Three Easy Ways to Protect Yourself from Getting Hacked

Wed, 14 Oct 2015

No one likes getting hacked, whether it’s your social media accounts sending out bogus messages to all your friends, or even worse, someone stealing your banking credentials. There are a few blogs at the Bank Roll on this subject and they are worthy of your consideration and continued diligence. I wanted to write a follow up to my recent post, I Know Your Password because I feel this important subject deserves a repeat. Sometimes gaining access to your accounts is easy to guess. From the information you post on Facebook to what’s available in the yellow pages, the “bad guys” or those with a desire to commit fraud, just need a little information to attempt accessing your accounts. Follow these three simple rules to avoid getting hacked:  tons of devices - many passwords to remember

 

1. Get Creative with Your Username

First let’s start with your username - don’t make it obvious! The standard username is the first initial of your first name followed by your last name. Instead, use an alias that makes sense to you. It would be easy to guess that my username is “LSelnick”, but harder to guess if I used JamesTKirk.  

 

2. Make Strong Passwords

Next to protect is your password. Make “strongthird party link passwords with a combination of lower and uppercase letters, numbers and special characters. This has to be something that makes sense to you and easy to remember - you cannot put your passwords on a yellow sticky note on your computer!  

Here is an example:

 $PsigB$

Password security is good Business

 Also, when you purchase systems or new equipment that comes with passwords and a default password – make sure the first thing you do is change the manufacturer default! The fraudsters know this is a way into your network. Point-of-sale attacks are increasing third party link through this method.

 

3. Create Fake Answers to Security Questions

We all use security questions third party link to help us remember passwords and add an extra layer of security to the process. The reality is a smart fraudster can guess - some call it social engineering - your password from a variety of sources including the same Facebook profile pages mentioned above.   Do not make the answers to the questions easy to guess. In fact, make the answers ones you know that have no relationships to the question. So your favorite color which is blue, you list pepper jack cheese. No one is going to get that from your BlogSpot profile. People are posting more personal information online than ever before and fraudsters are using this hack accounts. Be proactive in protecting yourself against fraud. I would like to hear other ideas you may have on passwords and other security suggestions. If you have questions on other security related topics that you are interested in – please let me know and I will cover them in my next blog post.

 

You May Also Be Interested In:

Leave a comment

Your email will not be published. *Required field

3 comment(s).

Dean Christensen
August 16, 2012 at 9:23 am
I have a friend who could of used this advice and got hacked on her home computer. So it really does happen! Great tips!
Sascha
August 23, 2012 at 12:20 pm
Thanks for the article. We all need to be more proactive about our personal account security. One thing you failed to mention is to take advantage of the 2FA (2-Factor Authentication). Although it’s been around for a while, more and more sites are starting to offer and promote this option. 2-Factor Authentication for email wins every day. I feel suspicious when I am not asked to telesign into my account by way of 2FA, it just feels as if they are not offering me enough protection. I know some will claim this make things more complicated, but the slight inconvenience each time you log in is worth the confidence of knowing your info is secure. This should be a prerequisite to any system that wants to promote itself as being secure.
August 29, 2012 at 7:18 am
Sascha You are correct that a user has to be confident in the sites they visit and the security protocols of that site. I focused on just passwords in this post but your topic is one worth delving into in future posts. Thank you!