• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 20th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
How To

How to Protect Your Personal Data in 3 Simple Ways

January 14th, 2018 Carolina How To, Security 0 comments
How to Protect Your Personal Data in 3 Simple Ways
Share on FacebookShare on Twitter

As the big tech corporations are coming under increased attack from hackers, it can make the domestic users unsure of which way they can turn to best protect themselves against cyber-attack: if the big guns are struggling, how does the average Joe keep his personal data safe?

No matter how soon new software is available, new scams arise that have identified and taken advantage of the flaws that the makers were previously unaware of. Defense against cyber-criminals needs to be multi-layered to ensure that the risk of security breaches is minimized. Here are 3 ways that you can protect yourself against online attack.

E-mail

You will be aware of the threats that come to you via e-mails. They come in many guises and are usually quite easy to identify – if you know where to look. Check out the sender’s e-mail address. Typically, the name displayed will be of the trusted organization, but the e-mail address from which it sent will be quite clearly not them. Never respond to these phishing e-mails, by replying you are confirming to the sender that they have a legitimate e-mail address.

If the e-mail’s content is sent from an authentic organization, there will be no spelling mistakes or requests for personal data. Never click on a link that the e-mail has provided. Contact the alleged sender by the details on the genuine website. An authentic bank, for example, would never request that you input personal details, and even if the e-mails say that they have identified a security breach that you need to clarify, your bank would telephone you or contact you via letter.

Passwords

Your passwords need to be complex. Never choose your date of birth, the name of your child, or another piece of information that could be found in the public domain. Each app and website that you need to log on to should have a different password. Remembering all your different passwords can be troublesome, and as it is advised that you don’t jot them down, you can use heavily encrypted software to store the passwords.

This may feel counterintuitive, but as 81% of business security breaches are due to password weaknesses, it is advisable to use enterprise level security in the domestic sphere. You can find out more about this software by clicking here to read the LastPass review to further understand the benefits available to you.

Update

Software security updates are regularly distributed by service providers. They are released as new threats and viruses are identified, and failing to update your desktop or other devices means that you are not protected by the latest security versions of the software. While you may think that the update is only to fix cosmetic bugs, the reality is that the updates contain essential security fixes that have been coded to protect you, the user.

The information that you provide websites and apps is enough for hackers to exploit you for their benefit. Think about what you sign up for and the information that you are providing. It is prudent to have a separate e-mail address that you can use for the non-important communications: newsletters, competitions and the such like. Update your devices as and when requested to, and choose passwords that are complex to make life as hard as possible for the scammers.

Top, featured image via DepositPhotos/Hipspeeds

  • Tags
  • Cyber Attack
  • Data
  • Fraud
  • hacking
  • internet
  • Password
  • Phishing
  • Privacy
  • Scam
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Hacker demands ransom in Bitcoin after taking over hospital servers
Next article OnePlus denies checkout page hack amid credit card fraud reports
Carolina

Carolina

Carolina works for HackRead as a technical writer. She is a Brazilian traveller who has been to almost every country around the world. She has a keen interest in technology, gadgets and social media.

Related Posts
X-rated social media app Fleek exposed explicit photos of users

X-rated social media app Fleek exposed explicit photos of users

Top Tips to Upscale Your Netflix Security Instantly

Top Tips to Upscale Your Netflix Security Instantly

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Hackers compromised IObit forum to spread DeroHE ransomware
Hacking News

Hackers compromised IObit forum to spread DeroHE ransomware

76
X-rated social media app Fleek exposed explicit photos of users
Leaks

X-rated social media app Fleek exposed explicit photos of users

98
Top learning management system (LMS) software for small businesses
Technology News

Top learning management system (LMS) software for small businesses

586

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us