• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 21st, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

Protecting Your Online Presence with 3 Simple Tips

December 20th, 2016 Carolina Security 0 comments
Protecting Your Online Presence with 3 Simple Tips
Share on FacebookShare on Twitter

It is safe to say that over 80% of our lives are now stored in the cloud. Work and study are now conducted online. Universities such as Bradley University are making it possible to pursue an FNP degree of your choice without leaving the comfort of your home. Unfortunately, there has been a lot of cases of identity and information theft over the past few months. As we get closer to the end of 2016, information security becomes more important than ever.

Go through our How-To section here at HackRead and you will find a lot of tips and tricks on how to protect your online presence. In this article, we’re going to review some more tips that will help you work and study online without having to worry about your information getting stolen.

Have a Trusted Computer

One of the easiest ways to minimize the risks of information theft is by accessing your office network or the online learning program’s platform using a computer you can trust. This can be your own laptop or desktop computer that only you can use.

Take proper steps to add security measures to the laptop. An up-to-date antivirus, firewall software and good user management are all that you need to get started. When you access the family nurse practitioner course you’re taking online, for instance, you don’t have to worry about other users stealing your login info.

Write It Down

Do you know that you’re more likely to have your password stolen online than when it is written down in a notebook and stored at home? Writing down passwords actually enables you to have different passwords for different accounts, which means you can secure your online presence further without a problem.

Work out a way to write down passwords without actually mentioning the account they are for. For example, you can use initials to mark which passwords are for which accounts. Keep the note safe by storing it in a locked drawer or another safe place around the house.

You should also consider using a tested-and-tried password management software. 1-Password and similar software can help you store passwords for multiple accounts safely. Even better, these apps can also suggest a strong password for your accounts by generating random strings you can use in one click.

Test Your Security Questions

One last weak link to fix is the password recovery option you use on different accounts. We often choose security questions that are easy to remember. Unfortunately, most of the security questions – and their answers – are about things that information thieves can also find online.

The name of your first dog may be posted on your Instagram or Twitter account. Your story about that visit to your aunt’s house may reveal her name and the answer to another security question. Your favorite teacher at high school and other common security questions are just as easy to guess or figure out.

[fullsquaread][/fullsquaread]

Switch to a security question only you can answer, apply the previous tips we’ve covered in this article, and be sure to stay up to date with the latest security tips here on HackRead.

  • Tags
  • Fraud
  • hacking
  • internet
  • Privacy
  • Scam
  • security
Facebook Twitter LinkedIn Pinterest
Previous article You can now buy hacked NSA tools for Bitcoin 1000
Next article Ukraine Suffers Power Outage Possibly Due to Energy Plant Hack
Carolina

Carolina

Carolina works for HackRead as a technical writer. She is a Brazilian traveller who has been to almost every country around the world. She has a keen interest in technology, gadgets and social media.

Related Posts
Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

18
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

63
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

87

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us