How to avoid e-crime

Although there’s no single definition of e-crime, the meaning is not hard to grasp. Usually, it’s an unlawful activity that involves computers, the internet, or other networks. Of course, some of these activities may not be strictly criminal – such as trolling – but still fall under the e-crime umbrella. 

The term “e-crime” is often used as a synonym for “cybercrime” — and rightfully so. There may be subtle differences, but a clear distinction is tricky when there are no universal definitions for either term.

Best practices to safeguard against e-crime


Before getting to e-crime, let’s think about common crime. How do you avoid it? 

In a sense, you don’t. Given some bad luck, you can become a victim — anyone can. But you act in a certain way that minimizes your risk. You lock the doors when going out. You avoid dark alleys and shady characters down the street. If you see something suspicious, you call the police.

In that respect, e-crime isn’t different. To stay safe online, you have to use common sense, employ security tools, and avoid the shady places on the web. That won’t make you 100% safe — nothing will — but it will make you exponentially safer.


nordvpn


Passwords: the weakest link in your cyber defence 


It all starts and usually ends here. Cybercriminals can do the most damage to you and your finances if they take over your online identity. And sometimes, the barrier that stands between your online security and a cybercriminal is a weak password.

If a cybercriminal takes over your primary email account, they have many paths to choose from. They can send out password-change requests to the most popular services and take over your social media, e-shopping, and messaging accounts. They can search your emails for sensitive details, maybe even credit card information. They can sit and wait, read your emails, spy, and stalk you in real-time. 


READ MORE: 4 Useful reasons why you need a VPN when travelling



So if you do one thing, do this: change your password to a stronger one. A strong password should be a random sequence of at least 8 upper- and lower-case letters, symbols, and numbers. 

Better yet, use a password manager. 

What a password should not be

  • A password should not be easily guessable by someone you know. 
  • It should not be a mish-mash of random words — a dictionary attack will break it. 
  • It should not be painfully obvious, like QWERTY or 123456 or 1111111.

Two-factor authentication


Also known as 2FA or two-step verification. It’s a process when you secure your system with an additional factor: it can be a fingerprint, a retinal or facial scan, or an additional device. For example, you enter your password on your laptop (the first factor) and then you enter the confirmation code you’ve received on your phone (the second factor). 

Unless you need to access the device or account instantly, you should turn on 2FA if possible. Even if your password gets stolen, the second factor should protect you from intrusion.

Public Wi-Fi — the dark alley of the web


No matter how often you walk down a narrow alley at night, you feel uneasy. The confined space and darkness makes you feel vulnerable —  you know you won’t be able to spot threats in time or retreat.

That’s how you should feel every time you connect to a public Wi-Fi. Most of these hotspots have poor configuration or weak passwords. Some of them are fake — set up by the hackers themselves.

Once you connect to such a network, your traffic is an open book to any cybercriminal lurking there. That’s why a VPN is a must if you use public Wi-FI networks. It encrypts your traffic, making it undecipherable to online snoopers — including your internet service provider. 

Don’t go to shady (online) neighbourhoods


A link is a teleporter — it takes you to a different place. That’s why before clicking it, you must be sure it won’t take you to a malware-infested website. 

If you’re not sure where it links to, don’t click it. Furthermore, if someone you don’t know sends you a suspicious email or messages you, don’t engage. A lot of online scams are perpetrated with the help of their victim. So don’t participate.

Bekki Barnes

With 5 years’ experience in marketing, Bekki has knowledge in both B2B and B2C marketing. Bekki has worked with a wide range of brands, including local and national organisations.

Birmingham Unveils the UK’s Best Emerging HealthTech Advances

Kosta Mavroulakis • 03rd April 2025

The National HealthTech Series hosted its latest event in Birmingham this month, showcasing innovative startups driving advanced health technology, including AI-assisted diagnostics, wearable devices and revolutionary educational tools for healthcare professionals. Health stakeholders drawn from the NHS, universities, industry and front-line patient care met with new and emerging businesses to define the future trajectory of...

Why DEIB is Imperative to Tech’s Future

Hadas Almog from AppsFlyer • 17th March 2025

We’ve been seeing Diversity, Equity, Inclusion, and Belonging (DEIB) initiatives being cut time and time again throughout the tech industry. DEIB dedicated roles have been eliminated, employee resource groups have lost funding, and initiatives once considered crucial have been deprioritised in favour of “more immediate business needs.” The justification for these cuts is often the...

The need to eradicate platform dependence

Sue Azari • 10th March 2025

The advertising industry is undergoing a seismic shift. Connected TV (CTV), Retail Media Networks (RMNs), and omnichannel strategies are rapidly redefining how brands engage with consumers. As digital privacy regulations evolve and platform dynamics shift, advertisers must recognise a fundamental truth. You cannot build a sustainable business on borrowed ground. The recent uncertainty surrounding TikTok...

The need to clean data for effective insight

David Sheldrake • 05th March 2025

There is more data today than ever before. In fact, the total amount of data created, captured, copied, and consumed globally has now reached an incredible 149 zettabytes. The growth of the big mountain is not expected to slow down, either, with it expected to reach almost 400 zettabytes within the next three years. Whilst...

What can be done to democratize VDI?

Dennis Damen • 05th March 2025

Virtual Desktop Infrastructure (VDI) offers businesses enhanced security, scalability, and compliance, yet it remains a niche technology. One of the biggest barriers to widespread adoption is a severe talent gap. Many IT professionals lack hands-on VDI experience, as their careers begin with physical machines and increasingly shift toward cloud-based services. This shortage has created a...

Tech and Business Outlook: US Confident, European Sentiment Mixed

Viva Technology • 11th February 2025

The VivaTech Confidence Barometer, now in its second edition, reveals strong confidence among tech executives regarding the impact of emerging technologies on business competitiveness, particularly AI, which is expected to have the most significant impact in the near future. Surveying tech leaders from Europe and North America, 81% recognize their companies as competitive internationally, with...