Become A Cyber Security Jedi Master 1

Today we’re going to talk about everyone’s favorite topic: cyber security! Ok, we know, we know; it’s not necessarily the most thrilling topic (and probably not even within your top 100 favorite topics, if that) but it’s important, especially since most of us use a computer, email, the internet, and smartphones daily. And if you don’t use any of those, well… this isn’t the blog you’re looking for. 

Psst! Password isn’t a Secure Password (And Even if it Was, You Shouldn’t Use It Everywhere)

Why shouldn’t you use “Beef Stew” as a password? It’s not stroganoff!

We jest, but it’s true: passwords really should be more secure than your favorite meal or your dog’s name. “Fido” might be easy to remember—but there’s a good chance that it could be easily guessed as one of your passwords if someone were to scroll through your social media and discover your ever-loving devotion to your pup (he is SUPER cute though!). Also, “123456” “111111” “qwerty” and good ol’ “password” just won’t cut it. 

Become A Cyber Security Jedi Master 3

What’s considered a secure password? For starters, using more characters is always better. The more characters there are, the harder it is to guess. Most cyber security experts recommend using a minimum of 10 characters. Think for a second about how many letters, numbers, and special characters are on your keyboard. Now think about how many potential combinations there are using 10 characters. We didn’t do the math, but we did do a quick Google search to give you an example. Using keys 0-9 alone to create a 4-digit code, there are 10,000 possible combinations. So it’s safe to say that there’s a mind-boggling amount of combos between letters, numbers, and special characters. 

Ok, so you’re going to make a password that has at least 10 characters… now what? They say variety is the spice of life, and that applies to passwords, too—in more ways than one. When you create a password, it’s best to use a combination of capital and lowercase letters, numbers, and special characters. In addition, every password you make should be unique—using the same password across multiple accounts may be convenient, but it’s a major cyber security no-no. If someone figures out one of your passwords, they can access your other accounts. And that’s lousy, so just remember: keep passwords strong and unique! 

Two-Factor Authentication: Your Account Guard Dog

So, you’ve created incredibly strong, unique passwords. You’re good to go, right? Not so fast. There’s actually another thing you can do to make your accounts even more secure: enable two-factor authentication. Two-factor authentication uses two methods to determine if you’re the account holder. It does this by combing some you know (your password) with some you have access to (like your phone or computer). When you sign in using your password, you’ll also need to confirm that you’re the one accessing your account using a special one-time code on your device. 

Become A Cyber Security Jedi Master 2

If you’re a Star Trek fan, you probably love a good analogy. Think of two-factor authentication as your account guard dog. Even if the keys to your house get stolen and someone breaks in, you’ve got your digital Fido there to stop the thief in their tracks. Two-factor authentication can be enabled on any of your devices and many different types of accounts, including email, social media, Amazon, and financial institutions. We have some good news, too: credit cards are much more likely to be stolen in person that online! However, it’s still best to keep your online accounts secure. 

Free Public Wi-Fi? Drop it Like It’s Hot (Spot)

There are few things more tempting than free public Wi-Fi, amirite? Especially when you’re in an area where getting a mobile signal is about as scarce as a hen’s teeth. Yeah, about that… When you connect to free public Wi-Fi, it’s generally unencrypted. No, we’re not talking about an excavated pyramid; unencrypted means anyone can see what you’re doing on the network, including the websites you’re visiting and what you type into them. It’s kind of like having a big, open window and everyone on the street can look right in. 

You might be thinking, “hold up—what if I’m visiting secure, encrypted websites? Well, that’s definitely more secure. People can still see which sites you’re visiting, but they can’t tell what you’re doing on there. But hackers are tenacious, and they can still find ways to get access to your information. It’s even possible for them to set up their own hotspot and call it “public Wi-Fi”. 

Ok, enough of the doom and gloom—how can you protect yourself? One of the easiest things to do is to turn off your Wi-Fi when you’re out and about or limit your browsing to sites that don’t have any sort of personal information or passwords. We know; that’s no fun, and in some cases, it could be downright inconvenient if you need to do something like access your bank account. 

Well, here come VPNs to save the day! A VPN (virtual private network) routes all your data through another server to help increase your online security and privacy. It also encrypts your data, so if a hacker somehow managed to get ahold of it, they’d have to take the time to decode it. The good news is that although hackers are tenacious, they also tend to be lazy. Decoding data takes time (and you need to be good at it), and what they’re really looking for are easy targets. As far as they’re concerned, if something is too much work, there are always other phish in the sea. VPNs make it easier to browse the internet anonymously and are considered a safe way to access sensitive data while you’re connected to a public network. Even though people can see you’re using a VPN, they won’t be able to see what you’re doing. 

Bluetooth is similar to using public Wi-Fi—it’s vulnerable to hacking or even just old-fashioned spying, so if you don’t need to use it, switch that baby off. 

Hello, Friend, You’ve Won a Prize! Just Click This Suspicious Link to Claim it

Greetings from Nigeria, this is the prince speaking, and I’d like to give you a large portion of my amassed wealth, simply for being you! All I need to make the transfer complete is to have you confirm your details here: imphishingyou.com. 

Yes, the Nigerian prince and similar email scams are still around, and they’re still on the hunt for people who might fall for clicking on their malicious links or sending them personal information. Simply put, don’t click on links from suspicious people or websites, no matter what they try to incentivize you with—giant stacks of money, a trip to Disneyland, a pony. You know what they say about things that look too good to be true… Malicious links can be a phishing attempt, or they could contain malware, ransomware, remote access Trojans, or viruses. And sometimes, they can look like they’re coming from a valid address. 

Gettyimages 1347254197 1

If you receive a suspicious email, the first thing to do is to check the authenticity of the email and the website itself. Start by checking the sender’s email address. It may be spoofed, so keep an eye out for anything weird, like support@amazon1.com or account@netfix.com. A lot of the time, a quick peek at their email address is all you need to send the message straight to the trash. If the email address doesn’t match the sender’s display name, that’s another red flag. If you’re ever in doubt, don’t click it! 

It’s Time to Stop Snubbing Your Updates

You’re busy working away on your computer, and that dang update pop-up pops up. Again. So, you click it away for the 100th time and curse your operating system under your breath. But here’s why you should be happy to see an update: whether for a computer or a phone, updates are critical for keeping your operating system and software working as they should. Even better, they make your devices and activities more secure. 

Updates can fix security flaws, repair bugs, and add newly identified malicious software. Plus, you often get other bonuses, like new features, increased stability, or improved performance. What’s not to love? So, if you see your OS, antivirus software, or browser needs an update, don’t give it the cold shoulder! Click accept and enjoy that added security. 

Nobody Likes an Over-Sharer (Except Hackers) 

Shared computers at libraries, hotel lobbies, internet cafés, and schools are sort of like free public Wi-Fi—incredibly convenient when you need them. And just like Wi-Fi, they can present some pesky security issues. Don’t think that means you need to forsake using them, though; all you need is a bit of caution. It’s literally as easy as 1-2-3!

  1. Use private browsing mode to keep your browsing history, passwords, form data, and web cookies away from prying eyes
  2. Use two-step authentication when signing into personal accounts
  3. Sign out of your accounts and close the browser when you’re done

Voila! Now you can rest easy whenever you use a shared computer in a public place. 

Sorry, Cyber Attacker, You’re Not on The Guest List

Every club worth getting into has a bouncer at the door, so why should your computer be any different? It may not be the happening spot in town, but it does contain valuable information that might be of interest to hackers. Firewalls work much the same way as a nightclub bouncer who decides who gets to go in and who stays out. They protect against cyber attackers by shielding your computer or network from malicious or unnecessary network traffic and can prevent malicious software from accessing the computer or network via the internet. There are different types of firewalls, but that’s a topic for another time. The bottom line is, if you’re using the internet, a firewall is a must. 

From Firewalls to Virus Removal, We Do It All

Cyber security can feel like an overwhelming topic, but hopefully, we’ve broken things down and helped you understand why it’s so important. Being proactive is always better than being reactive when it comes to securing your personal information. That said, stuff happens! If your computer has been affected by a virus, we can help. From removing viruses to data recovery, we have ways to make it seem like it was never there in the first place. Even with ransomware! Don’t panic; call Tech Shack. We also offer in-home consultations to help you secure your network, from setting up firewalls to installing anti-virus software. We’ve got your back! Call us today at (864) 722-5155 or feel free to schedule an appointment online.

We hope everyone had a happy easter, and a heart warming Earth Day!

Pomblqjbps

Leave a Reply

Your email address will not be published. Required fields are marked *