In the technology-intensive world of today, the threat of cyber security has never been more deeply felt.
In 2016 alone there have been a number of high profile hacks, including Spotify in February (their 4th hack within 2 years) and August’s Dropbox breach, which saw more than 68million accounts being stolen. Even Yahoo was not safe, with at least 500million of its accounts being hacked in September.
Today, video hosting site Dailymotion announced that cyber thieves had absconded with more than 85million of its user accounts. According to LeakedSource, the hack occurred on Oct 20 this year.
For those not in the know, LeakedSource allows web users to check if any personal data has been made available online due to hacks.
In the case of Dailymotion and other cyber breaches, a key worry is that people tend to recycle passwords and email addresses across platforms. And with every breach, an increasing number of users become susceptible to phishing attacks and identity thefts.
While no one can guarantee you bulletproof protection against security breaches, here are a few tips on how to protect yourself better.
1. Always Use Different (And Random!) Passwords
While it might seem like a hassle to have to generate random combinations (and remember them), it would guarantee you a much higher level of protection.
Even password generator sites might not be completely safe, as there is no guarantee that the passwords generated are not being shared outside of the platform.
In the end, it’s still safer to go at it yourself, so prime your keyboard smashing fingers – it’s time to get yourself secure.
2. Turn On 2FA (SMS Token)
For more information sensitive sites, start making full use of the available 2FA (2nd Factor Authentication) functions. These passwords add an extra layer of security especially for sites on which you might be storing huge amounts of personal information.
For Facebook, the 2FA authentication can be activated under your settings page.
On your iPhone, iPad, or iPod touch with iOS 9 or later:
- Go to Settings > iCloud > tap your Apple ID.
- Tap Password & Security.
- Tap Turn on Two-Factor Authentication.
On your Mac with OS X El Capitan or later:
- Go to Apple () menu > System Preferences > iCloud > Account Details.
- Click Security.
- Click Turn on Two-Factor Authentication.
On Google, the 2FA can also be activated via the usual login page or through this site.
On Windows 10, as soon as you log in to our account, the system will prompt you to verify your identity either by text or email. In order to activate 2FA, you’ll need to turn it on in your Microsoft Account online though. Under security settings, select “more security settings”.
In the case of Windows 10, users have an added bonus of biometric security (fingerprint or facial recognition) in the form of Windows Hello. This works by the device scanning your face via the built-in camera whenever you sign in.
3. Only Use iCloud Keychain To Save Your Passwords
The keychain is a cloud-based security system that keeps all of your passwords and credit card information up-to-date on approved Apple devices.
On your iPhone, iPad, or iPod touch with iOS 7.0.3 and later:
- Tap Settings > iCloud.
- Turn Keychain on.
- Follow the onscreen instructions.
On your Mac with OS X Mavericks 10.9 and later:
- Choose Apple () menu > System Preferences, then click iCloud.
- Select Keychain. If you want to, you can set a passcode to unlock your screen after sleep or after the screen saver begins.
- Enter your Apple ID and password.
- Follow the onscreen instructions.
4. Don’t Install Random Apps Or Torrented Software (This Includes Cracked Software)
We understand that sometimes, you might be a little tied for money and software like Adobe Photoshop are far from easy on the purse strings.
But with these illegally-downloaded programmes, there is a high chance that they come with an undesirable tag-along – spyware.
Once hackers have locked themselves onto your computer by means of spyware, they will have unfettered access to your data. After which, it is just a matter of covertly transferring them over to their own devices.
At the end of the day, it’s important that you do not put yourself too much at risk. Always be careful of what you share online, as you never know where hackers might just be lying in ambush.
Featured Image Credit: viaimmobiler, noxad, 365techrus, video-player-software.blogspot, komando.