Positive Internet Access

How to find trusted websites

An important part of positive internet access is knowing how to find and identify trustworthy websites. According to About.us, one way to tell if a website is trustworthy is to look at the url. If it has https:// then that means it has a secure connection, compared to just http://. Check to make sure if the site is secure before giving personal information such as credit card information or social security number. Look for an author on the website and check to see if they have a biography or short description about themselves. If the bio has too many vague terms, it might not be legit. In addition, research the author to confirm and look for more information about them. Look at and read through the website to check for any grammatical errors, poor writing skills, or bad design. Also, check for bias in the website to make sure you get accurate information. [1]

Computer on a desk in a brightly lit room

Avoiding ads online

Knowing how to avoid ads online is important to make your experience online better and more positive. The website Computer Hope says most web browsers have resources to help users block ads. On some browsers, they can go into the settings and turn off and block pop-up ads. In addition to changing the settings, one can download an ad blocker browser extension. When the ad blocker is turned on, it will block the ads, so the page will appear clear of ads. Ads can be invasive, annoying, and even sometimes harmful to a user’s device, so it is useful to know how to avoid them. [2]

Laptop open with emails

Keep private information safe

A major part of staying safe online and keeping interactions positive is keeping one’s private information safe. Norton.com advises to not click on links or emails that seem suspicious since cybercriminals can harm devices this way. Furthermore, passwords are an important part of online safety. Use passwords made from combinations of numbers, letters, and symbols, so they are secure. Keep passwords to yourself; never share them with anyone; and change them often. Finally, Cyber Defense Magazine says users should back up frequently, so if they are a victim of a cyberattack, their information will still be available to them. [3] [4]

Laptop sitting on a desk with a blue screen