How to register correctly
Do not let them look over your shoulder when entering passwords. Pay attention to your surroundings.
Check your computer regularly for malware. If you suspect that your computer may have been tampered with, check whether so-called keyloggers have been installed. These are small devices that are usually placed between the keyboard and the computer or in a USB port and record keystrokes.
Where to register
You should only enter your access data on trustworthy devices, never on public, uncontrollable systems such as Internet cafés or hotel lobbies.
To ensure that authentication information cannot be eavesdropped during entry or transmission to the target system, care must be taken to ensure secure transmission.
Public WLAN networks in particular carry the risk that attackers will eavesdrop on network traffic. Attackers could also use WLAN networks they have created themselves to misdirect users and record and manipulate their data ("man-in-the-middle attack"). Therefore, only enter your user data in trusted network environments.
For web services the login must always be encrypted. This is indicated by a closed lock and the prefix "https://" in the address line of the browser. When entering the address, also pay attention to spelling mistakes. Attackers often use addresses with typical spelling mistakes to spy on users (e.g. yuotube.com).
Ending a session
Even the best passwords are useless if computers are left carelessly and running sessions are left open unprotected.
End your session (logout) after you have finished your work. If you leave your computer / workstation, lock it, even if it is only a short absence. The lock should be set so that unlocking requires the entry of the password.
Some websites work with session cookies that have a certain runtime in which you remain logged in. If you are unable to log out on a website, you must close the browser completely to end the session and effectively log out.