Quick Tips for Providing IT Support During the Holidays

Learn how to bolster your family's cybersecurity hygiene and effortlessly protect them from online threats this holiday season.

“Help, I can’t login!”

“Why is it asking for a code from my phone?”

“What’s this weird email…it kind of looks like my bank, but I’m not sure. My bank normally doesn’t ask for this information…”

We’ve all been there.

During holiday gatherings, many of us find ourselves in the familiar role of being the family’s go-to IT expert. With cyberattacks getting more sophisticated and prevalent, this role becomes that much more crucial.

This underscores a common issue: many family members, especially those not in tech-related fields or those who overestimate their tech skills, often lack cybersecurity awareness.

To help, you can share simple, yet powerful security tips that can boost the family’s security hygiene, help protect them from potential threats and ensure a safer digital experience for everyone.

Phishing Awareness and Training

Let’s say a family member receives an email prompting them to click a link to track a package. The email appears authentic, but there’s a catch—they can’t recall ordering anything. Upon closer inspection, you identify it as a potential phishing email. This leads to a discussion about phishing, including questions like:

    • “Is it safe to click on this link I just got?”
    • “Tech support emailed me to call them, but the address looks suspicious. Should I trust it?”
    • “I received an unexpected email from my bank asking for my info—is it genuine?”

Phishing is a deceptive practice where cybercriminals attempt to trick individuals into providing sensitive information by pretending to be trustworthy entities.

For instance, some phishing attempts involve phone calls from individuals claiming to be from a recognizable company’s technical support team, urging you to share personal details.

Other examples include email phishing, where attackers send emails that appear to be legitimate, and spear phishing, which targets specific individuals with personalized messages.

Additionally, AI is making phishing attempts even more realistic by enabling the creation of highly convincing fake websites and emails that mimic genuine ones, making it increasingly challenging to detect phishing attempts.

To identify phishing attempts, it’s crucial to check URLs for authenticity and scrutinize email senders. Look for inconsistencies such as misspellings in the domain name, unexpected characters or slight variations from the legitimate URL that could indicate a scam.

Additionally, check the sender’s email address for discrepancies or odd formats that differ from the real organization’s address. Be wary of emails that create a sense of urgency or request sensitive information. Utilizing tools and resources dedicated to phishing education can significantly enhance your ability to recognize and defend against these threats.

By staying informed and vigilant, we can better protect ourselves from the pervasive threat of phishing.

Multi-Factor Authentication (MFA)

You’re taking a break at the dinner table and decide to check your phone. Suddenly, a curious relative peeks over your shoulder and notices you’re using a password and face ID to access an app. This sparks a conversation about multi-factor authentication (MFA), leading to questions like:

    • “Why do I have to jump through hoops just to log in?”
    • “Isn’t my password already strong enough to protect my account?”
    • “Setting up an extra step is such a hassle, so why should I bother?”

Multi-factor authentication (MFA) is a security measure that requires users to provide multiple forms of verification before accessing an account or system, adding an essential layer of protection. By requiring more than one form of authentication, such as something you know (a password), something you have (an SMS code or authenticator app), or something you are (biometric data), MFA significantly enhances security. This added step prevents unauthorized access, because it makes it much more difficult for attackers to breach accounts, even if a password is compromised.

To enable MFA, users can follow straightforward steps on various services and platforms which often provide options like SMS codes, email codes, authenticator apps or biometric verification. While some users may question the necessity of entering their information multiple times, the benefits are clear: MFA can reduce a user’s vulnerable surface area, making it a worthwhile inconvenience for enhanced security.

It’s also important to note that MFA should be applied everywhere, even on systems that may not seem essential or at-risk. For example, an app that controls outdoor lighting could be an entry point to your home’s Wi-Fi, which could then facilitate a cybersecurity breach.

Ultimately, MFA is a relatively simple way that users can protect their sensitive information and gain peace of mind.

Improving Password Strength

When guests arrive for dinner, they might request the Wi-Fi password. After sharing it, they may comment on its length and complexity.

This can lead into a discussion about the importance of strong passwords. However, you might encounter responses like:

    • “I hate having to remember more than just one password.”
    • “Why can’t I just write down all my passwords on paper? How else will I remember them?”
    • “Strong passwords are too complicated to remember!”

How do you respond?

Understanding common password weaknesses is crucial, because inadequate passwords can lead to cybersecurity breaches. Many people choose passwords that are easy for them to remember, like their own birthdates or pet names, but these are easy for hackers to guess. This makes it easy for cybercriminals to use tactics like brute force attacks or social engineering. Certain password guidelines, however, like password length and using a mix of uppercase and lowercase letters, numbers, and special characters will make passwords much stronger

Additionally, password managers can be an effective way to generate and manage secure passwords, ensuring each account has a unique (and complex) password without the hassle of remembering each one.

Regularly updating passwords and avoiding reuse across different sites is another vital practice in maintaining online security. That way, if one password gets compromised, only one account is affected.

Strong passwords are essential to maintaining robust online security, safeguarding sensitive information and protecting against unauthorized access.

Run Updates Regularly!

As your relatives are showing each other things on their phones, one of them notices that their {insert app name here] looks different and lacks certain features. After you take a closer look, you realize they haven’t updated their phone’s software or applications in a while. This observation sparks a discussion about technology updates, prompting responses like:

    • “Why should I update my phone if everything is working fine?”
    • “I can’t keep track of all these app updates!”
    • “How long will these updates take?”

These concerns highlight the importance of keeping software and devices up to date. Updates patch vulnerabilities and enhance security. Regularly updating everything, from operating systems to individual apps, keeps you up with the latest security enhancements. Many apps operate directly from the cloud, making it vital to ensure they are current.

Consider setting up automatic updates and alerts to streamline this process. This eliminates the need for constant manual intervention.

By keeping your technology updated, you not only enhance its performance, but also safeguard it against emerging vulnerabilities. This is a simple yet effective way to ensure the security and efficiency of your digital environment.

You Can Be Your Family’s IT Holiday Hero

Enhancing overall cybersecurity hygiene goes a long way to keeping us safe online, and it’s important to incorporate these practices into our daily routines to safeguard confidential information.

Sharing this knowledge with family and friends creates a more secure environment for everyone. We encourage you to visit our security solutions page to discover more ways to strengthen your defenses and stay protected.

About the Author: Maxwell Robidoux

Max Robidoux is a Senior Advisor for the Portfolio Marketing Team, with a focus on the security portfolio. In this role, he is responsible for producing impactful security content that not only demystifies security and Zero Trust for non-technical audiences, but also positions Dell as a partner that helps organizations solve their biggest security challenges. Max has been at Dell Technologies for four years, with prior roles on the Data Protection marketing team. Prior to joining Dell, Max worked as a research technician at Massachusetts General Hospital. Max holds a bachelor’s degree in Psychology from the College of the Holy Cross in Worcester, Massachusetts.