Number
of users who possess more than five online accounts are rapidly
increasing. Are you the one who believes
in keeping one password for your different accounts of office, bank, shopping,
for your favorite websites, social networking sites etc? If yes, you are more probable to be a victim
of cyber crimes. Here are 15 tips which may help you being secure while you are
online.
1.
Don’t click the unknown links
Cyber
criminals usually attract users’ computer and accounts by sending links and
fake attachments. Social media has made the work of these criminals much easy.
By identifying your choice and thus sending relevant posts, they may impress
you, thus forcing you to click on such links. You should prevent yourself from
clicking posts of unknown people.
2.
Try changing your important passwords periodically
If
a hacker has hacked your important e-mail password then he may soon hack your
other virtual passwords by some means easily. Once your main e-mail id is
hacked it’s very easy for the hacker to visit your other sites. Therefore you
should keep a strong password, should have different passwords for different
sites which should be changed from time to time.
After
the research of 42 antivirus software packages done by expert Brian Crabs, it
is estimated that with the help of good antivirus approx 25% cases are of
hackers are identified.
4.
Don’t give detailed details of your cards
Do
you want to store your credit card details for use in future? Be careful before
clicking such options. There is no such information regarding hacking of credit
card details till now but it’s better to be at a safer side. It would be quite
good if you can spend 90 seconds in filling the details every time.
5.
Be alert while shopping online
While
giving card details for online shopping, see, whether your browser gives a
locked padlock or a safe signal or not.
6.
Keep your facebook account lock clicked
Facebook
regularly keeps updating timeline and privacy settings. Thus, you should keep an
eye over what stuff can people see on your profile. Especially when facebook
design has been changed you should first of all change your privacy setting
‘who can see my stuff?’ to friends.
7.
Open more than one e-mail account
It
is safer to open different e-mail accounts for different purposes i.e. one
account for bank and financial matters, another for office, college etc. This
may reduce the amount if loss in case your id is hacked.
If
a customer is cheated the bank will compensate for the loss but this is only
possible when bank will be satisfied that the customer is not responsible for
the happening.
9.
Have strong verification system
If
your e-mail and cloud service has such facilities, do use it. Gmail, dropbox,
Facebook give you two step verification facility. In this system you will get a
verification code on your mobile after you enter your password, after filling
this code online you can open your account. Domain name system service also
gives you good protection.
10.
Ignore the pop-ups
There
are more chances of malware software in the pop-ups. As you click on these
pop-ups they destroy your software by entering your computer automatically.
11.
Do not use wifi
Generally,
WiFi does not code the information of hotspots. It may also serve as noather
threat source.
12.
Lock your phone and tablet
As the main door of your house is kept closed,
keep your phone and tablet locked. Even if you have to struggle through 40
passwords in a day it’s good to keep your phone locked.
13.
Know your phone features
Fry
My iPhone, Android Lost or Blackberry Protect provide features which help you
to erase your personal information if your phone is lost. You should use such
setups for your mobile.
14.
Be careful on auction sites
According
to experts’ opinion, you should be more alert on such sites. You should first
gather information about the seller. If
you are satisfied with the deal then only you should further proceed towards
your online conversation with the dealer.
15.
You can also make mistakes
Always
keep in mind hackers always hack according to user’s actions. Hacker takes
advantage of his/her behavior.
No comments:
Post a Comment