The Eight rules to follow to avoid having your personal data hacked

Vacation is a time of relaxation and rejuvenation. You are therefore particularly vulnerable to attacks from hackers. It is logically the moment to redouble your vigilance and to check that, from your laptop to your smartphone, via your tablet, you have set up all the barriers against the hacking of personal data. Here are eight rules to follow in all circumstances.
 

Secure data

1. Use complex and varied passwords

This is the basics, in terms of security. To prevent hackers from entering your accounts, choose strong passwords. With sequences of letters, numbers and random special characters. Use a different password for all time. Does this sound boring to you? Some tools or browsers, such as Firefox, offer you an automatic manager of complex passwords.

2. Be up to date

Second priority: keep your operating systems (computer and mobile), programs and applications up to date. This is especially fundamental for the operating system. Security vulnerabilities are discovered almost daily, and corrected in regular updates.

3. Beware of public WiFi and public charging stations

Be careful, if you use a public WiFi network, this is one of the hackers’ favorite entry points. Less secure, more open, only use them as a last resort. Likewise, watch out for public charging stations. Some contain fake Lightning or USB sockets intended to hack data from your mobile …

4. Configure your private WiFi networks

Another bad reflex is to be satisfied, for a private WiFi network, with the WEP key. The one that is written directly on the box. It is indeed pirated in five minutes. On the other hand, the WPA 2 key, which you obtain by configuring your WiFi network yourself, takes about fifteen hours to be cracked. So set up your network, and advise your family and friends to do it too!

5. Don’t click on anything

Pay attention to links, emails, or even websites. Ideally, always check the address they are sending from before clicking. If the name sounds crazy to you, don’t click. Likewise, if you receive an email asking for personal data that appears to be from a service you are using, take a good look at the sender’s email address. Not the name he gives himself, but the address. If it doesn’t match anything known, don’t click. If it looks like something familiar, check it out. And only click if you really trust it.

6. Do not install anything on your smartphones

Pay attention to the apps you install, especially if you don’t know them. Check the publisher and the security certificates. Even if you find it in the Apple Store or Google Play. Several hacking cases involved apps available on these platforms …

7. Take out covered

To browse the Internet, use up-to-date antivirus and an effective firewall. Only browse sites whose addresses begin with https: //, with a small padlock on the left. You will thus avoid many disappointments. You can even opt for a VPN, which will encrypt and anonymize all your browsing. The service is chargeable, but it ensures optimal navigation safety.

8. Pay attention to attachments

Be wary of email attachments like the plague. It is obvious if they come from an unknown email address. But also if you know the sender: he could have been hacked too. More generally, an attachment whose name ends in .pif; .bat; .exe; .vbs; .lnk should not give you any confidence …

Leave a Reply

Your email address will not be published. Required fields are marked *