Most people believe that hackers will not target them because pirates are looking for valuable hunting like big companies or celebrities.

But by looking at Barclay 5 statistics for cybersecurity, most attacks are aimed at easy fishing, such as small businesses and private individuals.

There are certain reasons why these targets are easy to attack. We've combined some with tips to avoid:

1. Excessive confidence in the protection programs that come with the device
Security programs that come with computers often lack the enormous potential of third-party security programs.

What do you do?

- Installing the firewall

Hackers often search for networks that allow them to make connections to exploit computers on that network. You can prevent this by installing a firewall.

Basically, the firewall blocks unsolicited data (such as malware) from accessing your network.

- Anti-virus (Antivirus)

While the firewall prevents malware from entering your network, look for the best antivirus software. A good anti-virus program will attempt to destroy any malicious software that has penetrated and destroyed your hard drive.

- Virtual Private Network (VPN)

Finally, install the best VPN software. These networks are known for their high security capabilities both at home and even large companies. It works by hiding your real IP address and encrypting your data over the Internet.

2. Do not change passwords
How many times did a specialist set a password for your device and did not change it? How difficult are these words?

The specialists set passwords so that users can guess them easily, and are often the same or similar to all devices or software from the same manufacturer. Hackers know or can easily guess these passwords and will use them when trying to attack targets.

It has been found that 35% of users have weak passwords. A strong password should not only be long, but should also contain a mixture of uppercase and lowercase letters, numbers, and symbols (if allowed).

However, you may find it difficult to remember strong passwords. In this case, you can simply use the Password Manager application.

You can turn on dual authentication (FA2), which is useful where your identity is identified and you send an activation code to your phone or email.

It was found that 35% of users have weak passwords. Password must be strong long and contain a mixture of letters, numbers and symbols (Getty Images)

3. Ignore updates

Sometimes we ignore software or application updates. Do you know the seriousness of this work?

Updates mean that the manufacturer has found some security holes in its product. Hackers know this and will be quick to find users of this product who have not updated their version of the software or application. So they can take advantage of the vulnerability before you update it.

That's why updates should never be ignored, no matter how long you take them or how busy you are, you can set the update to automatically download.

4. Open Random Links
You have certainly heard the story of a Nigerian prince looking for someone who can give him a fortune.

Social engineering attacks and psychological tactics are used to open a malicious link. These malicious links can contain viruses or malicious software that encrypts the entire network. You can try to avoid phishing attacks by recognizing and avoiding them.

But the best alternative is to use Open DNS services. This is the best way to filter your web content and prevent malicious websites from being accessed on your network.

5. Connect to general Wi-Fi
Do you often go to the nearest cafe and connect to their Wi-Fi network? If you do, you are under attack by the "Man-in-the-middle".

Hacker implements this attack by exploiting a security vulnerability in this unencrypted network. And then use this vulnerability to monitor the information that travels inside and outside the network and concerns users and you are them.

They can then use the login information or online shopping data they receive for bank credit or credit card details.

These networks are not used in transactions that require confidentiality and security such as financial transactions.