Keep your operating system, installed programs or mobile apps updated. Hackers often penetrate exploiting a vulnerability that exists in software. You probably heard of WannaCry, the ransomware attack that occurred in May 2017. WannaCry spread by exploiting a vulnerability in Windows and the impact was global. Microsoft had released patches before the attack, yet many organizations had to apply those.
When a vulnerability is discovered, the developer company often provides fixes for those security holes in updates. Moreover, many such security holes in popular software are often available on the internet. Running outdated software is like keeping a door open for the criminals.
Enter sensitive data or do online transactions only in websites secured with SSL (Secure Socket Layer). If a website is secured with SSL, you can identify by looking at the URL or the address bar. The URL should contain HTTPS instead of HTTP.
VPNs encrypt the data following between your device and the Internet protecting you against eavesdropping. Using an encrypted connection to send and receive sensitive information over the Internet is strongly recommended.
Public computers are used by many and you may not have the luxury to install the latest antivirus and you don’t know the programs it contains.
Never use a dictionary word as the password. Doing so makes it easier for hackers to gain unauthorized access by checking all possible dictionary words for a match. This type of attack is known as “Dictionary Attack”, and software can be designed to make the attack automatic.
Use different passwords for each of your accounts. If someone figures out the password of one account, that person may be able to access your other accounts too. Moreover, as every site does not take security too seriously, so hacking some sites may not be too difficult.
Having access to your phone means, the intruder can reset the passwords to gain unauthorized access to your accounts. The result will be far more devastating if you kept your debit/credit card added promoting the intruder to make transactions.
You probably have accounts on different websites or apps where you used your email to sign up. Having access to your email means, the intruder can reset the passwords to gain unauthorized access to your accounts. The result will be far more devastating if you kept you debit/credit card added promoting the intruder to make transactions.
Incognito mode or private browsing is a feature available in many web browsers. If it is enabled, the browser will not store your browsing history. The websites you visit, the data you entered in web forms will vanish after you close the browser tab, if you use the incognito mode, the browser will not keep you logged in even if you forgot to log out and prevent advertisers to target you based on your past browsing history. Incognito mode enhances your privacy, especially if you are on a public computer.
In phishing, the attacker tries to obtain sensitive information such as debit/credit card details, login details (like usernames, passwords, etc.) by pretending to be someone else, often masquerading as a trustworthy entity, e. g. an employee of a bank, payment processors or as such.
Your smartphone may facilitate you to configure settings so that you can wipe the phone data remotely. This is very handy to format your mobile in case of a loss.
Get more cybersecurity tips delivered right into your email inbox and keep your digital life safe. It's FREE!