Securing yourself from hackers

Securing Yourself From Hackers

Project Name: Securing Yourself From Hackers

Description:

With recent news flooding over the IT security aspects compromising IT system Platform in one of the Multinational Corporation proves that there is a need to revisit security aspects in an organization. Along with the implementation of Security Products and Applications there also arises a need to provide basic training to employees while dealing with the outer world. This bunch of threat actors have a thorough knowledge and understanding of the system and responses received by them before making a threat attack.

Author: Rohit D Sadgune / Amruta Sadgune

Topics: –

  1. Securing Yourself From Hackers
  2. Password Security
  3. Software Security
  4. Security Email

Below are the few best practices that one must habituate when being online.

Update Software’s Frequently

We often bypass messages which pops up saying “A software update is available”.

By doing this we are easily opening the gates for security breaches which could have been avoided at a very first place. One of the major credit bureau in the country which had suffered a data breach due to the reason of software not being updated even though the security patches were being available month before. The exposed data had all the personal information. This breach has resulted in the exposure of security and identification numbers putting all the users at a very big risk.

In addition to security fixes one can also get new enhanced features, compatibility improving stability and removing the outdated features.

Password Security

Put in a little effort to save yourself from the possibilities of getting compromised. According to the cybersecurity report around 58% population do not still use a secure password. Let’s check below what can be done to build a strong password.

  • Strong password:

Simple passwords comprise of easily guessable passwords. An advanced method used is brute force attack in which a computer program runs through

All possible combination of letters, numbers and symbols to guess your password. So, the longer and strong your password is it is difficult to crack.

Avoid using personal information and reusing the password.

  • Password manager: Password manager helps you to automatically generate the passwords automatically providing you with the master password.

They assist you in generating and retrieving the complex password in an encrypted database. One should have a thorough study and understanding of the different software’s used to generate the passwords.

  • Biometrics

In last few years we have seen the biometrics authentication implemented across multiple applications and products. Users can access anything just from the tap of a finger which has become more convenient.

Even though we say biometrics is a secure way for ac cess the accounts one cannot completely rely on them alone. We have learnt from industry that biometrics alone cannot be considered as the fool proof method for accessing your accounts. One must also have OTP (One-time password) and security questionnaire etc considered.

  • 2 Factor Authentication(2FA):

Two factor authentication helps you to enter a second form of authentication.

For example: A multi digit code texted to a smart phone for logging in to an online account. This method makes it difficult for hackers to access your account even though they have your passwords. This option is much better to reply on instead of simply using the password alone.

Anti- virus software

Is the most important way to keep away the hackers.

It’s the first line of defense in detecting the threats on your computer from unauthorized access. Regular updates should be done in your anti-virus software order to keep threats away with latest malware/ virus signatures.

Email Security

There is a lot of information sailing out related to securing your emails.

  1. Avoid insecure networks
  2. Avoid opening emails from un trusted sources.
  3. Never open an unexpected attachment without scanning
  4. Do not use company emails for private messages
  5. Scan all emails for viruses and malware
  6. Never access email from public WIFI
  7. Use spam filter
  8. Remember to logout from email when not in use
  9. Change password frequently and avoid sharing it with anyone.

We need to learn from the past experience and try to be proactive in order to avoid issues ahead. Few actions taken on time will surely help us to secure yourself from hackers.

Core Working Areas :- Threat Intelligence, Digital Forensics, Incident Response, Fraud Investigation, Web Application Security Technical Certifications :- Computer Hacking Forensics Investigator | Certified Ethical Hacker | Certified Cyber crime investigator | Certified Professional Hacker | Certified Professional Forensics Analyst | Redhat certified Engineer | Cisco Certified Network Associates | Certified Firewall Solutions | Certified Network Monitoring Solution | Certified Proxy Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image