12 noticeable things to protect your personal information
- ConsenSys and AMD develop blockchain-based cloud computing infrastructure
- Google Drive, Apple iCloud and Dropbox: Which is the best cloud storage?
- Benefits of ERP technology in cloud computing
- 5 reasons why enterprises should use cloud computing
- The combination of cloud computing and virtual private network
- Microsoft arrangements to utilize ARM chips for cloud computing
- Cloud computing - A simple explanation
- Adobe earns big on 'the cloud'
- New Window Server: Breakthrough on cloud security (Part 2)
- New Window Server: Breakthrough on cloud security (Part 1)
For most of the services today before being able to use, users must be logged in and most applications will require providing names, addresses, phone numbers, emails and more sensitive information like a personal credit account number. It will be dangerous if the above information gets into the hands of hackers.
According to security experts, users need to take the necessary steps to protect the identity and sensitive security data from now on to avoid online fraud:
1. Use a long, strong and unique password for each website or application. For added convenience, use the password manager to store and not be afraid to forget
2. Change your password immediately at any time if you receive a message that anyone is trying to access your account
3. Use secure 2-layer authentication, if possible, authenticate via phone message
4. Do not click on any links or text in the email if not authenticated
5. Be careful about over-sharing of personal or financial information on social networking sites
6. Download only mobile applications on official stores such as App Store and Google Play
7. Do not log any banking information, e-wallet, email on public Wifi without using VPN
8. Invest in antivirus software from a trusted provider for both computers and phones
9. Delete unnecessary applications on mobile, to make sure hackers can't take advantage of holes from applications
10. Always open new version updates on applications to ensure regular security fixes
11. Create browser-based tabs for quick access to financial pages and bank accounts to quickly handle emerging issues
12. Immediately notify the financial and banking management organizations when the money in the account is lost for unknown reasons
According to information from Trend Micro, in 2018 there were 50,642 victims reportedly trapped in frauds from the Internet, and the amount of fraud was up to 148.8 million in the US alone. In fact, when investigating further, security experts discovered that this was just floating part of the iceberg, many victims decided not to denounce and most of the victims came from online shopping on unsecured devices.
Some common ways that hackers choose to steal information:
- Forging an email sent to you from an official organization, an insurance company, a service provider, etc.
- Initialize automated attacks, using your login information they have stolen, or use the password detection tool to enter an account with an easy-to-guess password
- Directly exploit the holes from the website you visit in order to gain control of the website
- Infect malicious code from applications on your phone and when accepting downloads, you will become the next victim
By: Grace White