With the new year approaching, it is a good time to strengthen your digital security and prepare for cyberattacks that usually spike around this period.
The holidays are usually a high-activity period for cybercriminals. During this time, IT teams are stretched thin, employees are distracted, online shopping increases, and urgency becomes the norm. All of this creates perfect conditions for phishing scams, ransomware attacks, and data theft. Slower response times, coupled with increased online activity, make these attacks more effective.
Here are some security hacks that can help you reduce risk during this period and beyond.
1) Use strong passwords
One of the simplest ways to reduce your exposure is by using a strong, unique password. You can create a strong password by including a combination of uppercase and lowercase letters, numbers, punctuation marks and special characters.
Most cybersecurity bodies, including CISA and NIST, recommend passwords that are at least 16 characters long. Once you’ve created one, you can test its strength using tools like the University of Illinois password checker.
2) Enable multi-factor authentication
Multi-factor authentication adds an extra layer of security to your accounts. Instead of relying on just a password, it requires another verification step, such as a code, passkey or biometric check. Many banking apps and social media platforms already do this by requesting both a password and a onetime code sent to your phone or email.
3) Be cautious with unfamiliar links
Phishing remains the most reported cybercrime. According to the FBI’s 2024 Internet Crime Report, phishing accounted for over 193,000 complaints. Most phishing attacks start with a malicious link. Scammers depend on curiosity or urgency to get you to click, so slowing down and vetting unfamiliar links can significantly reduce your risk.
4) Keep your devices updated
Software updates often include essential security patches that fix vulnerabilities hackers exploit to steal data or take control of your system, effectively closing security holes before they can be used against you. Ignoring updates leaves your software open to known weaknesses, making you an easy target for ransomware and other malware, so enabling automatic updates and installing them promptly is vital.
5) Install anti-virus software
Antivirus software is crucial for detecting and removing malware, including viruses, ransomware, and spyware. While it's not a complete solution—hackers use methods like phishing and zero-day attacks—they play an important role as part of a layered security approach.
6) Use a secure network
Always connect through secure, password-protected networks. If you’re on public Wi-Fi, consider using a VPN to encrypt your connection. Avoid accessing sensitive services like banking or work systems on open networks whenever possible.
7) Enable firewalls and endpoint protection
Firewalls act as gatekeepers, filtering network traffic and blocking unauthorised access. Endpoint protection focuses on the device itself, using behaviour analysis and threat detection to stop malware, ransomware, and unknown threats. Together, they provide both network-level and device-level protection.
8) Limit Privileges and Manage Data Access
Malware often needs administrative privileges to cause widespread damage. Using standard user accounts limits what malicious software can do if it gets in. Separating and controlling access to sensitive data also helps contain breaches, preventing attackers from accessing everything at once.
9) Encrypt and back up your data
Encryption ensures stolen data is unreadable, while backups allow you to recover files if ransomware or data loss occurs. Together, they protect both confidentiality and availability, letting you restore systems without paying ransoms.
10) Report suspicious activity
Reporting unusual behaviour to your device maker or service provider won’t stop an attack instantly, but it helps identify emerging threats. This feedback allows vendors to issue patches or updates that protect other users and reduce future risk.

