Using the internet safely involves following fixed rules that most of us know. But what about those who are new to the internet? This guide is for them.

How to be safe online and why it is important Basic information brought to you by Mayo Fibre Broadband team.

Maintaining a safe and secure Internet browsing experience is a very important aspect of protecting users from a number of unpleasant situations. Cybercriminals use a variety of techniques and, with the help of malware, can attack any web user. The reasons for cyber attacks range from simple entertainment, to learning a “trade”, to the really dangerous desire to seize bank accounts and obtain a user’s personal information or company data.

Responsible use of social media is fundamental to staying safe online. It is understood that children are most vulnerable to cyber attacks when using the internet. The safety of younger children is undoubtedly important, but in fact every online user is vulnerable to different types of attack. Adult internet users should also follow rules that protect them from dangerous situations.

Biggest rules for safe internet use

Whatever your age, it’s important to prepare yourself properly for using the web to avoid the dangers of cyber attacks as much as possible. We have listed seven basic and very important online safety rules that you should keep in mind every day.

Online security is not only about protecting logins and passwords, but it is also important to protect all sensitive data stored on your device. By accessing the internet, a hacker can steal important files or download malware onto your device. Check out our guide to online safety and learn how to protect your privacy online and prevent cyber-attacks.

Checking if a website is secure – padlock and encryption

A basic element of using the internet safely is a valid SSL certificate on the website you are using. This mechanism ensures an encrypted connection between the website and the server where it is hosted. This guarantees the confidentiality of the communication and protects against attacks based on the impersonation of a given website. 

The encrypted version of the HTTP protocol protects against interception and falsification of our data.

However, the padlock sign alone does not protect against data theft. It is very important to check that the address you enter is correct. This should be checked very carefully, as often the name and appearance of the fake website is falsely similar to the original. To see this in action please take a look at Mayo Fibre Broadband website which is fully secured by a https protocol, security certificate and a firewall, bringing an amazing variety of fibre broadband packages to Irish customers in a safe and effective manner.


Use two-step verification as part of your online safety.

Two-step verification is designed to support the standard login procedure, which involves entering a user’s username and password. This method uses more components to determine a user’s authenticity, which further protects the user. There are three main categories of possible verification factors.

The one that happens most often is “Something You Might Know” factor. It requires the person who wants to log in to a given user account to enter information they know in order to authenticate their identity. The best example is a username and password combination using a support question. Such a question usually asks for personal information such as the year of birth or the mother’s maiden name.

Another of the three main factors for verifying a user’s identity is the “Something You Might Have” category. In the case of multi-step authentication, it becomes necessary to provide an email address or phone number, at which point the user receives a generated access code that allows them to log into their account within a certain time frame after receiving it.

The last category is something you are. This is a variant of verification that is still under intensive development. It focuses on physical aspects of a person that can be analysed using technology or biometrics to confirm the identity of an Internet user. Examples of such aspects are fingerprints, high quality retinal scans or, increasingly, the use of a fingerprint.