8 simple things you must do to avoid penetration of electronic accounts











8 simple things you must do to avoid penetration of electronic accounts

Always said that prevention is better than cure, and that also applies in the area of protection and electronic security, especially that we rely on computers and phones in all our work, and certainly the protection of electronic security is very important. Unfortunately the majority of Web users are ignoring to take even the simplest Precautions to prevent hacked their accounts and statements. In this post we will review with you a collection of tips and guidelines to protect yourself from exposure to hack











1- Use VPN

As we all know VPN is used as a means to secure and encrypt communications, and this is very necessary when you're in a public place and you connect to the Internet via the unreliable. Where anyone can intercept all data that pass through this network, which is always preferable to use vpn when you're in a public place like a coffee shop, airport. Etc


2- Don't use the same password


Usually when you create more than one account may find it difficult to remember a password for each account separately. Here is the village some of us to use a single password as all their accounts. But it's too dangerous, where any hacker can access all your accounts just to penetrate and get a password for one of your accounts

3- Use the 2-step verification technique


You have been using 2-step verification technique in all important accounts that provide you this feature, they are definitely very big blessing and will scrutinize you from losing your account. They are considered as additional security layer adopted by most companies to make sure that the user is the owner of the account

4- Do not connect your accounts with each other

Hacker is very happy when he finds you've linked your accounts with each other, you made his task much easier, since it can access any account wants in a very simple way. For this you must separate your personal accounts and functional on social networks and other sites and avoid that you associate with each other.

5- Do not use your primary email for other purposes

Most websites you will need to logon process, however, the biggest mistake we do is use the primary email to log into any site, even if not reliable! Perhaps you may receive fraudulent messages cause your account hacked, and thus penetrate all the services associated with it. Therefore it is always preferable to use an alternative email can be used for all other purposes.

6- Always type the website address instead of clicking on it directly

There are many tricks and techniques that hackers use to fall into their trap. The most widespread example is to send fake phishing links, be similar to the official sites used by the victim, including banking sites, social networking sites etc. If you do not have security experience may not discover that these links are a hoax, which is always preferable to type the address of the site instead of clicking on it directly.

7- Do not disclose sensitive information on social media

Among the methods used by hackers is to reset your password, they check your files in websites to learn important details about you or may be published without knowledge of you, including phone number, birth place and date of birth.. Etc. Many sites let you hide this feature recent information is enough to prepare it in the privacy settings page

8- Use the invisible browsing mode "Incognito Mode"

Sometimes you may need to use a computer other than our computer, either in an Internet café or a school. Etc, but the majority only close the browser when browsing his account and wants to leave. And forget that anyone can re-open the page and therefore access to personal account. And that always keep you logged out on your accounts and clear cookies. Or use the invisible browsing mode Incognito Mode and is available in most browsers.

Share on Google Plus

About coscosmars

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment