Preventing hacking

Compliance with cybersecurity rules will protect you from hacking. Below are some key recommendations for preventing hacking, which should not be forgotten.

Use strong passwords

A large number of hacks occur as a result of obtaining user passwords. Therefore, it is important to use a unique strong password for each account. A strong password consists of at least 12 characters, ideally more, and contains a combination of uppercase and lowercase letters, numbers and special characters. Remembering and keeping track of multiple passwords may not be easy, so it is recommended to use a password manager.

Use Multi-factor Authentication (MFA)

Enable two-factor or multi-factor authentication for as many online accounts as possible. With multi-factor authentication, some of the login information (often a code generated by an application or sent in an SMS message) is used in combination with a password, which adds another level of account security.

Beware of phishing

Hacking often begins with phishing emails or text messages. Be vigilant: when you receive a new email or text message containing a link or attachment, the first thing you want to do is click on the link or open the attachment. Avoid this temptation – do not open messages from unknown senders, never click on links and do not open attachments in questionable email messages, delete messages that you consider spam.

Control your digital footprint

A digital footprint is the data you leave behind when using the internet. It is recommended to actively manage your digital footprint. To do this, you can take the following steps:

Delete unused accounts and applications.

Check the privacy settings on social networks and make sure that they are configured to an acceptable level for you.

Be careful to publish data, avoid public disclosure of personal and financial information.

Check for cookies in your browser and delete unwanted cookies regularly.

Use privacy tools such as anonymous browsers, confidential search engines, and anti-tracking tools.

Update your device OS and programs regularly

Updates usually include the latest security fixes to address vulnerabilities frequently exploited by attackers. Updating the operating system, applications and devices provides maximum protection from intruders.

Ensure the physical security of your devices

Ensure safe storage of devices. Always lock your devices, and to unlock them, use a fingerprint recognition mechanism, a reliable PIN code (not obvious, such as the date of birth) or a unique movement on the screen. Install the Find iPhone app for Apple devices or set up the Find Device feature for Android in case you lose your phone.

Avoid questionable sites

Download the software only from trusted sites. Take a responsible approach to downloading free programs and applications for file sharing. Perform transactions only on websites with up-to-date security certificates. Their address starts with HTTPS, not HTTP, and a lock icon is displayed in the address bar. Be selective about the users to whom you share personal data.

Disable unused functions

Attackers can use certain phone functions to obtain personal information, location or connection data. To prevent this, disable GPS, wireless connection, and location tracking when these functions are not in use.

Do not provide personal and financial data when using public Wi-Fi networks

When using public Wi-Fi to access the network in a public place, you have no control over its security. If you use public Wi-Fi, avoid performing operations such as online banking and online shopping. If these operations are necessary, use a virtual private network (VPN). VPN ensures the security of data transmitted over an unsecured network. If you do not use a VPN, refrain from making personal transactions until a reliable Internet connection becomes possible.

Use a reliable antivirus

Install reliable software products to ensure the security of your device. A reliable antivirus solution should ensure the security of your devices and data around the clock: block common and complex threats, viruses, ransomware, spyware applications and hacker attacks.