Barely a week goes by without news of a new tech security breach, which typically involves unauthorized access to personally identifiable information (PII) or the hackers hiding sensitive data until they receive their payment (a ransomware attack).
These digital attacks happen to businesses of all sizes, but individuals can also be victims of malicious actors. These basic security measures will help protect your personal information from unauthorized actors.
1. Password Protection
One of the most common forms of data leakage is access to user passwords. To prevent this, use passwords that are hard to guess and change them regularly. Avoid using sequential numbers or names of pets or hobbies, as these are easy to guess passwords.
Use different passwords for all your online accounts. If one password is compromised, all your passwords are at risk. Don't reuse old passwords. Choose a unique password every time you change your password. Don't write down your passwords or share them with others.
2. Use two-factor authentication
Also known as two-factor authentication, this security method requires users to verify their identity with two different identifiers: if one or both of the identification factors fail, access is denied.
The two factors used to verify your identity may include a combination of a password and a biometric such as facial recognition or a fingerprint. Other identifiers may include the use of a PIN, the correct answer to a security question, a password, or other information known only to the user.
3. Don’t open spam emails
Spam emails are not only annoying, they also pose a threat to your devices and data. Some spam messages may look official because they use logos of well-known companies, but you should not open them. These messages often contain viruses or messages that trick you into paying money or disclosing personal information.
A common scam is an email claiming to be a receipt for hundreds of dollars to be deducted from your PayPal account for services you didn't order. If you call the number provided, the scammer will ask you to reveal your credit or debit card number so they can dispute the charge. Don't be fooled.
4. Avoid Unfamiliar Websites
When you're online, you may receive links to websites via email or social media messages. Some may link to legitimate sites, while others may direct you to harmful sites.
Some links will come from people you don't know and some from people you know well, and you might not realize that the link is to a malicious site, so it's best to stick to websites you know well.
5. Use social media safely
Social media platforms make it easy to connect with family and friends and meet new people. Users often share photos and information about their lives, creating a perfect opportunity for hackers.
Bad actors use personal data found online to exploit users. If there is information about your personal life that you would not want others to see, then you should not post it online.
6. Suspicious Links and Attachments
Hackers will go to great lengths to exploit weaknesses in your computer's security, and email is a very effective way to do this. They will attach a link that takes you to a fake website requesting confidential information.
Bad actors will attach official-looking documents to emails and ask for your confirmation. If the attachment doesn't come from a trusted or unexpected source, don't open it. The document could contain malicious code that will infect your device.
7. Don't use your debit card online
Many people enjoy the convenience of shopping online, which also presents a great opportunity for cybercriminals, but you can take steps to keep your purchases safe.
Avoid using debit cards linked to bank accounts, as hackers could access your debit card numbers and empty your account. If possible, use a credit card or online payment system such as PayPal or Venmo for added protection against fraud.
8. Use security software
Security software protects networks, desktops, laptops, and mobile devices from cyber threats, including viruses, malware, unauthorized access, and Denial of Service (DoS) attacks that lock out accounts.
Security software helps protect your systems, data, and access from malicious actors and the risks they pose. Not all security software is created equal, so it's important to research the best software to meet your specific protection requirements.
9. Avoid unsafe downloads
Some downloads are necessary for online use, but not all are harmless. Be careful what you download and where you download it from – inappropriate downloads can damage your device or put your data at risk.
Only download games, apps and software from sites you are familiar with. Instead, download apps from secure platforms like Apple's App Store or Google's Play Store, and download software and plugins from trusted websites.
10. Back up your data
Regularly backing up your data is one of the most important actions you can take, especially in the event of a security incident. If any information on your device is lost or deleted, you can reconstruct it using the data backup.
Computers have a backup process that can be found by searching for “backup” on your device. Users can enable automatic backups on their computers and mobile devices without human intervention.
11. Always check for system updates
Updating your computer's browser, software, and operating system probably isn't a high priority, but it should be. Older systems are vulnerable to attacks, but newer systems are also at risk.
The good news is that you rarely have to complete these updates manually: your device will send you reminders about system updates that require your approval, and many devices have settings that allow system and software updates to run automatically.
12. Use a password manager
Remembering all the different passwords you use for your different accounts can seem impossible, but a password manager can make the task easier. Password manager programs store your passwords digitally in one secure location.
Programs like iCloud Keychain and Google Password Manager allow you to store your passwords on all your devices. For example, if you have an iPhone, iPad, and MacBook, iCloud Keychain works on all three devices.
13. Don’t store payment information
When you make a purchase online, many websites ask if you want to save your credit or debit card information for future use. Although it's tempting to say yes, it's best to decline this option.
Even the most reputable websites can fall prey to bad actors. If your device stores your credit or debit card information on a merchant website that has been hacked, you risk that data being stolen and used by bad actors.
14. Protect your devices
If you need to leave your laptop, smartphone or tablet temporarily, lock it or take it with you to prevent others from accessing your valuable data. If you're using a desktop computer, set it to a lock screen or turn it off completely.
If you use an external hard drive, flash drive, or solid-state disk (SSD) drive for storage, make sure your data is encrypted and keep it locked when not in use.
Websites that have the words HTTPS (Hypertext Transfer Protocol Secure) in their URL are encrypted and more secure than HTTP sites, and this encryption makes them relatively safe to use over secured public Wi-Fi networks.
When public Wi-Fi networks are unsecured, they are more vulnerable to cyber attacks. Unsecured Wi-Fi networks do not require a login, security agreement, or password to access. Use a VPN (Virtual Private Network) or use your smartphone's hotspot when on public Wi-Fi networks.
16. Safe Use of Mobile Devices
Malicious attackers target laptops and desktop computers, but also smartphones and tablets, so don't leave your devices unattended in public places and use two-factor authentication to unlock them.
Don't open text messages from senders you don't know or click on links in text messages. If lost or stolen, use features like Device Manager on Android devices or Apple's Find My iPhone to help locate your phone.
17. Encrypt your data
There are software programs available to encrypt data on desktops and most mobile devices. However, it is important to keep personal and sensitive data off your devices as much as possible. This data includes credit card numbers, Social Security numbers, bank account numbers, personal health information, etc.
If you must store or transmit personal information on your device, encrypt it to protect it from unauthorized users. When you no longer need personal or sensitive data, remove it from your device.
Read more from us – 17 Movies that surprised us with zero expectations
You should never judge a book by its cover, and the same can be said about movies.
Some of our favorite movies are ones we watch with no expectations, and yet they manage to wow us from start to finish.
17 movies that surprised us with zero expectations
Read more from us – Classic 80s Movies That Are Better Than Any Film Released Today
The '80s was a great time for movies. With everything from award-winning films to hilarious comedies, there was something for everyone.
Thankfully, many of the movies from the 80s still hold up today, and I watch these beloved 80s movies more often than I watch modern films.
Classic '80s movies that are better than anything released today