13 ways to protect your account from hacking
Technologies / / December 19, 2019
1. Remove unused accounts
To register for a resource that you do not use, do not hit the active profiles, always remove the old accounts. The less active profiles, the better (if only because they do not have to keep a dozen logins, passwords in your head).
The same applies to applications in which you walk through a social network. Much easier to click on "View using Facebook», than go through the entire registration process, right? Take care to whom and under what conditions provide access to the data of their profiles. And if you do not use the service, delete the profile and then verify that remained in the site or application access to your personal data. Access to Facebook, you can check hereTo the Google-account - here.
2. Configure the password manager
Programs like LastPass will not only be remembered for your username and password, but will generate a new - ultrazaschischonnye. And still prohibit the use of the same password for all resources at once. You do not do that, right?
3. Use a two-step authentication
The attacker, even taking possession of username and password, can not log in to your account without SMS confirmation, if you configure two-factor authentication. It has almost all Microsoft products, Apple and Google. The only disadvantage: even if you are not an attacker, will still have to enter a code every time the phone, to logout in their own accounts.
4. Security settings change password
How easy is it an outsider to change the password on your account? For example, to reset the password for the account Apple ID, you need to pass two-factor authentication or respond to test questions. To recover your password for Gmail will need a mobile phone number or an e-mail. But all of these settings need to be preset: enter an alternate email for hedging or one known only to you the answer to a security question. Right now.
If questionnaires or comments you asked: "Who was your first dog?" - silent as a partisan! In this simple way the enemies will know the words of codes for common security questions.
5. Check Activity Profile
Many services memorize your activity, and in this case it's a good thing. So you learn not use if someone else in your account. Some services such as Gmail to send a notification to your smartphone and the post office, if they see that in the account included in unusual user region or country. You can check the activity profile Google or in Facebook.
6. Update frequently the program
Irrelevant software - the source of problems and another loophole for hackers. To complicate the criminal life, try to update the software as soon as a notification arrives. Many services have brought this process to automatism, because you do not need to dig into the settings button in the search for "Find available updates". Just click on the appropriate button when you receive a notification.
7. Change your passwords regularly
Change passwords once a year - a normal practice. And do not be lazy to invent combinations pozakovyristee. A modified old passwords - a bad idea.
8. Use a separate email to registrants
Get a separate email account to log in to all kinds of resources, including sotsialok. And no one else did not let us. Let it be your secret box. A second email, you can easily point to a work contact or on business cards.
9. Configure Remote smartphone management
Settings for iOS- and Android-devices allow to block access or delete the data from your phone remotely. A useful feature if you are permanently lost smartphone or it was stolen.
10. use a VPN
VPN - a useful technology that allows to hide the present location of the user, to protect the transmitted or received by them data, and provides access to the closed country sites and services. Always handy.
11. Set passwords on your PC and smartphone
Like two-step authentication, this method adds extra action. But, you see, you enter the password for the Microsoft account for three seconds, and the attackers will have to tinker much longer. If your smartphone or laptop has a fingerprint authentication, use it as an alternative to a digital pin-codes.
12. Do not share accounts with other users
If someone asks you for a smartphone or a laptop "for a moment", even using a guest account. Log in as a guest, you can on Windows and MacOS, not so long ago, Google and Apple introduced the guest mode and smartphones. Switching between the guest and the main profiles will not take long.
13. Ensure that than sharing in social networks
Let the date of birth, address and mobile phone number will be visible only to friends or to you alone. Do not share in the social sphere that can be used against you. And still do not make the password the name of your favorite football team, if the pipe is about her every second his post.
And what do you know about account security on the Internet and that are applied in practice? Share in the comments!