Almost every day, you wake up to the news of some or the other hacking incident. Whether it's the news of India losing 22GB data to cyber attack or hacking attacks on Twitter accounts, WordPress and Apple, hackers are sparing none.
To ensure better information security, information security consultants and users need to be vigilant and work in harmony with each other. Though, it is advised to avail the services of the experts, you can't leave everything on them.
There are certain security practices that users should religiously follow in order to protect their privacy and other information stored in their hardware devices including computers, mobiles and tablets.
Create strong login passwords
Password forms the first line of defense to your online and offline digital information so it is important to set passwords that are strong and not predictable.
Consider the following tips while you create passwords:
• It should have at least 10-digits
• It should include a mix of special characters (@_ *!$#), letters (upper- and lower-cased) and numbers (1,2,3 etc).
Make sure, you are not using same passwords for more than one site.
Choose unpredictable answers to security question
For most of the websites including Yahoomail and Gmail, you need to select and answer some security questions, such as"what is your mother's maiden name?", "where was your father born?", "what is the name of your childhood friend? ", and so on.
The utility of these questions comes into play when you forget your password. While you go for a password reset, the website asks for the answers you have provided for the selected questions. It is to verify if the account belongs to you.
Hackers can gain access to your personal accounts if you choose common questions or simple answers. For example, it would be easier for somebody who knows you to find out your mother's maiden name or the name of your high school.
To deal with this possible situation, outsmart them by picking a complex answer. For instance, if you choose to enter your mother's maiden name, enter it in reverse order of alphabets (but don't make it so complex that you forget it too).
Install a firewall security to your device
Make sure you computer is protected by a Firewall or a reliable anti-virus software. Firewalls act as a security layer between device (computer, laptop or tablet) and the outside world.
A Firewall is a network filter that does not allow unauthorized or potentially dangerous data from the Internet to enter into your computer. Also, it blocks unauthorized access of persons to your computer while you are online.
Protect your Wi-Fi with a password
Securing your Wi-Fi with a password is as necessary as locking your home. If left unprotected, a hacker can use your Wi-Fi to get access and control over your computer. Through this control, he can send spam, steal confidential information, or the worst, can break into your online bank account through a record of sites you visit. As we discussed in Rule 1, create strong passwords.
Don't click on unfamiliar links
We all get them. It can be a tempting email that breaks the news of lottery you have won. It can be from a helpless widow who would like to give you her money in exchange of some personal help. Do such windfall gains happen in reality?
Our mailbox gets many such spam mails daily. Make sure you don't click on these links or open attachments.
Make it a thumb rule. Never open unfamiliar links and attachments. It would be like handing over your keys to a thief willingly. Opening such links may cause your hard disk to crash. Moreover, hackers can gain access to your confidential information through this.
Opt for double-verification when available
Google, Microsoft, Apple, Twitter along with different banks provide users with the option of two factor authentication. But, users need to apply for it. They have to activate it for their personal accounts which they should be doing on urgent basis. Token security or two factor authentication is an effective way of ensuring the security of your online and offline information. RSA, VASCO, INNEFU etc are few companies providing token security.
0 comments:
Post a Comment