Protect data and other information in my computer
As more and more of the data was performed digitally on computers and servers around the world is stored, the most important is to keep both locked from these data. Hackers steal credit card numbers and account numbers on a daily basis and steal someone’s identity is as simple as learning to drive one. For some data, there is not much you can do.
For example, if the database server hacked, there’s not much you can do when you receive your account number and withdraw money. Fortunately, if someone like what happens with a large company, which will take the hit, and not in your own money.
For the data you have stored locally on your computer or an external device, it is important to ensure that either do not store anything sensitive on it or if it does, then make sure you are well protected. In this article I am going through five steps you can take to protect themselves better go and data from hackers and scammers.
Step 1 – encrypt data
We hear every day of encryption, but it seems that nobody really does. I asked all my friends about encryption and has not been encrypted data on their computers or external hard drives. And these are the people that for almost all online payment of taxes on food to make reading the newspaper. The most important thing you can do is encrypt the data. It is a tough process in Windows or Mac, and if you do the first time, you really have to do something new.
Here is an article I wrote in 2007 that still applies today. This is how the hard disk with a program called TrueCrypt, which is free and remains one of the most popular programs for data encryption to encrypt. What is a flash drive with encryption? I’ve also written about 3.5 years ago! TrueCrypt can also encrypt a USB flash drive or external storage devices.
Encrypt your data securely, if someone got a hold of your computer or external drive would not be able to just connect and see all your files. Without knowing the password to log into the system, they could not access the data stored on disk. Which brings me to my second point.
Step 2 – Use strong passwords
Of course, encryption is not worth anything, if someone simply on your computer and the brute force attack to enable logging until they get the correct password. His use of a password that is long and it’s a combination of numbers, symbols and characters are very difficult for someone to break the password with a brute force attack. Of course there are other ways to get around all passwords, but there are things you can do to avoid this problem, I will write later.
I’ve written before about 4 free online tools you can use to generate passwords. Also read my 5 tips for creating strong passwords. Many people tell me not to use such passwords, and never remember them and then they will end up having to restart over and over again. Okay, this is a problem. LastPass is why, the password manager online and offline that is super safe to use. You can store the passwords for all your web pages and accounts and access them easily from your phone or computer.
Step 3 – two-factor authentication
So there is a problem with encryption and passwords, and also hacked if someone can sniff your password as it will be sent via the Internet. For example, say you’re in a café and wireless network, which is probably uncertain. If you are on a site that could not use SSL (https in the address bar), a password hacker to sniff as he sent over the wireless network.
So how do you protect it? So first, you never sensitive, while in a wireless network is not trusted or public WiFi network. It’s too risky. Secondly, two factors can authentication. This basically means that you must register a password and other information on the site or service.
Google has two verification step, which is just awesome. Basically, it makes your entire Google account protection from hackers. Why? Well, even if someone gets your password super powerful Google will not be able to access anything, until you too can get the 6 digit code that is generated every 30 seconds, and only seen on your Smartphone. Basically, they forget to get your phone and then they would be able to sign up. This reduces the risk of being attacked by a large factor.
But what good is that there are many sites that use two-factor authentication. For example, the site I mentioned LastPass is working with Google and authenticator therefore not have to worry about all your passwords protected by a unique password. Now is a password and a code that only you can access.
Log in and check out Facebook’s approval. To register a new device, Facebook first send a code to your mobile phone and be introduced, along with your password. Now your Facebook account can not be hacked.
And there’s more! Using PayPal? Now they have something like PayPal Security Key. The same concept, just send an SMS with a code you can use to log on. How about a WordPress blog? Well, you can back up with the authenticator plugin for Google Web sites from hackers.
Two-factor authentication is simply unbeatable in terms of how easy it is to set up, but how much more will your data security. Check to see your favorite websites, whether they are for two-factor authentication.
Step 4 – Protect your network
The other important aspect of security you want, consider the network to communicate with the outside world to use. Is your wireless network secure? Is it compatible with WEP or WPA or WPA2? Do you regularly through insecure networks in hotels, airports, coffee shops?
The first thing I do is lock your wireless network, which is probably where he did most of your computer activity. Would you like to enable security, and select the highest possible security. Check out my article on the wireless encryption protocol is best.
There are also lots of other things you can do like:
– Disable SSID broadcast
– Enable the MAC address Filteirng
– Enable AP Isolation
You can register online at these other types of security. The second thing I want to do (maybe even the first) is to change the username and password used to access your wireless router. So it’s great if you use WPA2 AES configuration, but if someone just types in the IP address of the router and then you can use the username and default password for the router (which can be found online at seconds) that really can change everything and block our own router!
Fortunately, you can always restore access the router and gain, but it’s still very risky, because someone can access your router and then everything else that is connected to the network. Access the router is fine, because they say you can to all clients connected to the router and their IP addresses. It is never a good idea to buy a new wireless router, bring it home and plug it with ease, without the establishment of safety first.
Finally, it is definitely necessary to turn the firewall on the router and computer. These communications applications to certain ports on the computer is prevented.
Step 5 – anti-virus software
Also here you can do steps 1 through 4, but everything can be useless if a virus or malware is installed on your computer remotely and someone can be controlled via remote access or data from your computer to their servers. Antivirus is important today and good surfing habits.
I personally recommend Microsoft Security Essentials for Windows, since it is free and does a very good job of detecting viruses and malware. If you suspect you have something to read my previous post on the removal of malware and spyware.
The implementation of these five practices greatly reduces your chances of theft and data piracy. There are still ways for hackers to circumvent even the most secure networks and encryption, but there’s nothing wrong with what is really hard for them to do. What are your thoughts? How to protect your digital data?