Min menu

Pages

5 things to do to protect your accounts from hacking through 2021

 


There are two main reasons for hacking into personal accounts online: software flaws, or human error, and while you can't do much about the vulnerabilities in the software you use, changing your behavior and bad habits in dealing with your online accounts and electronic devices, and securing them well helps you reduce your risk.

We have seen a lot of data breaches that occurred during 2020 for a lot of vibes just because of negligence, as Trump's account hacked the outgoing Us President, whose password was, until recently (maga2020!) Details of Zoom's sensitive calls by UK Prime Minister Boris Johnson have also revealed that these world leaders have received security training from the protection agencies, but as a result of their mistakes, these breaches have occurred.

The risks are just as real for the average person, and if your accounts aren't properly protected, they may hack into your bank account, credit card, or steal your private messages and photos and share them for everyone to see. To find out if your accounts have been compromised, you'll have to follow a time-consuming and potentially frustrating verification process.

So it's best for you to take some insurance steps to protect your accounts from hacking, and there's no better time to arrange your digital life than the beginning of the year, here are 5 things you need to do with your online accounts:

 1- Make sure to activate the dual authentication feature in your accounts:

 

 

Arguably, the most effective thing you can do to protect your online accounts is to activate the 2FA binary authentication feature, because it's a step that dramatically increases the costs of hackers trying to hack your accounts, which is why the rate of hacking of accounts that use any type of authentication is much lower than password-based accounts. There is a guide to all accounts that support authentication via this link, but primarily you must activate them in all accounts that contain misused personal information, such as messaging apps (WhatsApp, Telegram, etc.), social media apps, and your email accounts. But keep in mind that all forms of binary authentication are not equal, as security experts point out that app-based authentication is better and safer than phone number-based authentication solutions because hackers can easily forward SMS or phone calls to another number by tricking customer support service staff at telecommunications companies to convert phone numbers to another SIM card, attacks known as SIM sim swap, or "splitting", and SMS and phone calls. Designed without encryption, hackers can easily intercept them. There are a lot of authentication apps that make this task easy, including: Microsoft Authenticator, Google Authenticator, Authy, and many more. These are apps that provide you with identification codes that are difficult for the hacker to access because it has to actually reach your phone.

 2-Use an app to manage passwords:

 

 

 

Passwords are about identity; Using a strong, unique password for each site or service you use reduces the likelihood that your accounts will be compromised.

But with so many services, websites and apps that we use every day, no one can remember all the passwords, so we need apps to manage passwords, and there are a lot of these apps that keep your payment information, and credit card data secure in the event of leaks like this.

If you're looking for the best password management app, see an article: "5 of the best password management apps of 2020 with great discounts."

3- Learn how to detect a phishing attack:


Clicking quickly on anything you get is your worst enemy, so when you get a new email or text message with something you can click on, don't.

Phishing campaigns have increased recently due to the spread of the COVID-19 pandemic, with hackers using the epidemic as a cover to launch a wave of phishing attacks and scams on Google Drive.

Anyone can fall victim to these types of scams, and the main thing to do is think before clicking, because these fraudulent messages trick people into acting in an unusual way, pretending to be prompt demands from a certain point, and there are messages that say, "Urgent response is required," but of course all of this is ways of deception.

There is no specific way to help identify each type of phishing or phishing, as hackers constantly improve their methods and methods, but recognizing the threat can help reduce its effectiveness. So be careful, think carefully before clicking on anything, and download only files from people and sources you know and trust.

To check that your email isn't being used in these attacks and to see what you can do to secure it, you can see an article: "Does anyone use your email to send random messages without your knowledge?"

 

4- Make sure everything is updated:


Every part of the technology you use, from the Facebook app installed in your phone to the operating system that controls the smart lamp, is vulnerable to attack. So companies are always looking for and fix the bugs that appear in their software. That's why it's important to keep all the technologies you use up to the latest available version.

Start with your phone;

For apps and games, they are automatically updated on iPhones if you are using iOS 13 or any latest version, and in Android, you can also play automatic updates through the Google Play Store, via these steps:

  • Go to the PlayStore on your phone.
  • Click on the three-line menu icon in the top left corner and you'll see a list of options.
  • Click on settings.
  • Click on the Auto-update apps option.
  • You'll see a window with three options, select the second option, which is to allow an update when you connect to a Wi-Fi network.

 

 

Once your updated your phone, you'll need to select which devices you want to update next. In general, any laptops or desktopcomputers you have must be at the top of the list and then come gaming devices such as PlayStation and Xbox, and then other connected devices.

 5- Make sure to get rid of the old accounts once and for all:

 Old online accounts and their login details can be used as weapons against you, if you don't do anything about them. Hackers often use details from past data breaches to access accounts that people currently use.

One very simple step is to delete your Google search history regularly, but you can also use Google's privacy-based alternatives first.

In addition, there's a lot you can do to protect your accounts from hacking. This will reduce the amount of spam you receive and reduce the number of ways hackers can target you.

You can also use The Have I Been Pwned service to verify that your data appears in old data breaches, use VPN services to protect your data and enhance your privacy while browsing, and download a Browser (Tor) if you really want to promote your online anonymity.


 

reaction: