Why and How to Protect Yourself From the Risks of Black Friday | Cyber ​​Monday

Why and How to Protect Yourself From the Risks of Black Friday | Cyber ​​Monday


1 - Use a password manager. Even though not all devices can use it directly, a password manager is still one of the easiest and most effective solutions to implement. PCs like Macs or smartphones and tablets support the use of word managers directly. But even for devices where it isn't, you can and should use a password manager to create and store strong passwords. Preferably, choose a password manager that requires multi-factor authentication for extra precautions. There are no more excuses for not having completely unique (and complex) passwords for every online account you own, for gambling, shopping, banking, etc.

2— Protect your routers and personal WiFi networksIn a house full of computers, tablets, phones, and other connected devices, the connection between all these devices has one thing in common: the home router and the WiFi network. For the most part, it's a connection that was set up once and since forgotten. But to keep the devices in the house safe, you need to make sure that the router and WiFi are the best protected. Take the time to verify that you have a good, complex, and impossible to guess password. You can also configure it not to make its SSID (Service Set Identifier) ​​public: this will make it a bit more difficult to add new devices, but it means that it will be even more difficult for third parties to penetrate your personal network.

3 - Install more secure accounts on your PCs and Macs. PCs and Macs are an integral part of our homes these days. Take the time to set up an account for the whole family, with individual usernames and passwords. All modern operating systems allow you to create "user" accounts rather than administrator accounts.  Antivirus Software Make everyone a "user" account and create a separate "administrator" account to use for maintenance. If you have children, don't succumb to the temptation to let them have one or more accounts without a password - this is a way for them to learn the importance of good password protection and to be aware of keeping theirs!

4 - Prevent lost tablets and smartphones from causing even more trouble. Portable devices have a greater risk of loss or theft. Nowadays, our mobile phones often contain more confidential information than our PCs or Macs. Whether it's banking apps, e-wallets, or stored bank cards, you really don't want these falling into the wrong hands without protection. All recent models have protective settings to put in place before going out with:

a - passwords to protect the device,

b - information encryption,

c- lost device tracker,

d— Data erasure, if too many bad passwords are tried or if you activate it remotely.

5 - Protect your data on your connected watches or your personal fitness devicesSmartwatches and personal fitness devices share functionality with tablets and smartphones. In addition to using those, you should also take the time to make sure that you know how your health data is being used, and that the cloud accounts where these devices sync has very strong passwords. These devices collect some of your most personal information, and in some cases, the greatest risks are not with the device, but with how data is stored in the cloud.

6 - Be smarter than your smart home.  The smart home is a term that includes a whole series of devices, all of which have an Internet connection. Each of these devices will then have its own security and privacy settings. It is often very useful to take the time to understand them BEFORE activating them in your home. Either way, make sure your router and network are secure and use unique strong passwords to pair these devices with apps (if possible).

7 - Don't forget about entertainment apps and devices, including TVs and recorders.  There are two important points to check regarding security. First, the security of the devices themselves. In almost all cases, a good router and WiFi protection will be the best solution to protect your devices. But hobbies aren't limited to devices. All apps like Netflix, Amazon, or OCS have their own passwords to log in to their services, and criminals can crack them and sell compromised access to those services. That's why you should use strong and unique passwords for apps on these devices. This will also protect versions of applications for tablets, smartphones, PCs, and Macs.

 

8 - While you're at it defend, your gaming consoles.  Just like your other entertainment devices, gaming consoles have two aspects of security: the device itself and the security of the cloud accounts that are there. connected. Once again, it is the accounts in the cloud that are of interest to attackers. Again, take the time to set up unique and strong passwords. In addition, many gaming platforms now include a second authentication method (most often a text message sent to your phone) that you should enable for added security.

9 - Configure your user profiles for voice assistants.  Voice assistants are among the most popular new devices out there, which means they are little known and misunderstood. The biggest risk that has been widely discussed is the possibility of hacking by external sources. Take the time to set up individual accounts if possible. Many of these devices also have buttons to mute the mic when you don't need them. If you haven't already, start using this feature.

10 - Use smart speakers intelligently. These can be seen as a subcategory of voice assistants, in that they are voice-activated devices in your home. Many have voice assistants installed, which makes the distinction even less clear. This means that the precautions taken for voice assistants must also apply to connected speakers. However, it is important to verify that if you really want a connected music listening device, you are focusing your purchases on devices that only have this functionality. This will improve your security by reducing the risks involved with features that you do not use at home.

11—  Drive safely with connected carsWhile we hear more and more about “car hacking”, in reality, the security of connected cars is much more prosaic than one would like you to believe. One of the main differentiating factors with these cars is often their smart locking from a plip (contactless key) or an app on your phone. The best security then consists of ensuring good security of the other devices concerned, but also good physical protection. Make sure the devices connected to your car have good security, don't give your keys to just anyone, and protect your cloud accounts with good passwords and two-factor authentication if possible.

12 - Only have trusted applications on your phone. The first thing to consider when installing an app is whether you can trust it. In order not to unknowingly give access to applications that may have unwanted functionality or which access sensitive data, such as your contacts or messages, or which behave maliciously. By avoiding third-party marketplaces and staying on Google Play or the Apple App Store, you keep an additional layer of security on your phone, as its platforms regularly hunt for malicious apps in their selections. In addition, as for PCs,

13 - Update, update, update…  We end this list with updates because that's the most important thing to know. Even though doing them means staying without your device active for five minutes while they settle in, these updates are essential for the security of your devices as they can include new information or software to prepare for it. current cyberattacks. Better to patch than catch them.

Comments

Popular posts from this blog

What is Total Security Software and Why is It Essential in Today's Digital World?

What Are the Benefits of Using Antivirus Software With Browser Extensions?

The Importance of Multi-Factor Authentication in Cybersecurity | Total security