With long workdays and jam-packed weekends, it’s a godsend that we can do most of our shopping, social interaction, and many other day-to-day tasks from the convenience of our computers and mobile devices. The internet has been making our lives so much easier for the last couple of decades.

To get a bigger picture, here are some impressive stats about internet usage around the world:

Considering so many people going online regularly, it comes as no surprise that many criminals attempt to steal their personal data.

Cybersecurity is an issue that most of us delegate to tech companies. However, as you can see from the infographic below, we can do a lot by ourselves to prevent intruders from stealing the data. The first step should be to take this issue seriously.

A lot of people believe that they could not be targets because they don’t keep confidential information online, such as credit card details. You would be surprised, however, that criminals are not only after such data.

Your basic info like date of birth and phone number that you voluntarily provide on Facebook could be sold on the dark web and later used for social security frauds.

A study conducted by Pew Research Center found that 64% of adult Americans have suffered from the consequences of a major data breach.

According to a site created by Microsoft Regional Director, Troy Hunt, that helps users determine whether their accounts have been exposed, there are presently over 7.7 billion compromised email addresses from different breaches.

Even social media giants like Facebook were proven to be vulnerable. The social network suffered an attack when 50 million accounts were compromised as recently as September last year.

Think you’re safe because you’re browsing the internet on your phone? Think again.

When you connect to a public Wi-Fi hotspot, for example, you become a prime opportunity for hackers to access any information stored on your device.

What can you do to protect yourself without investing a dime into cybersecurity software? What are the best practices to follow to dodge attacks?

Check out the infographic below to find the answers.

Cyber security