Hack proof your accounts by manuelhooks
Hack proof your accounts
Knowledge is one of the best defence against being hacked. When you understand and practice both data safety and security, you stand a chance to protect accounts and infrastructures against a hack.
To protect yourself from hacker you must avoid behaviours that gets you exposed.
Be mindful of what you post on social media:
When your Facebook posts sends a message that you are wealthy, it gives a hacker reason to target your device or account. Hoping to get some of the wealth they perceived.Remember to Logout:
It's good practice to Logout of your account when not in use. If your Steemit account is permanently logged in on your device, if the device is snatched, the value of Steemit's long password is defited.Download from authentic sites:
Avoid downloading from second or third party. What I mean here is, if you are using an android phone, getting apps from the play store offers you more protection compared to getting it elsewhere. If you must download from a less credible source, you may have to run a hash test on the downloaded data.Keep your password safe:
After securing an account or device with a password, do not expose the password. Writing your password as plain text in your diary exposes the account. Instead of just writing the password, a simple shift, replacement or transposition cypher will offer a better protection.Make a strong password and change it regularly:
Learn to make strong passwords. Most strong passwords have a minimum of 8 characters made up of alphabet in both upper and lower case, numbers and some special characters all mixed together. Avoid using words that can easily be guessed. And be careful of what you use if a password hint is provided. A hint like "my date of birth" is too revealing. and it's good practice to change your password after a considerable amount of time.Be alert to social engineering:
Beware that you might be tricked into giving out confidential information.
To effect a hack, most hacker use social engineering to Phish out information that might be used to gain access to your account.
Enhance your Security with the installation of protective mechanism
Use updated software:
Avoid using software that are no longer supported by its manufacturers. Using a software that is still supported by its manufacturers means you can get periodic updates. so you can run regular updates and upgrades. Such updates provides a patch on any vulnerabilities.Use a good anti-malware:
An anti malware capable of protecting you system against spywares, identity theft and ransom ware, must have it's database regularly updated.Activate available securities:
If the default security features on your system or account are disabled, it's best to have them activated so they provide the needed protection against hacker. Some hackers use malware to create vulnerability. Others are stealing your account details using keyloggers. software that collects your data and send it to a hacker.Use added security measures:
Some systems have standard security with additional security features that can be activated to enhance protection. Your account can have additional security provided by a two way authentication process.Use data encryption:
Encrypting your data will offer protection in case there is a successful breach. in to your account or system, your data will be useless in the wrong hands.
True security is a continuous process. So after doing all of these, hacker might still find another opening to exploit, when time comes, be ready to make the needed adjustment to keep your account or device protected.
[ Subscriber ]
@ijelady
[ All followers ]
@nova001 @kyara2 @gormogon @akhtarbadar2 @ddwosky @udyliciouz
[ Special invitation ]
@ngoenyi @talktofaith
great post
Thank you.
Will you like to be notified each time I make this type of posts?
Of course, looking at your blogs I can say that you are doing quite well
You are running out of steem.