{"id":28543,"date":"2024-12-27T10:51:14","date_gmt":"2024-12-27T10:51:14","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=28543"},"modified":"2024-12-27T10:51:14","modified_gmt":"2024-12-27T10:51:14","slug":"cybersecurity-resolutions-2025","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/cybersecurity-resolutions-2025\/28543\/","title":{"rendered":"New Year&#8217;s resolutions for a cybersecure 2025"},"content":{"rendered":"<p>The outgoing 2024 brought a number of record-breaking data breaches \u2014 from the <a href=\"https:\/\/www.pcmag.com\/news\/to-extort-ticketmaster-hackers-allegedly-leak-taylor-swift-concert-tickets\" target=\"_blank\" rel=\"nofollow noopener\">Taylor Swift concert ticket<\/a> case, to the incident with <a href=\"https:\/\/www.forbes.com\/sites\/larsdaniel\/2024\/10\/28\/100-million-americans-medical-records-exposed-in-massive-data-breach\/\" target=\"_blank\" rel=\"nofollow noopener\">100 million Americans\u2019 medical records<\/a>. AI technology and cybercrime made leaps and bounds all year long. So how can you stay on top of all this to ensure personal information security? Here\u2019s how: make these seven New Year resolutions \u2014 and stick to them throughout 2025.<\/p>\n<h2>1. Learn to use AI assistants securely<\/h2>\n<p>Over the past year, the use of AI has evolved from a trending novelty to a part of life \u2014 especially after AI assistants became <a href=\"https:\/\/www.digitaltrends.com\/mobile\/i-tested-google-gemini-and-apple-intelligence-which-one-you-should-use\/\" target=\"_blank\" rel=\"nofollow noopener\">smartphone features<\/a>. Given that AI is now literally in the palm of your hand \u2014 offering at times quite personal advice \u2014 it\u2019s worth getting to grips with the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-chatgpt-ai-assistants-securely-2024\/50562\/\" target=\"_blank\" rel=\"noopener nofollow\">rules for safe chatbot use<\/a> to keep yourself and others out of harm\u2019s way. Here they are in a nutshell:<\/p>\n<ul>\n<li><strong>Double-check AI advice<\/strong> \u2014 especially when asking for information about medicines, investments, or other queries where errors are costly. Chatbots are known to \u201challucinate\u201d, so never blindly follow their tips.<\/li>\n<li><strong>Disable AI features unless you know what they\u2019re for.<\/strong> The \u201csmart\u201d craze is driving companies to integrate AI even where it\u2019s not needed. The most striking example is the rollout of the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-disable-copilot-recall-spyware\/51522\/\" target=\"_blank\" rel=\"noopener nofollow\">controversial Recall feature<\/a> in Windows 11, where it continuously captures screenshots for AI analysis. Disable AI if you\u2019re not actively using it.<\/li>\n<li><strong>Never give personal information to AI.<\/strong> Photos of documents, passport details, financial and medical information are almost never needed for AI to function correctly. Given that such data may get stored for a long time and used for AI training \u2014 and thus be more likely to <a href=\"https:\/\/www.zdnet.com\/article\/chatgpt-can-leak-source-data-violate-privacy-says-googles-deepmind\/\" target=\"_blank\" rel=\"nofollow noopener\">leak<\/a> \u2014 it\u2019s better not to upload such data in the first place.<\/li>\n<li><strong>Don\u2019t chat with family and friends through AI.<\/strong> Such automation is <a href=\"https:\/\/www.theverge.com\/2024\/11\/12\/24289939\/apple-intelligence-ai-notification-summaries-awkward-funny-bad\" target=\"_blank\" rel=\"nofollow noopener\">rarely useful<\/a> and won\u2019t help maintain closeness.<\/li>\n<\/ul>\n<h2>2. Switch to passkeys instead of passwords<\/h2>\n<p>Tech majors are gradually ditching passwords for more reliable <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-set-up-passkeys-in-google-account\/49515\/\" target=\"_blank\" rel=\"noopener nofollow\">passkeys<\/a>; for example, Microsoft <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/12\/12\/convincing-a-billion-users-to-love-passkeys-ux-design-insights-from-microsoft-to-boost-adoption-and-security\/\" target=\"_blank\" rel=\"nofollow noopener\">plans<\/a> to move a billion users over to this new technology. With it, logging in to any site will be by means of biometric verification or PIN code. The check is carried out locally on your computer or smartphone, after which the device decrypts from its storage a unique cryptographic key for the website in question, which \u201crecognizes\u201d you by this key. In some services, \u201cPasskey\u201d is the actual name of the login method; others, like Microsoft, mention \u201cFace, Fingerprint, or PIN\u201d. Whatever name it goes by, the method is more reliable than a combination of a password and one-time code \u2014 as well as easier and faster to use. If passkeys are on offer \u2014 get them!<\/p>\n<h2>3. Find and change all old passwords<\/h2>\n<p>Despite the advent of passkeys, passwords will remain with us for many years to come, and that means lots more leaks and hacks. Old passwords that you created years ago with little thought to length or strength can be brute-forced without too much trouble. For example, this year saw the biggest password leak in history. Dubbed <a href=\"https:\/\/www.kaspersky.com\/blog\/top-five-data-breaches-in-history\/52040\/\" target=\"_blank\" rel=\"noopener nofollow\">RockYou2024<\/a>, it contained 10 billion (!) unique records. Many of them are encrypted, but modern video cards can be used to crack shorter passwords. In <a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/\" target=\"_blank\" rel=\"noopener nofollow\">our study of password strength<\/a>, it turned out that six out of ten user passwords found in this leak could be broken in a few seconds to one hour.<\/p>\n<p>To thwart password crackers, go through all your passwords and reset any that are short (fewer than 12 characters) or very old, and create new ones in accordance with <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-international-password-day-2024\/51095\/\" target=\"_blank\" rel=\"noopener nofollow\">best security practices<\/a>. As you know, passwords should never be reused, so it\u2019s best to generate new ones and store them in a <a href=\"https:\/\/www.kaspersky.co.uk\/password-manager?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">reliable password manager<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h2>4. Teach family and friends how to spot deepfakes<\/h2>\n<p>The rapid advance of neural networks has allowed scammers to move from deepfake videos of celebrities, to inexpensive and relatively massive attacks on specific individuals using fake voices and images of\u2026 absolutely anyone. Deepfakes were first used to promote financial pyramids or fake charities, but now targeted scams are in play; for example, calls from the victim\u2019s \u201cboss\u201d or a \u201cloved one\u201d. It\u2019s now easier than ever to make a video of someone you know well <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-spot-and-prevent-boss-scams\/50861\/\" target=\"_blank\" rel=\"noopener nofollow\">asking for money or something else<\/a>, so always double-check unusual requests by making contact with the person through another channel.<\/p>\n<p>Given the vast leakage of medical records in 2024, we can expect to see new targeted \u201cdoctor scams\u201d in the coming year.<\/p>\n<h2>5. Switch to private messengers<\/h2>\n<p>For those who still believe in privacy, 2024 delivered a couple of major setbacks. First, the arrest of Telegram founder Pavel Durov raised fears that intelligence agencies <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-privacy-security-backup-aug2024\/52051\/\" target=\"_blank\" rel=\"noopener nofollow\">could start snooping on users\u2019 correspondence<\/a>. Next, the United States was rocked by scandal when it broke that foreign intelligence agencies had <a href=\"https:\/\/edition.cnn.com\/2024\/12\/04\/politics\/us-telecom-providers-chinese-hack\/index.html\" target=\"_blank\" rel=\"nofollow noopener\">hacked the legal wiretapping system operated by all U.S. telecom providers<\/a>, and gained access to the calls and texts of Americans. The authorities went so far as to <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\" target=\"_blank\" rel=\"nofollow noopener\">advise<\/a> people to switch to private messengers for greater privacy.<\/p>\n<p>To sleep more soundly at night, follow this tip and, together with your main contacts, move to a <a href=\"https:\/\/www.kaspersky.com\/blog\/what-makes-a-messenger-secure\/48671\/\" target=\"_blank\" rel=\"noopener nofollow\">messenger with end-to-end encryption<\/a>.<\/p>\n<h2>6. Set aside a monthly \u201cbackup hour\u201d in your calendars<\/h2>\n<p>If you don\u2019t even remember when you last backed up your data, it\u2019s time to schedule this activity \u2014 which is no less important than annual car maintenance or spring cleaning your house; however, backups should be much more frequent: daily, weekly or monthly \u2014 depending on the data type.<\/p>\n<p>Backup must be <strong>two-way<\/strong>: back up data on your phone and computer to cloud storage, and download cloud data to local storage. An example of the former is photos on your phone. An example of the latter is Gmail messages.<\/p>\n<p>This way, you\u2019ll be protected against a wide range of problems: computer crashes, smartphone theft, ransomware attacks, house fires, your favorite recipe site being shut down, movies and music disappearing from streaming platforms, sudden hikes in cloud-hosting charges, and so on. For best practices for backing up <strong>from the cloud<\/strong>, see our post <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup-online-services-and-web-pages\/52214\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>; and <strong>to the cloud<\/strong>, see <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/19589\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>. Another of our guides explains <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-web-archives-and-permanently-save-webpages\/52587\/\" target=\"_blank\" rel=\"noopener nofollow\">how to save important online data stress-free<\/a>, so you don\u2019t have to worry about your favorite sites or services disappearing. And under the\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/backup\/\" target=\"_blank\" rel=\"noopener nofollow\">backup<\/a> tag on our blog, you\u2019ll find no end of practical tips on saving data from anywhere, including <a href=\"https:\/\/www.kaspersky.com\/blog\/whatsapp-backup-google-drive\/23627\/\" target=\"_blank\" rel=\"noopener nofollow\">messengers<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup-authenticator-app\/42103\/\" target=\"_blank\" rel=\"noopener nofollow\">authenticator apps<\/a>, and <a href=\"https:\/\/www.kaspersky.com\/blog\/notion-backup-and-migration-guide\/52076\/\" target=\"_blank\" rel=\"noopener nofollow\">note-taking tools<\/a>.<\/p>\n<h2>7. Enter your card number less often<\/h2>\n<p>In 2024, <a href=\"https:\/\/arstechnica.com\/information-technology\/2024\/06\/hackers-steal-significant-volume-of-data-from-hundreds-of-snowflake-customers\/#page-2\" target=\"_blank\" rel=\"nofollow noopener\">cloud storage provider Snowflake suffered a string of massive leaks<\/a> of customer data. Among the companies affected were AT&amp;T, Live Nation (Ticketmaster), and Santander. The exact makeup of the information in each leak remains unclear.<\/p>\n<p>So as not to be left guessing if your payment data is safe, and not to mess around with contacting banks and reissuing cards after every major leak, save your card to a reputable, secure service (PayPal, Google Pay, Apple Pay, or similar), and use it to pay for purchases wherever possible. That goes for both offline and online purchases. This will make it harder for attackers to intercept your payment data and reduce the likelihood of damage in the event of a large store or online service hack.<\/p>\n<p>If you need to enter card details but your preferred payment service isn\u2019t an option, use the <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-protection-for-financial-security\/49616\/\" target=\"_blank\" rel=\"noopener nofollow\">Safe Money<\/a> feature in any of our <a href=\"https:\/\/www.kaspersky.co.uk\/home-security?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">home security solutions<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Mistakes to learn from in 2024 \u2013 and resolutions for a safer 2025.<\/p>\n","protected":false},"author":2722,"featured_media":28544,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1043,1041,567,282,2669,2494,80,1046,1101,586,3744,187,1324,363,2146,43,701,321,131],"class_list":{"0":"post-28543","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-backup","11":"tag-cybersecurity","12":"tag-deepfakes","13":"tag-fake","14":"tag-fraud","15":"tag-kaspersky-password-manager","16":"tag-leaks","17":"tag-messengers","18":"tag-passkeys","19":"tag-passwords","20":"tag-payments","21":"tag-personal-data","22":"tag-personal-information","23":"tag-privacy","24":"tag-scam","25":"tag-technology","26":"tag-tips"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cybersecurity-resolutions-2025\/28543\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cybersecurity-resolutions-2025\/28411\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cybersecurity-resolutions-2025\/23670\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cybersecurity-resolutions-2025\/38846\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-resolutions-2025\/52820\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cybersecurity-resolutions-2025\/28671\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cybersecurity-resolutions-2025\/34497\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cybersecurity-resolutions-2025\/34121\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=28543"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28543\/revisions"}],"predecessor-version":[{"id":28545,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28543\/revisions\/28545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/28544"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=28543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=28543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=28543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}