{"id":8746,"date":"2024-08-22T11:28:30","date_gmt":"2024-08-22T09:28:30","guid":{"rendered":"https:\/\/www.assap.ad\/tips-how-to-shop-safely-on-the-internet\/"},"modified":"2025-03-21T13:24:37","modified_gmt":"2025-03-21T12:24:37","slug":"tips-how-to-shop-safely-on-the-internet","status":"publish","type":"post","link":"https:\/\/www.assap.ad\/en\/insurances-andorra\/blog\/tips-how-to-shop-safely-on-the-internet\/","title":{"rendered":"How to shop safely on the Internet: Tips for your safety"},"content":{"rendered":"\n<p>Technology has changed the way we do things.\nWe spend more time in front of the computer and we also spend more time doing things online.\nNowadays, we no longer need to go shopping, since we can do it without leaving our home.  <\/p>\n\n\n\n<p>These days, when many stores make discounts or promotions for Black Friday, or the Christmas campaign that we have very close, many of us will consider making online purchases, a fact that will increase purchases from websites.<\/p>\n\n\n\n<p>While it is true, there is no 100% reliable formula that allows us to protect our device from any attack.\nSocial networks do not help to protect our privacy either.\nWe share more and more information about ourselves.\nWhere we are, when we are on vacation, where we travel, what we eat, the places we frequent most&#8230;\nThere is a large amount of personal information that can be obtained through this channel.\nBut it is true that there are several techniques and formulas that can help us protect our devices and our privacy.     <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Here&#8217;s some online shopping tips<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>When surfing the Internet, avoid clicking on any advertisement!\nDepending on which pages you enter, you may come across suspicious ads.\nAvoid browsing these pages and clicking on any links that you do not consider safe.  <\/li>\n\n\n\n<li>Keep antivirus software updated on all devices where you are using the Internet!\nIt&#8217;s for your safety!\nIt will warn you every time a file may contain dangerous content.  <\/li>\n\n\n\n<li>Look for online stores whose address begins with HTTPS and display a padlock in the address bar.\nThis ensures that the information being transmitted is encrypted. <\/li>\n\n\n\n<li>Verify that the page incorporates quality seals, such as those of Confianza En l\u00ednea or those of Visa and Mastercard, they are also, a priori, safe pages, because they are periodically subjected to reliability analysis.<\/li>\n\n\n\n<li>Passwords&#8230; make them complex!\nAvoid using very easy and simple passwords.\nAlways use a different one for each device and for each channel you want to access.\nRemember that by always using the same one, you will be putting all your channels at risk.   <\/li>\n\n\n\n<li>Avoid giving personal data.\nAbove all, avoid doing it through social networks or web pages that you do not know.\nAnd never give your credit card code, you may only be asked for the card number, the expiration date and the CVC, which are the three digits indicated on the side of the last one.  <\/li>\n\n\n\n<li>Downloading pirated content can be a mistake.\nMany files downloaded without a license may come with malware.\nFor this reason, we advise you to always enjoy legal and safe content!  <\/li>\n<\/ul>\n\n\n\n<p>The most common online payment methods are the following: PayPal, Bizum, Redsys and Stripe.<\/p>\n\n\n\n<p>These are just a few of the many tips you could follow to prevent your devices from being attacked.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">You know what are the most common cyberattacks:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Malware<\/strong>: Malware is malicious software that installs itself on the system causing:\n<ul class=\"wp-block-list\">\n<li>alteration of the equipment.<\/li>\n\n\n\n<li>blocking of network access (ransomware).<\/li>\n\n\n\n<li>the appropriation of personal information (spyware).<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p>The purpose of all of them is to be able to obtain compromised information, breach computer connections or create backup copies and publish them on the Internet.<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Phishing<\/strong>: Phishing is the way to usurp sensitive data, usually through emails.\nOften considered trusted sources, hackers use this means to capture data such as credit card numbers or passwords. <\/li>\n\n\n\n<li><strong>Man-in-the-middle attacks<\/strong>: Man-in-the-middle (MitM) or eavesdropping attacks usually occur over a public or unprotected Wi-Fi network.\nHackers can easily access your computer without your knowledge and steal the information you are passing over the Internet. <\/li>\n\n\n\n<li>In addition, once the device is controlled, they can install malware to steal protected information.<\/li>\n\n\n\n<li><strong>Denial of service attack<\/strong>: In distributed denial of service (DDoS) attacks, several devices are breached to spill attacks to the system so that they cannot finish the processes and requests, hogging the bandwidth and saturating the network, causing serious damage to the system.<\/li>\n\n\n\n<li><strong>SQL Injection<\/strong>: SQL injection attacks occur through web applications.\nMalicious lines of code are inserted in order to obtain private information from company servers. <br> <\/li>\n<\/ol>\n\n\n\n<p>In case you are interested in our <a href=\"https:\/\/www.assap.ad\/es\/seguros-andorra\/ciber-risc\">Cyber Risk product<\/a>, click here!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology has changed the way we do things. We spend more time in front of the computer and we also spend more time doing things online. Nowadays, we no longer need to go shopping, since we can do it without leaving our home. These days, when many stores make discounts or promotions for Black Friday, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-8746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/posts\/8746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/comments?post=8746"}],"version-history":[{"count":2,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/posts\/8746\/revisions"}],"predecessor-version":[{"id":12589,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/posts\/8746\/revisions\/12589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/media\/6500"}],"wp:attachment":[{"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/media?parent=8746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/categories?post=8746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/tags?post=8746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}