Category : Cyber Security

Protect yourself from Cyber Crime

Cyber Security – Simple tips to protect yourself

Cyber Security – Simple tips to protect yourself

Cyber security is defined as: any steps that you could take, to protect yourself from those who would attempt to profit through the exploitation of personal information or accounts – this done through your computer or network connections. Cyber exploitation, or cyber-crime, could involve hacking into the information possessed by large online or offline corporations, but could also mean hacking into someone’s smartphone, email, website, social media account, or blog. Basically, anything that could be done to gain money, or to meet a goal such as accessing a vast audience in order to promote a product, and is considered cyber exploitation. It is these activities that cyber security protects us against. The list below is to provide you with some straightforward advice on how to protect yourself and all of your online holdings, including your social media, email and online banking accounts, your blog, and whatever else you must keep safe.

Tips to Protect Yourself, Your Social Media Accounts, and Your Blog

 

Use the best Virus and Malware protection you can afford. 

Malware is a virus like piece of software that can allow someone to access your computer remotely, or obtain information on your computer and send it to them at specific times. The best protection is a good Anti-virus software package, even some of the free ones will be better than nothing (I use Avira) . Just make sure you keep it up to date.

Use a firewall.

A firewall can protect your computer against hacking and various other destructive elements. It filters out attempts to connect to your computer or website, by using predefined rules that have been applied; it can also block family members from accessing higher risk websites. Getting to know how to use a firewall is well worth the effort, and they generally come with your antivirus software or basic ones are built into the operating system (windows).

Password Rules to follow;

Change your Password regularly: If someone really wants access to one of your accounts, sooner or later they just might figure out how to achieve that end. Changing your password regularly makes their work a whole lot tougher.

Use complex Passwords: Simple passwords are easier to remember, but they are also easier to exploit. When it comes to setting passwords, the more complicated you can make it, the harder it is to crack. Try and stick with using passwords that have; lowercase letters, capitals, numbers and a few symbols combined.

Don’t use the same password for all your Internet accounts: It sure is tempting to do this, but if one of your accounts gets hacked, none are safe if you have used the same password across the board. Better to be safe than sorry.

 Never share passwords with friends. It’s nice to dream, but in reality, friends don’t always stay friends forever.

 

Consider all unknown email as a warning.

If you were to get an email form the bank insisting that you change your account password, or other personal account-related information through a provided link, that is classed as a phishing email. If you receive such email, most times it’s exceedingly obviously, but be wary, as sometimes criminals can be more sophisticated and deceptive. Back your computer and blog up on a regular basis. If a hacker were to access your blog or computer, you would potentially face a loss of content; this is a scary thought indeed. Don’t take the chance. Back your blog up as often as you can; if you post regularly, then at least twice a week is a good idea. There are plenty of online backup tools you can use either for free or a small fee.

Google Webmaster Tools can help.

Google Webmaster Tools can provide you with notification of security problems related to your blog, including malware. But of course, this won’t help unless you refer to your account with regularity. If you find anything, don’t delay in fixing it in order to avoid downtime.

Check all accounts regularly.

Important online accounts should be checked frequently. In the case of online banking accounts, check that all transactions are ones that you are responsible for. In the case of email accounts, keep an eye open for suspicious activity, such as email that you didn’t send, but shows as sent from you.   The above list is a basic summary of steps that virtually anyone is capable of carrying out, in order to have a basic level of cyber security. But don’t just read it – do it… for your own sake.