How to Stay Secure While Browsing the Web

Most people get hacked not because attackers are geniuses, but because targets made simple, avoidable mistakes. Here's how to stop making them.

March 16, 2026
High risk
Phishing & social engineering
The most common attack vector. Tricks you, not your software.
Medium risk
Weak passwords & reuse
One leaked password opens many accounts if you reuse them.
Lower risk, high impact
Malware & browser exploits
Less common, but devastating when it happens.
01

The threat model: what you're actually protecting against

Security is not binary. You're not perfectly safe or totally compromised. You're on a spectrum, and the goal is to make attacking you more work than it's worth.

Most people are not targeted individually. You're more likely to be caught in a mass credential leak, click the wrong link in a phishing email, or connect to a bad network than to have someone specifically after you. Your security strategy should reflect that.

Attackers don't hack people. They hack habits.

Ask yourself three questions before spending time on any security measure: What am I protecting? Who would want it? How would they get it? The answers shape everything.

The most common ways people actually get compromised

Phishing email or link
Very high
Reused passwords
Very high
No two-factor auth
High
Unpatched software
Medium
Malicious extensions
Lower
Drive-by malware
Lower

02

Passwords and password managers

If you remember all your passwords, you're doing it wrong. A password you can memorize is a password someone can guess, brute-force, or find in a leak from another site you used the same password on.

The only workable system is a password manager. It generates and stores a unique, random, long password for every site. You only remember one master password.

What makes a password strong

Length beats complexity
A 20-character random string is stronger than a 10-character one with symbols. Aim for 16 characters minimum on new accounts.
Uniqueness is non-negotiable
One site gets breached every day. If you reuse passwords, every breach compromises every account that shares that password.

Which password manager?

Bitwarden (free, open source) 1Password Dashlane Proton Pass iCloud Keychain Google Password Manager

Use any reputable option. Bitwarden is free, open source, and audited. The built-in browser or OS options work fine for most people and are dramatically better than no manager at all.

Your master password

This one password protects everything. Make it a passphrase: four or five random words strung together. Something like "marble fence theory cloud" — long, memorable, impossible to guess. Use a random generator, not phrases from books or songs.

Never do this

Don't use the same password on two sites. Don't use your name, birthday, or pet's name. Don't store passwords in a plain text file.


03

Two-factor authentication

Two-factor authentication (2FA) means logging in requires your password plus a second proof that you're you. Even if someone steals your password, they can't get in without that second factor.

Enable it on every account that offers it. This single step blocks the vast majority of account takeovers.

2FA options, ranked strongest to weakest

1
Hardware security key (YubiKey, Google Titan)
A physical USB or NFC device you tap. Immune to phishing because it verifies the actual website domain. The strongest option available.
2
Authenticator app (Authy, Google Authenticator)
Generates a time-based 6-digit code that expires every 30 seconds. Much better than SMS. Use this for most accounts.
3
SMS text message code
Better than nothing. SIM-swapping attacks can intercept SMS codes, but most people aren't targeted that way. Use it if it's all that's available.
Backup codes matter

When you set up 2FA, every service gives you backup codes. Print them and store them somewhere physical and safe. People lock themselves out of accounts permanently by skipping this step.

Priority accounts for 2FA

Start here: email first (it's the master key to everything else), then banking, then any account tied to payment methods, then social media.


04

Recognizing phishing and scams

Phishing is the most successful attack vector in existence because it targets you, not your software. No amount of technical hardening protects you if you hand over your credentials voluntarily.

Every suspicious link is suspicious until proven otherwise.

The red flags

  • Urgency. "Your account will be closed in 24 hours." Real companies don't work this way.
  • The sender address doesn't match the company. Hover over it. support@paypa1.com is not PayPal.
  • Links that don't match the text. Hover before clicking. The URL in your status bar is the real destination.
  • Requests for credentials, payment, or personal info via email or text.
  • Unexpected attachments, especially .zip, .exe, .docm, or .xlsm files.
  • Requests that bypass normal process. "Don't tell IT, just click here."

The right habit

When an email asks you to log in somewhere, don't click the link. Open a new tab and navigate to the site directly. If something is actually wrong with your account, you'll see it there.

Vishing and smishing

Phishing also happens over phone calls and texts. No legitimate company will call you unsolicited and ask for a password, verification code, or payment in gift cards. Hang up and call the company's official number yourself.


05

Browser choice and extensions

Your browser is your primary interface with the internet. It matters what you use and how you configure it.

Browser basics

Chrome
Strong security updates, best extension ecosystem. Privacy trade-off: Google sees a lot of your activity. Use with uBlock Origin.
Firefox
Better privacy defaults than Chrome. Actively developed by Mozilla, a nonprofit with privacy as a stated mission.
Brave
Built-in ad blocking and tracker protection. Chromium-based so Chrome extensions work. Good default security out of the box.
Safari
Best choice on Apple devices. Strong privacy protections and Intelligent Tracking Prevention built in.

Extensions worth installing

uBlock Origin Privacy Badger HTTPS Everywhere Bitwarden

Extensions to avoid

Every extension you install can read your browser activity. Only install extensions you genuinely need from publishers you can verify. Coupon finders, free PDF converters, and "speed booster" extensions are a common malware delivery mechanism.

Keep it updated

Enable automatic updates and don't dismiss update prompts. Running an outdated browser is like leaving a known door unlocked.

Settings to change right now

  • Block third-party cookies
  • Enable Safe Browsing (Chrome) or Enhanced Tracking Protection (Firefox)
  • Set your default search engine to DuckDuckGo or Brave Search if privacy matters to you
  • Disable saving passwords in browser if you use a dedicated password manager
  • Turn off autofill for addresses and payment info

06

HTTPS, certificates, and public Wi-Fi

The padlock icon in your browser means your connection to that site is encrypted. Data you send — forms, passwords, payment info — is protected from eavesdropping on the network.

Never enter sensitive information on a site without HTTPS. If the URL starts with http:// rather than https://, your data travels in plaintext.

What HTTPS does not mean

HTTPS tells you the connection is encrypted. It does not tell you the site is legitimate. A phishing site can have a valid HTTPS certificate. The padlock means "your connection to this site is private." It does not mean "this site is safe."

Public Wi-Fi

Coffee shops, airports, and hotels offer convenient internet and real security risks. On public Wi-Fi: use HTTPS sites only, avoid logging into banking or email if possible, and consider a VPN for the session.

Certificate warnings

If your browser shows "Your connection is not private," take it seriously. Don't click through unless you have a specific technical reason and know exactly what you're doing.


07

VPNs: what they do and don't do

VPNs are useful tools that the industry has dramatically oversold. Understanding what they actually do saves you money and prevents false confidence.

What a VPN actually does

  • Hides your traffic from your internet service provider
  • Masks your IP address from websites you visit
  • Encrypts your traffic on untrusted networks like public Wi-Fi
  • Lets you appear to be in a different country

What a VPN does not do

  • Make you anonymous. The VPN provider sees your traffic instead of your ISP. You're trusting them.
  • Protect you from phishing, malware, or weak passwords
  • Stop websites from tracking you via cookies, fingerprinting, or login sessions
  • Replace other security measures
Which VPN?

Mullvad and ProtonVPN have strong privacy records, transparent policies, and independent audits. Avoid free VPNs. If you're not paying, your traffic is the product.


08

Tracking, privacy, and data brokers

Tracking is different from hacking. You won't get your account stolen from ad trackers. But companies build detailed profiles of your behavior, sell that data, and that data can get leaked, subpoenaed, or used to manipulate you.

How you're tracked while browsing

1
Third-party cookies
Advertising networks drop cookies that follow you from site to site, building a profile of your interests and behavior across the web.
2
Browser fingerprinting
Your browser's combination of fonts, screen size, plugins, and settings creates a unique fingerprint. This tracks you even without cookies.
3
Login-based tracking
"Sign in with Google/Facebook" is convenient but lets those platforms track your activity across every site that uses them.

Data brokers

Companies like Spokeo and BeenVerified collect and sell your name, address, phone number, and more. You can opt out individually, though it's tedious. Services like DeleteMe do this automatically for a subscription fee.

Simple privacy wins

Use a tracker blocker like uBlock Origin. Use Firefox or Brave. Don't sign into your browser with your Google or Facebook account. Use a separate email address for signups you don't trust.

Email tracking

Most marketing emails contain tracking pixels that tell the sender when you opened the email and from what device. Enable "block remote images" in your email client, or use Proton Mail, which strips tracking automatically.


09

Your quick-start security checklist

Do these in order. The first three have the highest return on time invested.

1
Install a password manager and replace your worst passwords
Start with email, banking, and any account with payment info. Generate new random passwords. Don't do all of them at once — just start.
2
Enable 2FA on email and banking
Use an authenticator app, not SMS if possible. Save your backup codes somewhere physical.
3
Install uBlock Origin in your browser
Blocks ads, trackers, and many malware delivery sites. Free. Takes two minutes. One of the highest-value security steps you can take.
4
Check HaveIBeenPwned.com
Enter your email address. See which breaches your data appeared in. Change passwords for any compromised accounts immediately.
5
Update your software
OS, browser, apps. Enable automatic updates everywhere you can. Unpatched vulnerabilities are a real and easy attack vector.
6
Be skeptical of every unexpected email or link
Pause before clicking. Hover over links. Navigate to sites directly rather than through email links when logging in.

The honest bottom line

You don't need to be a security expert to be meaningfully safer online. You need to fix your passwords, turn on two-factor authentication, and stop clicking things without thinking first.

These three habits eliminate the vast majority of risk for most people. Everything else in this guide makes you more secure, but none of it matters if your passwords are weak and you click phishing links.

Security isn't a product you buy or a setting you toggle once. It's a set of habits you build over time. Start with the checklist above. Do one item today.