How to avoid trouble in general:
1) Keep your computer operating system, and software, up to date. Most vulnerabilities get patched - it's the users who are the real vulnerability. Whilst zero day exploits exist they aren't shared widely with naughty people as they'll be revealed fast - and no offence, but you're not important enough by any means to use one. This alone will negate the vast majority of potential issues as you surf la net.
2) Don't use unsecure wifi in cafes, airports or elsewhere. In fact, don't use wifi that you don't
know either. It's trivial to set up your own phone as a wifi access point and start grabbing people's data as they connect; no hotspotting.
3) Don't click on links or other such stuff in emails, instant messengers and so on; don't download things without knowing what it is you are downloading.
and lastly...
Keep your computer/software/mobile
up to date.
p.s. advice to change passwords regularly is now out of date. Due to issues with memorising lots of passwords, many start using formulaic, predictable, patterns. Increment by 1 sound familiar when prompted for a new password? Same with substitution of letters/numbers/characters, it's moderately trivial to go through those. Social engineering and knowledge you may share can reveal vectors that increase the chances of breaking passwords easily too. If you use numbers, are they sequential ones? Are they... dob year (by far the most common - yours or families), or telephone, zip code, car number plate etc etc. Usually just appended to the end, and then incremented on a change.
Use a password manager instead - there are plenty of free ones out there that are very good and you don't then struggle to remember passwords. That's the other big issue with passwords, people use the same ones all over the place.
Sage advice - check on
https://haveibeenpwned.com/
Enter your email(s) and see if any of the sites that have been breached had it entered. I've got several on there... including Adobe, Daniweb, Kickstarter, linkedIn, Gamingo, and others. Some of the sites included email/password in a weak MD5 with no salt - meaning it's trivial to use widly available hash dictionaries to find out what the password was (or could have been). With several sites being similar, it's entirely possible they can start to spot your password "tactics."