Tumgik
#Hack-proof your life: 5 key steps to boost your safety online
viralhottopics · 7 years
Text
Hack-proof your life: 5 key steps to boost your safety online
Illustration file picture.  (REUTERS/Kacper Pempel)
At this moment, someone wants your information. Hackers covet your email account, your home address, and your social security number. They want to commandeer your webcam and break into your bank account. They are just waiting for you to slip up and give them a chance.
Malevolent coders are finding backdoors and vulnerabilities, but there are simple ways to protect yourself. 
Follow these five steps to boost your safety online instantly.
1. Passwords
Ive heard it a million times: I know that I shouldnt use the same password at every site, but I do. or Every time I set a new password, I forget it.
Well, get over it. Relying on a weak password is asking to be hacked. Your passwords are either your first line of defense against hackers, or theyre an open window that lets them slip through. In cyber-security, there is no middle ground.
How dangerous is it? A lowercase, six-character password takes a hacker around 10 minutes to hack. Add four more characters, and you extend the time of that heist by 45,000 years.
Ready to give your passwords the strength of Fort Knox? Heres a quick to-do:
Create a unique and complex password that isnt hard to remember. One trick is a passphrase, which is both a statement and a complex series of characters, cases, and numbers. Make a phrase thats specific to you like, MySonWasBornOnAug12!
Change your password regularly, but not too often. I recommend that you change your password at least once every 12-month period. If one of the services you use is involved in a data breach, youll want to update your password for that account.
I wrote an entire tip about tools and tricks to remember hard-to-guess passwords. Click here for the best solutions to remember difficult passwords.
2. Set up two-factor identification
Youve probably seen this before, even if you didnt know what it was called. Two-factor identification is a fancy name for adding another step to the login process. A login page may ask for your first car or your favorite food. The website might even send a text message with a special code, to make sure you are who you claim to be.
Two-factor identification adds an important layer of protection to your account. For hackers, the coup de grace is setting up instant alerts when your account is accessed from an unfamiliar device or location. Usually, this is you because youre logging into your email account from an internet café in London, or youre checking your bank balance on a trusted friends phone.
Other times, its a hacker who is trying to figure out your credentials. You will receive a notification by email or text saying that there was a login from an unrecognized machine or someone asked to reset your password. The login will not be authorized or the password reset without having the special code included in the email or text.
If you do nothing else on this list, click here for the steps to turn on two-factor authentication on Google, Facebook and other sites you use.
3. Delete accounts youve abandoned
Youve probably encountered this before. Some spammy message shows up in your inbox, allegedly send from your beloved Aunt Joan. Why does Aunt Joan want you to click on this strange-looking link? Why is she suddenly interested in giving you a limited-time discount on a Rolex watch? These messages are sure signs of a hacked account.
The rule of thumb is this: Old accounts contain more personal data than you realize, no matter how short-lived and no matter how long it’s been abandoned.
Have too many online accounts to remember them all? Click here for a site that provides you with the steps you need to close down the accounts youre no longer using.
Sometimes, you may want to delete accounts simply because you’ve lost trust in the company that’s storing your private information. After Yahoo’s cover up of multiple data breaches, I recommend that you close your Yahoo account for Yahoo Mail and other related services such as Flickr, Tumblr, Yahoo Sports, Yahoo Messenger, Yahoo Shopping, Yahoo Music, etc. Click here for a step-by-step guide for the steps you need to take right now if you’re a Yahoo customer.
4. Check if your info has been stolen
Now youre on a mission to boost your security. But what about data thats already been stolen? How do you find out whether an account has already been broken into?
At least one trusted site is dedicated to precisely that: HaveIBeenPwned sifts through your accounts in search of security breaches. Just run your email address and username through the search field, and it will tell you if your login information has been linked to any past breaches.
5. Encrypt all of your messages
Encryption used to be a word reserved for international super-spies but not anymore. What youre looking for is end-to-end encryption. This method scrambles your messages so that they cant be read if someone other than the intended recipient gets it.
Signal Private Messenger One encrypts all messages end-to-end by default. The service also doesn’t keep any user information, such as address books or messages, on its servers. It lets you use your existing phone number and contacts list. For a full list of Signal features and download instructions, click here.
Remember, your chain of online security is only as strong as its weakest hyperlink.
Want to know other ways can you stay safe in the era of cyber-crime? You can listen to the Kim Komando Show on your phone, tablet or computer. From buying advice to digital life issues, click here for my free podcasts.
Copyright 2017, WestStar Multimedia Entertainment. All rights reserved.
Learn about all the latest technology on the Kim Komando Show, the nation’s largest weekend radio talk show. Kim takes calls and dispenses advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website at Komando.com
Read more: http://fxn.ws/2i873H8
from Hack-proof your life: 5 key steps to boost your safety online
0 notes
high-tech-news · 7 years
Text
The biggest barrier to Windows 10 success is still Windows 7 - ZDNet
http://ift.tt/2kglbfZ
ZDNet
The biggest barrier to Windows 10 success is still Windows 7 ZDNet Windows 7. Image: Microsoft. This year's CES saw plenty of shiny new Windows 10 devices on display, from the acrobat Lenovo Yoga through to HP's all-in-one Sprout Pro. Hardware like this will certainly boost the fortunes of Windows 10. Sleek new ... Windows 10 Changes Include Free Upgrade Option for EnterprisesTop Tech News Hack-Proof Your Life: 5 Key Steps To Boost Online SafetyCIO Today Amazon Has Patented a Highway Network To Control Self-Driving CarsNewsFactor Network Colorado Springs Gazette -The Merkle -Technology Decisions -Softpedia News all 15 news articles »
high-tech-news.tumblr.com
1 note · View note
Text
A tweet
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety #cybersecurity https://t.co/P2w6wzRFps
— Cyber Career Advisor (@CyberCareerAdv) January 23, 2017
0 notes
danderson8 · 7 years
Text
The biggest barrier to Windows 10 success is still Windows 7 - ZDNet
ZDNet
The biggest barrier to Windows 10 success is still Windows 7 ZDNet Windows 7. Image: Microsoft. This year's CES saw plenty of shiny new Windows 10 devices on display, from the acrobat Lenovo Yoga through to HP's all-in-one Sprout Pro. Hardware like this will certainly boost the fortunes of Windows 10. Sleek new ... Windows 10 Changes Include Free Upgrade Option for EnterprisesTop Tech News Hack-Proof Your Life: 5 Key Steps To Boost Online SafetyCIO Today Amazon Has Patented a Highway Network To Control Self-Driving CarsNewsFactor Network Colorado Springs Gazette -The Merkle -Technology Decisions -Softpedia News all 15 news articles »
from Technology - Google News http://ift.tt/2jRZNRt via IFTTT
0 notes
Text
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety
At this moment, someone wants your information. Hackers covet your email account, your home address and your Social Security number. They want to commandeer your webcam and break into your bank account. They are just waiting for you to slip up and give them a chance. Everywhere you look, malevolent coders are finding backdoors and vulnerabilities. There are simple ways to protect yourself. Follow…
View On WordPress
0 notes
nigerianguide · 7 years
Text
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety
http://dlvr.it/N9kFnl
0 notes
wonkbanned · 7 years
Link
Hack-proof your life: 5 key steps to boost your safety online - USA TODAY
0 notes
ehackings · 7 years
Text
TheDiginewz
#Hack-proof your life: 5 key steps to boost your safety online https://t.co/iTecnyEipq #Hack #Infosec
— TheDigiNewz (@TheDigiNewz) January 8, 2017
from Twitter https://twitter.com/TheDigiNewz January 08, 2017 at 01:05PM via IFTTT
0 notes
Text
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety #cybersecurity https://t.co/P2w6wzRFps
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety #cybersecurity https://t.co/P2w6wzRFps
— Cyber Career Advisor (@CyberCareerAdv) January 23, 2017
via Twitter https://twitter.com/CyberCareerAdv January 23, 2017 at 03:52AM
0 notes
Text
A tweet
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety #cybersecurity https://t.co/P2w6wzRFps
— Cyber Career Advisor (@CyberCareerAdv) January 23, 2017
0 notes
Text
A tweet
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety #cybersecurity https://t.co/P2w6wzRFps
— Cyber Career Advisor (@CyberCareerAdv) January 23, 2017
0 notes
Text
A tweet
Hack-Proof Your Life: 5 Key Steps To Boost Online Safety #cybersecurity https://t.co/P2w6wzRFps
— Cyber Career Advisor (@CyberCareerAdv) January 23, 2017
0 notes