Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.

HP TECH TAKES /...

Exploring today's technology for tomorrow's possibilities
HPImage

A Student's Guide to Cybersecurity: Protecting Your Data

Linsey Knerl
|
Cybersecurity is the action you take to keep criminals from accessing your devices, systems, or personal information. While cybercrime is on the rise, college-aged adults are particularly vulnerable.
Fraud reports are more likely to be filed by someone between the ages of 20 and 29 than by someone over the age of 50. The FBI reports that in 2023, it was most common for young adults to be targeted through social media and payment apps, and online shopping presented most of the opportunities to be harmed.
Fortunately, hackers and thieves cannot get to your financial or personal information if you take some steps to protect yourself. The most effective tips for student cybersecurity can be learned by anyone and practiced daily.

Understanding the threats

HPImage
Any electronic device that can connect to the internet is an opportunity for cyber criminals to try to exploit. While not a complete list of the threats that exist, these are the most common.

Malware

Malicious software, or “malware,” is any software, app, or program made to disrupt or harm your computer or systems. You may willingly download it thinking it’s a legitimate app, or it could come bundled with more reputable software. Signs of malware include a slow PC, excessive pop-ups, or changes to files or settings. Malware is the more general term for specific types of risks like spyware or ransomware.

Spyware

A type of malware that infects your devices and shares your data with your permission is called spyware. Anything from your credit card numbers to personal photos is at risk of being transmitted when spyware gets installed on your computer or phone. It can follow you as you shop, chat with friends, or share photos and videos on social media. If you do it while spyware is running, there’s a risk that it may go public or be used against you.

Ransomware

Ransomware is another category of malware that accesses your personal files or data, then threatens to steal, destroy, or publish it if you don’t pay a ransom. Some ransomware works by locking you out of your accounts or devices until you pay; others give you a timeframe to send money before your information is compromised.

Phishing

Another kind of cybercrime is phishing, in which a criminal pretends to be a legitimate business or someone you know. They will try to get you to share information to help them steal or take over your accounts, and they can be very sophisticated in how legitimate their messages appear. They may ask for a password, banking information, or personal login details, often by asking you to put it into a fake website that appears to be from your bank or favorite shopping site.

Artificial intelligence (AI) crimes

The newest category of cyber threats has to do with the rise of AI. Criminals may use AI-generated audio, video, or photos to try to convince you that they have information they don't have or even threaten to spread false media unless you pay a ransom.
Fake ChatGPT and other generative AI tools are popping up, as well. They look like the real ChatGPT but use the information you put in to steal your financial information or identity. Also, use a reputable AI tool and visit the website by typing out the URL yourself. Whether your school allows you to use ChatGPT is another issue, but even if you are using it for fun, you should stay alert to this newest type of scam.

Cybersecurity best practices

HPImage
While criminals have designed new ways to steal information or money, they often can’t do it without your permission. Here are the top online safety recommendations you can follow to reduce your risk.

1. Create strong, unique passwords

  • Make your passwords a combination of letters, numbers, and symbols, and don’t use family or pet names.
  • Keep personally identifiable details out of your passwords, and never use the same password for two different sites.
  • Change your password frequently.

2. Recognize and avoid phishing attempts

  • Read emails from businesses or shopping sites carefully to be sure they are legitimate. Check the “from” address, hover over links without clicking, and pay attention to odd-sounding phrasing.
  • Don’t click links inside emails, especially if they prompt you to change your password or enter sensitive info. Instead, type out the website address in a separate window and start a new session.
  • Don’t react to emails that show a large, unrecognized charge or that threaten you with an unpaid bill. Reach out to the company directly through another method if you are concerned there has been a mistake.

3. Regularly update and patch software

  • Set your computer and devices to accept automatic updates for your operating system and security software.
  • Any critical updates should be applied immediately and not postponed.
  • Non-essential apps and programs should be updated regularly. If an app no longer receives security updates, consider removing it.

4. Use a trusted antivirus program and firewall

  • Continue using the software that came installed on your device, or consider another reputable option.
  • Perform regular security scans and take action when alerted to an issue.
  • Don’t turn off your firewall, even if it prevents a product or service from operating.
  • Consider ad blockers, pop-up blockers, and services that disrupt tracking cookies.
  • Listen to warnings from your security software about unknown sites, potential download risks, and untrusted links. While not all risks will be identified, the bulk of hazards are known to these programs, and they can alert you to them.

5. Back up data regularly

  • Perform regular, if not daily, updates to your computer and device files, photos, software, and settings.
  • Use a cloud-based service from a brand you trust, such as the company that makes your antivirus software.
  • If you have too much data to back up to the cloud, use an external hard drive device to keep everything stored.
  • Make sure your backups are password-protected.

6. Use a VPN for secure connections, especially on public WiFi

  • A virtual private network, or VPN, can help keep the information private when you send it over Internet networks.
  • Turn on a VPN when connecting to public WiFi networks, like those used in coffee shops and hotels.
  • Consider changing your VPN location to somewhere you aren’t located, such as a different country, if you are concerned about being tracked.

7. Use 2-factor authentication

  • Don’t rely on just a password to keep your accounts safe. Multi-factor authentication uses a second method, such as a text message sent to a smartphone, to verify that it’s you logging in.
  • Pick a second authentication method that you will always be able to access and that only you can verify.
  • Include a backup method of authentication in case you get locked out of your phone or email account.

Relevant tools and resources

HPImage
While the ways in which cybercriminals operate may change frequently, you are not alone. Access these resources to get up-to-date information on scams and cyber threats and the best practices for staying safe when online.

Federal Trade Commission (FTC)

The FTC offers a wealth of information on the latest scams and cyber crimes. They share how criminals are using LinkedIn to target students with fake job offers and how to spot a counterfeit apartment rental. Not all of the crimes they share are related to computer safety, but they are important to know. By staying up-to-date with the news, you can protect yourself and help friends and family.

HP computers and software services

Whether you buy a laptop or desktop, HP computers come with antivirus and advanced malware protection to reduce the chances you’ll be caught in a scam. The security software also alerts you to ransomware attacks, looking out for threats you may not even be aware of.
Another option is to partner with a trusted brand in PC safety by having HP Wolf Security handle more of the essential tasks. It makes it simple to find and locate a lost or stolen computer remotely. You can then protect the data and keep thieves from accessing your most important files, programs, or social media networks. Built for business and enterprise uses, it’s available for students or anyone wanting to lock down sensitive info and keep their wireless network safe from prying eyes.

Summary

By knowing the best online safety tips and being consistent with your PC security habits, you can keep your information safe, whether at home, in the dorms, or when studying at the local coffee shop. If the worst happens, visit the FTC’s website to see what actions you should take for each type of compromised information. What you’ll need to do for a stolen credit card number will be different than if you have your driver’s license revealed.
You can also review your current tech setup to make sure it's as secure as possible. From creating a unique, extra-strong password for your bank account to backing up those college papers to a secure cloud storage service, each effort you make can go a long way toward a safe and secure school year.

About the Author

Linsey Knerl is a contributing writer for HP Tech Takes.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.

Disclaimer

Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by HP.com; reseller offers may vary. Items sold by HP.com are not for immediate resale. Orders that do not comply with HP.com terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at https://support.microsoft.com/lifecycle

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See http://www.microsoft.com.

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license. https://www.nytimes.com/wirecutter/reviews/best-all-in-one-printer/

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit https://softwareoffer.intel.com/offer/20Q3-19/terms.

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (https://www8.hp.com/us/en/privacy/ww-privacy.html)