Lock and digital security concept
Technology Privacy Feb 27, 2026

Cybersecurity Isn't Hard: The Common Sense Guide Your IT Guy Hopes You Never Read

Here's the thing nobody in tech wants you to know: 90% of "hacks" aren't sophisticated attacks by hooded geniuses in dark basements. They're regular people doing dumb stuff with their passwords. Let's fix that.

LF

Lee Foropoulos

12 min read

Share:

Security professionals love their mystique. They speak in acronyms, reference obscure vulnerabilities, and make everything sound like you need a PhD to protect your email. It's job security through complexity. But here's what they don't advertise: most of what keeps you safe is embarrassingly simple.

Your IT department isn't protecting you from elite nation-state hackers. They're protecting you from yourself. From reusing passwords. From clicking links in emails. From leaving your laptop unlocked at coffee shops. The vast majority of breaches aren't technical masterstrokes—they're crimes of opportunity against people who didn't do the basics.

Let's cut through the mystique. Here's everything you actually need to know, explained without the jargon, and with practical steps you can implement today.

The Dirty Secret About "Hacking"

Every time there's a major breach, the news makes it sound like digital ninjas penetrated impenetrable defenses. Usually, the reality is much dumber. Someone used "Password123" and that password was already leaked three years ago. Someone clicked a link in an email from "IT Support" that was actually from "[email protected]." Someone's smart doorbell had the default password "admin" and was connected to the same network as their work laptop.

The Verizon Data Breach Investigations Report consistently shows that around 80% of hacking-related breaches involve stolen or weak credentials. Not zero-day exploits. Not sophisticated malware. Passwords.

Password123 isn't clever. Neither is P@ssw0rd123. And before you get creative: qwerty, 123456, and your dog's name plus birth year are all on the list attackers check first.

This is actually good news. It means you don't need expensive security tools or a computer science degree to dramatically improve your protection. You just need to stop doing the dumb stuff.

Your Password System Is Broken (But Fixable)

Let's address the elephant in the room. You probably have a "system" for passwords. Maybe it's your base password with variations, like "BasePassword1!" for email and "BasePassword2!" for banking. Maybe you've memorized one really good password and use it everywhere. Both of these approaches are terrible.

Here's why: When a company gets breached (and they will—it's not if, it's when), your password ends up in a database that gets sold on the dark web. Attackers then try that password on every other service. If your "really good password" protects your random forum account AND your bank, congratulations—your forum's bad security just compromised your bank.

The Actual Solution: Password Managers

A password manager generates unique, random passwords for every account and remembers them for you. You only need to remember one master password (make it a long passphrase—"correct horse battery staple" is famously more secure than "Tr0ub4dor&3").

Good Password Managers

  • 1Password — Best overall experience, great family plans
  • Bitwarden — Open source, free tier available, excellent security
  • Apple Keychain — Already on your iPhone/Mac, good enough for most people

"But what if the password manager gets hacked?" Good question. Your passwords are encrypted with your master password before they ever leave your device. Even if attackers steal the encrypted vault, they can't read it without your master password. This is infinitely more secure than reusing passwords across sites.

Check If You're Already Compromised

Go to haveibeenpwned.com right now. Type in your email address. This site, run by security researcher Troy Hunt, checks if your email has appeared in any known data breaches. If it has (and for most people, it has), you know which passwords need to change immediately.

Your Browser Is Snitching On You

Even if you never click a suspicious link, your browser is constantly telling websites more about you than you realize. Let's talk about what's happening and what you can actually do about it.

Browser Fingerprinting

Cookies get all the attention, but they're not the only way you're tracked. Browser fingerprinting collects details about your system—screen resolution, installed fonts, browser plugins, timezone, language settings—and combines them into a unique identifier. Even without cookies, websites can often identify you with 90%+ accuracy.

The fix isn't perfect, but using Firefox with its Enhanced Tracking Protection, or Brave browser (which blocks fingerprinting by default), significantly reduces this. Chrome is the worst for privacy—Google makes money from advertising, so their browser is designed to facilitate tracking, not prevent it.

Your ISP Sees Everything

Every website you visit starts with a DNS request—your computer asking "what's the IP address for google.com?" By default, these requests go to your ISP, which means they have a log of every site you've ever visited. They can (and do) sell this data.

Enable DNS over HTTPS

This encrypts your DNS requests so your ISP can't snoop. Takes 2 minutes:

  • Firefox: Settings → Privacy & Security → Enable DNS over HTTPS → Select Cloudflare
  • Chrome: Settings → Privacy and Security → Security → Use secure DNS → Select a provider
  • System-wide: Change your router's DNS to 1.1.1.1 (Cloudflare) or 9.9.9.9 (Quad9)

Your Extensions Are Probably Spyware

That coupon-finding extension? Reading every page you visit. That "helpful" toolbar? Same thing. Browser extensions have enormous access to your browsing data, and the business model for free extensions is often selling that data.

Go to your browser's extension page right now. For each extension, ask: Do I actually use this? Do I trust the company that made it? Delete everything you don't need. For the ones you keep, check their permissions and disable anything that seems excessive.

Incognito Mode Doesn't Do What You Think

Incognito mode hides your browsing from your spouse, not from Google.

Private browsing modes don't make you anonymous. They just don't save your history locally. Your ISP, employer (if you're on their network), and the websites you visit can all still see everything. It's useful for signing into accounts on shared computers or shopping for surprise gifts—not for actual privacy.

The VPN Question

VPNs are useful in specific situations: on public WiFi, when you want to appear in a different country, or when you don't trust your ISP. But they're not magic privacy shields. Using a VPN just means trusting the VPN company instead of your ISP. Many "free" VPNs are worse than no VPN—they exist to harvest and sell your data.

If you want a VPN, pay for a reputable one (Mullvad, ProtonVPN, or IVPN are good options). But don't think it makes you invisible. Your browser fingerprint, your login patterns, and your behavior still identify you.

Your Phone Knows Too Much

Your phone is the most intimate surveillance device ever created. It knows where you sleep, who you talk to, what you buy, and where you go throughout the day. Here's how to claw back some privacy.

App Permissions Are Out of Control

Why does a flashlight app need access to your contacts? Why does a calculator need your location? These permissions exist because data is valuable, and most people just tap "Allow" without thinking.

Permission Audit (5 minutes)

  • iPhone: Settings → Privacy & Security → Review each category
  • Android: Settings → Privacy → Permission Manager → Review each type
  • For location: Most apps should be "Never" or "While Using." Very few need "Always."
  • For camera/microphone: Deny unless the app obviously needs it

Turn Off Ad Tracking

Both iOS and Android have settings that limit how much apps can track you for advertising purposes. They're not silver bullets, but they help.

iPhone: Settings → Privacy & Security → Tracking → Toggle off "Allow Apps to Request to Track"

Android: Settings → Privacy → Ads → Delete advertising ID (or opt out of personalization)

Check Your Location History

Want to be creeped out? Google and Apple have been logging your location for years. Go see what they have on you:

Google: Visit timeline.google.com. You'll see everywhere you've been with your Android phone or while signed into Google.

Apple: Settings → Privacy & Security → Location Services → System Services → Significant Locations. It's harder to access but equally detailed.

You can delete this history and turn off future tracking. Whether you should is up to you—some people find the timeline useful for remembering where they parked or what restaurant they liked. But at least know it exists.

Email: Still the Weakest Link

Most account takeovers start with email. Control someone's email, and you can reset passwords for everything else. Phishing is embarrassingly effective because it exploits human psychology, not technical vulnerabilities.

How to Actually Spot Phishing

The "Nigerian prince" emails are obvious. Modern phishing isn't. You'll get emails that look exactly like they're from your bank, complete with logos and proper formatting. Here's what to check:

  • Sender address: "[email protected]" is different from "[email protected]" or "[email protected]"
  • Hover over links: Before clicking, hover to see the actual URL. If it doesn't go where you expect, don't click
  • Urgency is a red flag: "Your account will be closed in 24 hours!" is designed to make you panic and skip verification
  • When in doubt, go direct: Don't click links in emails. Open a new browser tab and go to the site directly

Email Aliases: Compartmentalize Your Inbox

Use different email addresses for different purposes. Your banking email shouldn't be the same one you use to sign up for random newsletters. When a service gets breached, you'll know exactly which email was compromised, and it won't affect your important accounts.

Email Alias Services

  • SimpleLogin — Create unlimited aliases that forward to your real email
  • Firefox Relay — Mozilla's version, integrates with Firefox
  • Apple Hide My Email — Built into iCloud+, works seamlessly on Apple devices
  • Plus addressing: Gmail lets you add "+anything" before the @. [email protected] goes to your regular inbox

For Sensitive Communication: Encrypted Email

Regular email is like a postcard—anyone handling it can read it. For genuinely sensitive communication, consider Proton Mail. It's end-to-end encrypted, based in Switzerland (strong privacy laws), and has a free tier that's perfectly usable.

Social Engineering: The Flirty DM That Steals Your Accounts

Here's one that doesn't get talked about enough: that cute stranger sliding into your DMs on Instagram, Snapchat, or Tinder? They might be running a script older than the internet itself.

Think about the "getting to know you" questions people ask when flirting:

  • "What's your pet's name? I love animals!"
  • "Where did you grow up?"
  • "What was your first car? I bet it has a good story."
  • "What street did you grow up on?"
  • "What's your mom's maiden name? Mine's so weird."
  • "What high school did you go to?"

Now look at the security questions for password recovery on your bank, email, and social media accounts. Notice anything?

Those flirty questions are literally your security question answers. Someone "getting to know you" is harvesting the keys to your digital life.

This isn't paranoia—it's a documented social engineering technique. Scammers create fake profiles, build rapport over days or weeks, and casually extract every piece of information they need to reset your passwords. By the time they ghost you, they've already locked you out of your own accounts.

How to Protect Yourself

  • Lie on security questions. Your mother's maiden name doesn't have to be her actual maiden name. Pick something random and store it in your password manager. "What was your first pet?" Answer: "TurboLaser3000." Good luck guessing that.
  • Be suspicious of rapid intimacy. Real connections take time. Someone who's asking lots of personal questions in the first few conversations—especially specific ones—might not be who they claim.
  • Reverse image search. Right-click their profile picture, search Google Images. If that face shows up on stock photo sites or belongs to someone else, you've got your answer.
  • Video call before sharing. Scammers avoid video. If someone has endless excuses for why they can't video chat, that's a red flag.

The Romance Scam Pipeline

It starts with "getting to know you" questions. Then they need a small favor—gift cards, crypto, money for an emergency. The personal info harvesting and the financial scam often run together. If you've shared your security answers with someone you've never met in person, change those answers now.

Your Home Network (Yes, Really)

If your router password is still "admin," congratulations—you've rolled out the welcome mat for anyone who wants to join your network. Most people set up their router once and never think about it again. This is a mistake.

Change the Default Password

Every router ships with a default username and password (often "admin/admin" or "admin/password"). These defaults are published online. Anyone who can connect to your WiFi can access your router's admin panel and do whatever they want—redirect your traffic, spy on your devices, use your connection for illegal activity.

Log into your router (usually 192.168.1.1 or 192.168.0.1 in your browser) and change both the admin password and the WiFi password to something strong.

Update Your Router Firmware

Nobody does this. Your router is a computer that runs software, and that software has bugs. Manufacturers release updates to fix security vulnerabilities. Check your router's admin panel for a firmware update option and run it.

Create a Guest Network for IoT Devices

Your smart TV, smart doorbell, and smart refrigerator are all potential entry points for attackers. These devices often have terrible security and rarely get updates. Put them on a separate guest network so if they're compromised, attackers can't easily jump to your laptop or phone.

Most modern routers have a "Guest Network" option. Enable it, give it a different password, and connect all your smart home junk to it.

The Right Mindset

Perfect security doesn't exist. The goal isn't to be unhackable—it's to not be the easiest target. Attackers, like burglars, go for easy wins. If your house has a locked door and your neighbor's is wide open, guess which one gets robbed?

Assume Breach

Every company you give your data to will eventually be breached. Plan accordingly. Use unique passwords so one breach doesn't cascade. Use credit cards (which have fraud protection) instead of debit cards for online shopping. Keep sensitive information off cloud services when possible.

Compartmentalize

Don't use the same email for banking and forum accounts. Don't link all your accounts together for "convenience." Each connection you create is a potential path for attackers to move from one account to another.

Freeze Your Credit (US)

This one's specific to Americans, but it's one of the most effective things you can do. A credit freeze prevents anyone from opening new accounts in your name. It's free, takes 15 minutes to set up with all three bureaus (Equifax, Experian, TransUnion), and you can temporarily unfreeze when you need to apply for credit.

Regular Audits

Set a quarterly reminder to review your accounts. Which services do you still use? Which have access to your data? Which can you delete? The less attack surface you have, the safer you are.

The Bottom Line

None of this is complicated. Use a password manager. Enable two-factor authentication (I've written about hardware security keys if you want to go further). Don't click links in emails. Update your software. Check your permissions.

These basics will put you ahead of 90% of people online. The remaining 10% of risk reduction requires exponentially more effort—and for most people, the basics are more than enough.

Security isn't a product you buy or a one-time setup. It's habits. But the habits aren't hard. They just require actually doing them.

Your IT department isn't wizards. They're just Googling things faster than you. Now you know what they know. Use it.

Share this article

Lee Foropoulos

Lee Foropoulos

Business Development Lead at Lookatmedia | Fractional Executive

Lee has been securing systems since the era of dial-up modems and has seen every flavor of breach, scam, and "I just clicked the link" excuse. He writes about practical security for people who have better things to do than become security experts.

Related Articles

Link copied to clipboard!