Log into your computer as a User instead of Administrator.This makes sure no one will be able to access your information, even if they steal your computer and put the hard drive into another machine. These are core features on both Windows and OS X without additional software. While traveling, if you really need to connect to a public Wi-Fi spot, make sure that you use a VPN.A VPN encrypts all the data sent and received by a device connected to the internet. Use a VPN (Virtual Private Network) for further improved security and privacy. The same goes for clicking on email attachments, which can trigger vulnerabilities silently in the background. Do not install any software that you do not trust 100%.Immediately lock your device while leaving it, even if you’re away for a short period of time.If using a mobile device, make sure that you have set it up so that you can remotely delete all data on it it gets lost.If you make a typo you may land on a similar phishing-site aimed to steal your information. Bookmark your most critical websites and access them from there.Do not share your personal passwords with anyone, not even family members or close friends.Always keep an eye on the address bar in your web browser. Avoid phishing tactics where cybercriminals try to make you enter your password on phony websites. These are easy to brute force or figure out. Also avoid year of birth, post-code, house-numbers etc. Never use family names or pets, words from dictionaries or personal references as passwords.If you’re using a password generator (such as this one) to create your passwords, make sure that the server is using SSL (https) and that the generated passwords aren’t stored on the server. Never store your passwords in a plain text document, not even on your local device.Do not use your passwords to login to your accounts on other peoples devices, unless you really trust them and know that they have a common sense regarding security.Make sure that your security questions (if you have lost your password) are extremely difficult to guess. Even if someone knows the password it’s simply not enough to log in. Using phone number, app, bank-ID or finger print as a second factor adds an additional layer of security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |