Data encryption is no longer a complicated thing to do, accessible only to top experts.
Nowadays there are plenty of tools that are easy to use (and sometimes even free), tools that will help you encrypt your sensitive data.
By doing this, you ensure that your valuable information will remain safe and hidden from malicious eyes. That means no cyber attacker will peek through your private conversations or files or any other important data.
If you have the latest versions of iOS and Android, encryption is easy-peasy, as it’s enabled by default (and you should leave it like that).
Here’s a PRO tip: run the internet services in a virtual machine.
A virtual machine is a separate, software-based computer that’s contained within your physical computer.
It will run an operating system and apps within your real computer.
Using a virtual machine to run your browsers and email client will isolate you from all the cyber threats out there.
In case you end up infected with malware, it will keep you protected and help control the damage.
A virtual machine is also great if you want to test another operating system within your actual one.
Only download and install mobile apps that you can find in the official app stores.
Make sure that the option to allow installation of third party apps is disabled. That means no apps from your online buddies, ads, blogs or torrents. Those usually carry malware that will harm your smartphone.
However, this doesn’t mean that an app or game from the official store is 100% secure – sometimes, even popular apps, with more than 5 million downloads, can prove to be infected.
Create completely separate email accounts with different purposes.
- One email account to subscribe to newsletters and shopping deals
- Another one for online accounts, such as your Facebook or Uber
- Different email accounts for work and personal conversations
It might seem like a hassle, to create and manage all those accounts, but it’s worth it. And it will also help reduce the chances to receive spam on your important emails.
Identity theft is the illegal use of someone’s personal information.
It’s when a malicious hacker steals your data and starts making financial operations in your name.
They open bank accounts, take out loans, ruin your credit cards’ ratings, and many others.
Besides the financial loss, there may also be additional consequences. You can even realize one day that you are held responsible for criminal actions that you had nothing to do with.
And wanna hear what the worst part is?
Most of the identity theft victims are usually clueless.
They have no idea what’s happening to them.
Recent statistics show that:
- almost 70% of the victims don’t know how the thief got their information;
- 92% don’t even know anything about the individual (or group) that stole from them.
In one of our recent tips we approached the dangers of real time check ins on social network.
If it’s too late for that and you already have tons of check ins from your home, you also have the option to delete previous history location.
In Facebook you’ll have to do that manually for all the photos you uploaded and turn off Location for future posts.
In Instagram, you can Remove Geo-tag for all your uploaded pics.
Browsers are one of the most common security holes, if you don’t keep them up to date. And the same goes for the add-ons and plugins you installed.
Cyber crooks frequently scan websites and PCs for vulnerabilities, such as outdated software. They use those backdoors to penetrate your systems and infect you with malware.
Keep those browsers updated. If you have browsers plugins, go to their settings and choose either to “Ask to activate” or even to “Never activate”.