Smart Tech Tips | 3 Ways To Avoid Being Hacked

Did the recent celebrity hack occur due to a security vulnerability with iCloud?  We still don’t know the full extent of the compromise.  However, what we do know is that the majority of hacks typically occur with the unknowing assistance of the account owner.  In fact,  most account hacks take place when someone gains access to your username and password via phishing, social engineering or weak passwords.

 

Security Computer Key In Blue Showing Privacy And Safety

Here are 3 smart tech tips to proactively protect yourself from being hacked:

 

Phishing Schemes Protection

Phishing occurs when someone tries to acquire your username, password, credit card numbers or personal information via electronic methods by masquerading as a trustworthy source.  The phishing attack can be as simple as an unsolicited email with a link from  your bank, your internet service provider, retail company or social media account.  However, when you click on the link it redirects you to another link that looks like a clone of the providers website.  The links typically contains malware, viruses or record username and passwords with failed attempts to login into your account.

To protect yourself from Phishing schemes do not click on unrecognizable links or sites from unsolicited sources.  The companies you do business with will NEVER send you unsolicited emails to change your username and account password. Also, make sure to report unsolicited emails to the company to engage IT Security teams.

 

Social Engineering Precautions

Have you ever received an unsolicited phone call or face to face request asking for personal, credit card or user account information about you, your family or coworkers?  This type of hacking technique is referred to as Social Engineering and is also a form of phishing.  The hacker(s) will use human interaction to gain your trust to access to your accounts, company secrets, company assets or strategy.  The sensitive information you unknowingly share is collected and will eventually be used against you to help the hacker bypass security safeguards and make you or your company a victim of fraud or computer access.    The interaction or phone call also leaves a weird feeling in your stomach.

To protect yourself from Social Engineering become aware of the security threat and do not share any personal information.   Minimize the amount of information you share via the phone.  Also, record the full name, phone number, company name of the offender and specific details about the interaction and report it to the affected company to engage IT Security teams.  Also,

Password Computer Key In Green Showing Permission And Security

User Names and Passwords

With the recent hacks it’s critical for online users to take an inventory and record all digital accounts: Facebook, Twitter, Email, iCloud, Instagram, Retail accounts, etc… and periodically change your passwords. Also, make note of accounts you are no longer using and consider deleting the account(s).

The most common way that hackers access user accounts is via weak passwords, such as no passwords required to access accounts, the password simply set as the word, “password” or one of your kids’ names.

To ensure the security of your user accounts:

  1. Set passwords that are 5-7 characters long and include capital letters & special characters.
  2. Change your password periodically by changing 2-3 times per year.
  3. Answer the Security Questions. The questions are put in place by the company for additional security and to protect you. Answer the questions and do not share the information with anyone.
  4. When selecting a new password consider using a paraphrase to create your new password. A paraphrase is a catchy phrase or sentence you can translate to a password.

Example of a password using a paraphrase:

I always ride the teacups at Disneyland
Password example: I@rtt@D

 

To stay informed on the recent Apple iCloud hack, check the Apple Media Advisory – Update to Celebrity Photo Investigation for up to date information.  To protect yourself from similar hacks, proactively take an inventory of your user accounts and start changing those passwords!

Eva Smith

Publisher at Tech Life Magazine
Eva is an award winning entrepreneur and Publisher of Tech Life Magazine. She has been recognized by Ford Motor Company as a Mujer Legendaria Inteligente (Smart Entrepreneur), USA Today Magazine as a Top Blogger to Watch and Latina Magazine as a Top 25 Latinas Who Shine in Technology. Her work has also been featured on Mashable, Mom.me, Babble, Baby Center, Latinamom.me, USA Today, Latina Magazine, Huffington Post, National Parks Services, Voxxi, NBC Latino, Rolling Stone Magazine & more.She is technologist, engineer, bilingual freelance writer, speaker and digital media consultant.

Comments

  1. Great tips Eva! Thanks for sharing!

  2. Great info for everyone to keep in mind! It’s so frustrating sometimes, but we live in an Internet world, so you have to think about it constantly.

  3. These tips are relevant, smart, and totally applicable to today’s technological world. Awesome.

Follow

Get every new post delivered to your Inbox

Join other followers: