top of page
Search

Top 5 Cybersecurity Myths - Busted!



ree

Many adolescents today use the internet religiously, whether it's for posting on social media, streaming content, watching shows, or texting friends. However, online safety is often overlooked amidst these activities, and this is where cybersecurity comes into play: it is essential for everyone to familiarize themselves with the basics of secure online navigation. The problem is that many popular myths can create a false sense of security, making us believe we're safe online when we’re not. These myths can put us at serious risk without us even realizing it, leading us to turn a blind eye to the dangers of the digital world. So let’s look at the Top 5 Cyber Security Myths of today and debunk them!


Myth 1: “Incognito mode keeps me anonymous”

Reality: Incognito or private browsing only stops your device from saving your local browsing history and cookies. It does not hide your activity from your internet service provider (ISP), school, employer, or the websites you visit. Even worse, it doesn’t shield you from any malware, trackers, or hackers you may encounter. Employers and law enforcement can also still access and view your browsing data if needed. So incognito is a great tool for local privacy, but it’s nowhere close to anonymity.

What you should do instead: 

  • Use trusted VPNs to ensure safety online.

  • When using incognito, be cautious - don’t treat it like an invisibility cloak.


Myth 2: Deleting a File Means it’s Gone Forever

Reality: When you delete a file, your device doesn’t immediately erase the data - it simply marks that space as "available for reuse." Until it gets overwritten (IF it does), the file is fully recoverable with free tools you can find online. Hackers, forensic analysts, or even curious coworkers could retrieve sensitive information you thought was gone, putting you at risk for identity theft, blackmail, or privacy breaches.

What you should do instead: 

  • Use secure tools to delete files, such as Eraser (Windows) or other permanent delete apps.

  • Encrypt your hard drive so that even if others recover your data, it’s unreadable.


Myth 3: “I will know immediately if I am hacked”

Reality: Most system hacks aren’t dramatic - it is unlikely that your network will immediately detect and inform you of a data breach. Instead, hackers prefer staying hidden, slowly gathering data or taking over accounts without raising suspicion. Some corporate breaches have been known to go undetected for over 200 days. Meanwhile, personal accounts can be quietly monitored, with passwords being changed in the background and private data being stolen, without the victim realizing until it’s too late.

What you should do instead: 

  • Set up alerts through your most used platforms to report unusual activity (many email providers and organizations, like Google, offer these).

  • Use strong passwords to make it as difficult as possible for hackers. Update them often and use two-factor authentication.

  • Manually check your accounts for unusual behavior - even small changes could be important!


Myth 4: If a Website Has a Lock Icon (HTTPS) it is Safe

Reality: The lock icon at the top of a browser only ensures your connection to the website is encrypted, but it does not mean the site is legitimate or trustworthy. Cybercriminals can use HTTPS certificates on phishing sites and fake shopping sites to trick users into feeling safe. Some fake sites look almost identical to the real ones, down to the HTTPS lock. Blindly trusting the lock could lead you straight into scams, malware, or even identity theft.

What you should do instead: 

  • Look carefully at the full web address (URL)! Scammers may use slight misspellings or incorrect domains.

  • Don’t click links from random emails or messages. If needed, search for the website yourself instead.


Myth 5: Public Wi-Fi is Safe if it Doesn’t Ask For a Password

Reality: Open Wi-Fi networks (like at airports, malls, or cafes) are prime spots for hackers. Without encryption, anyone nearby can access your data. This includes full access to the sites you visit and possibly even your login credentials. Even if a network has a password, if it is widely shared, it should be considered unsafe. Cybercriminals often set up fake hotspots pretending to be legitimate Wi-Fi to trick people into connecting.

What you should do instead: 

  • Always use a VPN on public Wi-Fi, even if it’s password-protected.

  • Turn off auto-connect features on your devices for public networks.

  • Avoid accessing sensitive accounts (such as banking information) on public Wi-Fi.


Understanding these common myths could mean the difference between staying safe and becoming a hacker’s next target. 


In today's digitalized world, it's essential to stay informed about online safety. The internet can be a great resource, but only if we understand its risks and take the necessary steps to protect ourselves when we use it.













Works Cited

"Cybersecurity vs. Information Security." Elmhurst University, 2 Apr. 2021, https://www.elmhurst.edu/blog/cybersecurity-vs-information-security/.

"Signs You've Been Hacked." Norton, NortonLifeLock, https://us.norton.com/blog/emerging-threats/signs-youve-been-hacked.

"The Risks of Public Wi-Fi." Norton, NortonLifeLock, https://us.norton.com/blog/wifi/the-risks-of-public-wi-fi.

"The Best Secure Deletion Tools." PCMag, 24 Nov. 2021, https://www.pcmag.com/picks/the-best-secure-deletion-tools.

"What HTTPS Really Means." Google Safety Center, Google, https://safety.google/privacy/security/what-is-https/.

"How to Recognize and Avoid Phishing Scams." Consumer FTC, Federal Trade Commission, https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams.

Google. "What Incognito Mode Does." Google Support, Google, https://support.google.com/chrome/answer/95464?hl=en.

ProtonVPN. "What Incognito Mode Really Hides." ProtonVPN Blog, Proton Technologies AG, https://protonvpn.com/blog/incognito-mode/.

IBM. "Cost of a Data Breach Report 2023." IBM, IBM, https://www.ibm.com/reports/data-breach.

"Why Deleted Files Can Be Recovered and How You Can Prevent It." How-To Geek, 6 Mar. 2017, https://www.howtogeek.com/134735/htg-explains-why-deleted-files-can-be-recovered-and-how-you-can-prevent-it.

"Staying Safe on Public Wi-Fi." Kaspersky, Kaspersky Lab, https://usa.kaspersky.com/resource-center/preemptive-safety/public-wifi-risks.



 
 
 

Comments


bottom of page