary option.
  • Regularly test your backups to confirm files can be restored.

This simple habit guarantees that even if attackers strike, they cannot hold your data hostage.

Putting it all together

Good cyber habits are not about perfection but about consistency. By gradually embedding these practices into your daily routine, you reduce your digital risk profile. The five habits can be summarised as follows:

  1. Strengthen your passwords and use a password manager.
  2. Turn on MFA wherever possible.
  3. Pause and think before clicking suspicious links.
  4. Keep your devices updated.
  5. Back up your data consistently.

The theme for Cybersecurity Awareness Month 2025 is “Secure Our World.” This begins with you. Every small step contributes to a safer digital ecosystem, whether for your family, your workplace, or your broader community. Cybersecurity is often described as a technology challenge, but in reality, it is a human challenge. By taking action now, you make yourself a stronger line of defence.

References

CISA (Cybersecurity and Infrastructure Security Agency) (2025) Secure Our World. Available at: https://www.cisa.gov/secure-our-world

Europol (2024) Internet Organised Crime Threat Assessment (IOCTA). The Hague: Europol.

Google Security Blog (2024) Multi-Factor Authentication Adoption and Effectiveness. Available at: https://security.googleblog.com

NCSC (National Cyber Security Centre) (2024) Weak Password Report. London: UK Government.

Verizon (2024) Data Breach Investigations Report. New York: Verizon Communications.

Alex Kleinsmith Avatar
Please share:

image sources

Enjoy this blog? Please spread the word :)

Verified by MonsterInsights