Six ways for a safe harbor on cyber hacks:
- Avoid simple password and using better password policies for account takeovers
According to a recent survey, more than 80% of people over 18 years of age use the same password over multiple accounts – a practice known as daisy-chaining.
Here’s the awesome part: you can almost certainly guess the most popular passwords consumers use in 2016. (This is “123456” as reported by the previous post) .
2. Use two-factor authentication
Do you use two-factor authentication on all accounts that provide it? This is a relatively seamless process and requires a password for each account login and a six-digit code that is sent to your smartphone via email or text message.
This is not safe. If the criminal controls your personal email account or owns your phone – along with your password – he can defeat double authentication. In other words, you are a less attractive target – the equivalent of a hedgehog carnivore, his more than excess excess excess excess excess. . . . Which one do you prefer?
3. Turn off location service, do not overshare
Remember the clumsy duo of Holiday Classic’s “Alone”? It used to be a thief surrounded by a neighborhood. We’ve been “closing” ourselves to thieves as social media over-shares, including location data published in photos that allow geo-tagging, or voluntarily through preferences.
The other complication here is that other members of your family may share it even if your social sharing does not include location data. Remember, you are only as safe as your most unsafe family member.
Discussions about cybersecurity should be consistent with those closest to you, as more and more people are linked in ways that may be robbed.
4. No ransom
Ransomware will continue to bother consumers in 2018.
This is a piece of malware that takes the victim’s computer and then encrypts every file on your hard disk. Few things are more terrible than ransomware attacks, especially when victims do not know what’s happening.
The first rule of thumb: Never pay for documents (or prevent someone from sharing awkward documents – another popular scam). First contact solution experts.
The second rule: daily backup of documents.
If you want to be 100% free from ransomware, back up your hard drive to an encrypted, durable, password-protected external drive and store a mirrored backup on a cloud server. So when your extortioners ask for cryptocurrencies (and if you have them, they should also be kept on an external wallet), you can say “no” to continue your day.
5. Register transaction alerts and identity monitoring
There is no better way of quelling account acquisition fears than trading alerts. All banks and credit card companies are provided free of charge. They make fraud a temporary crisis because consumers are notified when fraudulent charges occur or scammers try to open new lines of credit.
An additional benefit of the transaction reminder is that every single payment you receive will pop up on your phone or email and details the purchase, which can help you to stop spending because you are reminded immediately of how much money you pay for Due at the end of the billing period.
6. Do More..
- Minimize exposure. Do not authenticate to anyone unless you control the interaction, do not over-share on social media, do password management, protect any document that can be used to hijack your identity, and freeze your credit.
- Monitor your account. Carefully check your credit report, track your credit score and, if possible, check your primary account. (You can see two credits each month for free on Credit.com.) If you prefer a more relaxed approach, see No. 5.
- Manage losses. Make sure you quickly invade your identity and register with professionals to help you navigate and resolve plans for identity compromise. These are usually obtained free of charge or at the lowest cost by insurers, financial services and employers. Read more…
While 1,000 resolution-worthy action items are out there, the time is always now for the things that need to change in our lives. Never were truer words spoken when it comes to our potential vulnerability to hackers. The number of breaches and the granular nature of the data exposed in those attacks over the past year are both unprecedented. The Equifax breach alone included everything (and then some) that a scammer needs in order to buy a house or a car, pay for college or medical procedures, steal a tax refund or any other transaction. But that’s not the only reason you should be on high alert. Technology is the friend of the hacker. Cybercriminals make a living being up-to-date on the latest security protocols and protections. They’re also the most common spur for innovation, discovering the latest “eureka” moment in cybersecurity while reverse-engineering existing ones to steal data. Side by side with the general threat is a “pre-set” attitude prevalent among consumers. Breaches and the identity theft that flows from them have become the third certainty in life, right behind death and taxes. The attitude tends to be, “There’s nothing I can do about it,” or “If it happens, it happens.”… Engaging post, Read More…
thumbnail courtesy of cbsnews.com.
If you like to receive more of these curated safe harbor news alerts then subscribe to my mailing list. and come back soon at https://www.safeharboroncyber.com/Blog/ to read further CyberWisdom Safer Harbor Commentaries. Home » Curated SafeHarboronCyber’s CyberWisdom Post »