1. DON'T CLICK THAT LINK
Do not click links on your emails, instead try typing the given url directly onto your browser.
This is one best way to avoid phishing attacks that are mainly the mode of hacking online.
2. ALWAYS USE 2 FACTOR AUTHENTICATION
Use a second factor to login to online accounts, email and One Time Password (OTP) send to your phone number. This can reduce phishing and password guessing and brute force attacks to your account.
3. DELETE ANY RECORDED CONVERSATIONS
Regularly delete any recorded conversations used by your personal assistant
4.KEEP SYSTEMS CLEAN BY DELETING OLD FILES
Always make a routine of deleting duplicate old files.
There can never be 100% security, but reducing the places that can be compromised helps lessen your risk.
5. DON'T SYNCHRONIZE DATA BECAUSE OF SYNCHRONIZING SAKE
Disabling automatic file and media sharing whenever possible helps in reducing data leaks.
A lot of devices set up cloud syncing when you first configure the device. Check if you really
want to store these data in the cloud.
Remember there is no 'CLOUD',
a cloud is a Server in someone else room.
6. BE LESS SOCIAL
Always Minimize the amount of personal information that you have on social media forums.
Information like your phone number, ID Numbers, pets name or mother’s maiden name is sometimes used to recover account logins. Don’t give hackers an easy way into your online accounts!
7. KEEP OF GEO-LOCATION TRACKING
Disabling location or GPS on smart phones and other devices is one way to avoid sharing your information online.
Recent study of almost 1 million Android phones revealed that apps regularly harvested tracking data.
8. ENCRYPT DATA ALWAYS
Encrypt any data you store on hard drives, flash-disks, and use an email encryption tool if you share personal data.
Encryption is a layer of protection that can prevent lost or stolen data from being exposed.
Encryption needs a password, so always use a strong password and easy to remember otherwise if you forget the password chances of you getting back your data are very minimal.
9. KEEP BLUETOOTH OFF
If you are not using Bluetooth, switch it off!
Bluetooth technology has vulnerabilities and can allow data to be siphoned from your devices by hackers very easily.
10. PATCH YOUR DEVICES
Always make sure that your mobile devices and Computers are patched and updated with latest software.
Software vulnerabilities expose your devices to several attacks that can steal your personal data and compromise on login credentials.
Wi-Fi CERTIFIED 6™ IEEE 802.11ax
Wi-Fi CERTIFIED 6™, the industry certification program based on the IEEE 802.11ax standard, enables next generation Wi-Fi connectivity which...
-
1. DON'T CLICK THAT LINK Do not click links on your emails, instead try typing the given url directly onto your browser. This is one ...
-
This is a very straight forward configuration. It is used to show the Cisco Devices that have been connected to Cisco Switch. Other vend...