8 cybersecurity mistakes almost everyone makes

The mistakes are universal, the fixes are simple, and you can address all 8 in an afternoon.

By Ana Kovács · Senior Privacy Analyst Reviewed by Lena Park · Cybersecurity Editor Published: Updated: ⏱ 3 min read list-post · cybersecurity · mistakes · fixes · actionable
Quick answer

Reusing passwords across sites. Treating SMS 2FA as enough. Not patching personal devices monthly. Trusting URLs in emails. Storing the only copy of important data on one device. Connecting to public Wi-Fi without protection. Sharing password-recovery info on social media. Skipping the bank account review. Each has a 5-minute fix. Address all 8 in one afternoon.

Key takeaways

  • Password reuse, SMS-only 2FA, and unpatched devices are the top three personal-cybersecurity errors.
  • Lying on security questions is a feature, not a bug — store the lies in your password manager.
  • Test charges of $1-3 are the early warning of card fraud — review monthly.
  • Public Wi-Fi without VPN is meaningfully riskier than home Wi-Fi.
  • All 8 fixes together take ~4 hours; deferred indefinitely they cause real harm.

1. Reusing passwords across sites

Why it's bad: when one site is breached, attackers automatically try those credentials on Gmail, banking, social media. Credential-stuffing succeeds against ~5% of accounts.

Fix: install Bitwarden or 1Password. Generate unique random passwords. Migrate gradually starting with email and banking.

2. Treating SMS 2FA as enough

Why it's bad: SIM-swap attacks have stolen millions in cryptocurrency and account takeovers. SMS is better than nothing but the weakest 2FA tier.

Fix: switch important accounts to authenticator app (Aegis, 2FAS, Raivo) or hardware key (YubiKey).

3. Not patching personal devices monthly

Why it's bad: zero-days are exploited within hours of patch release. Unpatched devices are exploited via known vulnerabilities, not novel ones.

Fix: enable automatic OS updates (iOS, Android, Windows, macOS all support). Restart your browser daily so updates apply. Same for routers — most need manual updates; check yours quarterly.

4. Trusting URLs in emails

Why it's bad: AI-generated phishing has eliminated the old tells. The link domain is the only reliable signal.

Fix: hover/long-press every link before clicking. Compare to the legitimate domain character-by-character. For sensitive requests, verify out-of-band via phone.

5. Single-copy data storage

Why it's bad: phones break, laptops get stolen, cloud accounts get locked. The 3-2-1 backup rule (3 copies, 2 media, 1 offline) prevents most data-loss scenarios.

Fix: enable iCloud or Google backup. Add a second cloud (Proton Drive, Backblaze). Once a quarter, copy critical files to a USB drive kept offline.

6. Public Wi-Fi without protection

Why it's bad: HTTPS protects most content, but DNS leaks reveal which sites you visit; rogue networks at airports/cafes harvest credentials.

Fix: use a VPN on public Wi-Fi. Disable auto-connect to known SSIDs. On phones, use cellular data instead of unknown Wi-Fi when possible.

7. Oversharing password-recovery info on social media

Why it's bad: 'What was your first pet's name?' security questions are answered in old Facebook posts. 'High school you attended?' is on LinkedIn.

Fix: lie on security questions. Generate random fake answers and store them in your password manager. Answer 'mother's maiden name' with 'gK8R-pL3m' if you want.

8. Skipping the monthly bank statement review

Why it's bad: card-not-present fraud often starts with small test charges ($1-3) before large ones. Catching the test means catching the fraud before it scales.

Fix: every month, scan your statements for any charge you don't recognize. Most banks let you set up alerts for any transaction over $X — enable them.

Frequently asked questions

Which of these matters most?

Unique passwords + phishing-resistant 2FA on email + auto-updates. Email is the recovery channel for everything; protecting it is the highest-leverage move.

Is a VPN really necessary on public Wi-Fi if HTTPS is everywhere?

HTTPS protects content but not metadata (which sites you visit) and not against fake-Wi-Fi-name attacks. A VPN is meaningfully better on networks you don't control.

I've reused passwords for years. Where do I start?

Start with email and banking — change to unique strong passwords today. Then password manager every site over the next 2 weeks. Don't try to do all 100+ accounts in one sitting.

What if I can't remember which sites I have accounts on?

Search your email for 'welcome' and 'verify' messages — that's most of your account list. Also check Google Password Manager or Apple Keychain for saved logins.

My bank doesn't support hardware key 2FA. What do I do?

Use authenticator app where supported. Enable transaction alerts. Periodically push your bank for better 2FA — they tend to add support when customers ask.

Sources & further reading

We cite primary sources whenever possible. Below is the reference list relevant to this category. Specific facts in this article are checked against vendor documentation and the sources we link to inline.

How we research: see our Source Policy and Review Methodology. If you spot an inaccuracy, please tell us — we publish corrections at the top of the affected article.

Ana Kovács · Senior Privacy Analyst

Ana has spent 9 years writing about consumer privacy, encryption protocols, and secure remote-work setups.

Related guides