Article

10 ways to protect your Devices and Data

Topic: General Self HelpBy Robert SicilianoPublished Recently added

Legacy signals

Legacy popularity: 1,512 legacy views

Gee, it used to be just your desk computer that needed protection from cyber thugs. Now, your connected thermostat, egg tray monitor, teen's smartphone, garage door opener, even baby monitor, are all game for cyber creeps.

Can't be said enough: Install antivirus software. This software really does make a huge difference. Malware scanners are not enough, by the way. You need both: antivirus, anti-malware, though malware usually targets laptops and PCs. But don't bet on it staying this way; Macs, mobiles and tablets are vulnerable. Don't wait to get security applications for your smartphone and tablet. Android is particularly vulnerable.

Enrich your Wi-Fi. Turn on your WPA or WPA2 encryption. Change your router's default password to something really unique. Update the router's firmware. Register any new routers online. Contact the router manufacturer's site for helpful information on making things more secure. Whenever using free public WiFi recognize your data can be sniffed out. Use Hotspot Shield whenever logging in at airports, hotels, internet cafés and more.

Don't use outdated software. Are you still on Windows XP? Time to switch to 7 or 8. Security holes in outdated applications will not get plugged if there's no longer support.

Power passwords. You wear a power suit; you take a power lunch, a power nap and a power walk, but do you have a power password? A power password is extremely difficult to crack. It's at least 12 characters long, contains no dictionary words or keyboard sequences, and has a variety of symbols. You can also use a password manager to create and encrypt passwords.

OS updates: often. Many people fail to keep their operating systems updated. Big mistake. An update means that a security hole, through which a hacker could get in, has been patched. Lots of holes mean lots of entry points for hackers. If Windows alerts you to an available update, then run it. Learn about your system's update dynamics and get going on this.

Patch up your software. Have you been getting update alerts for Adobe Reader? Take this seriously, because this software is highly vulnerable to hacking if it has unpatched holes. Any reminder to update software must be taken seriously. Don't wait for an attack.

Wipe old hardware. Got any defunct laptops, tablets, flash drives, hard drives, etc.? Before reselling them, strip them of your data. If you want to discard them, literally hammer them to pieces.

Two-factor authentication. A long, strong password is not 100 percent uncrackable. If a hacker cracks it, but then finds he must apply a second factor to get into your account…and that second factor requires your smartphone to receive a one-time code, he'll move on.

Don't get duped. Never click links in e-mails. Don't click on something that seems too good to be true (a link to naked photos of your favorite movie star). Avoid suspicious looking websites.

Stop blabbing on social media. Information you post on Facebook, for instance, could contain clues to your passwords or security questions for your bank account. Sure, post a picture of your new puppy, but leave the name a mystery if it's the answer to a security question.

Article author

About the Author

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

Further reading

Further Reading

4 total

Article

We hear a lot about the steps we should take to achieve our goals, however unless we take the first steps to realistically consider who and what we are right now – our capabilities and interests – and think logically about what we’d like to accomplish, our chances of achieving our “goal” are slim to none. Here are a few things to think about when you’re trying to decide what you’d like to do. 1. Your goals need to be your goals Not your spouse’s or significant other’s, not your friends’, parents’, children’s, etc. - YOURS! 2.

Related piece

Article

Do you Uber? If you do, you probably feel pretty safe getting into the car of a stranger. However, you might not be as safe as you think.

Related piece

Article

Being a mom who loves to celebrate Valentine's Day with her children just as much as she does with her husband, I am always on the look out for something fun, different, and inexpensive that I can do for the kids. Last year, our grocery store was selling cute candy bouquets, but the price tag was a hefty $30 for a maximum of $10 worth of supplies. After taking a couple of inconspicuous pictures, I began searching through the store for the same items that they had used to make their bouquets.

Related piece

Article

Each year, researchers in security take the time to rate some of the worst passwords found on the Internet. While popular pop culture events have caused waves with the list of the worst passwords of 2015 - think "solo," "starwars," and "princess" - the worst passwords of last year were still the usual suspects, "password," "123456," and "qwerty."

Related piece