Just because there is a pandemic out there does not mean that hackers and other cybercriminals are going easy on internet infrastructure among other stuff. Governments along with celebrities and technology companies of all sorts are constantly getting bombarded with cyberattacks.
The environment has become such that a cyberattack on an organization is inevitable more than anything else. David Kennedy though (a hacker who has worked for the NSA) holds the opinion that people and organizations alike can take steps to make sure that they have the best chance of surviving a cyberattack without any loss of data or infrastructure.
According to David, a TV Show by the name of Mr Robot portrays a hacker pretty accurately in terms of what the hacker can and cannot do. Generally speaking though, a hacker with enough skills should have no trouble in hacking someone’s phone or getting classified access to a giant corporation’s data centre.
Here are the five tips that you should follow in order to keep your private and business life as secure as possible from hackers and other cybercriminals.
Privacyend talks about the tips below more extensively and so check it out if you want to go more in-depth.
Use Two-Factor Authentication Already
And you have to use it everywhere. Or more like, any account or service that you value should have two-factor authentication enabled. Some of the services and apps that you should definitely protect with the two-step verification method are Facebook, Twitter and any banking system that you may use. The good news is that almost all sensitive services and apps offer two-factor authentication.
Such extra security features are heaven-sent for people who want a good night’s sleep knowing that they do not have to worry about someone taking over their important accounts just because they have the right password. So how do you know if the service you want to enable two-factor authentication on actually supports two-factor authentication?
Well, the process is simple enough. All you have to do is log in to your account and then go to the Settings menu. From there you should be able to see an option for it if your service offers it.
If there is such an option, enable that option.
Once you do, the service will always ask you for additional pieces of credentials apart from the correct username and password. Most services and apps that offer two-factor authentication will usually not only register the machine you use to access your account but also send you a text message on that same system in order to verify if it is indeed you who has input the right username and password combination.
Using two-factor authentication is the most important step you can take to secure yourself as even if a hacker gets your username and password, he/she will still need your smartphone device to hack your account.
Use a Password Manager
We have replaced the old and boring advice of using different usernames and passwords for different apps and services for the simple reason that it is no longer sustainable to do that.
If you are an average internet user you probably have dozens of passwords and accounts.
So it doesn’t make sense to memorize them all. What do you do instead?
Use a password manager. And then use that password manager to have different passwords and usernames for all other accounts, services, and apps that you use online.
Always Have the Latest Updates
While it is not true for the entertainment industry, when it comes to cybersecurity, the latest is the greatest. So make sure you have the latest updates for all your stuff. You need to keep up appearances when it comes to security patches. All apps can now auto-update themselves in one way or another. Just make sure you never turn off this feature.
Don’t Use Social Media Without Caution
Exercise caution while putting out information about yourself. Hackers can do lots of bad things if they know your daily routine or your likes/dislikes.
Guard Your Personal Information
Perhaps the most important step is not to give out information such as credit card numbers, social security numbers to anyone that you don’t know. This includes any email or text messages you get from official-sounding senders.