5 ways to protect against hackers (More Information)..

 

5 ways to protect against hackers

Posted: January 3, 2022 by Mrjournet123
Last updated: May. 2, 2022

Hackers (of the criminal variety) are a scary bunch—whether working as part of an organized unit or an idealist with a political agenda, they’ve got the knowledge and the power to access your most precious data. If hackers want to target a particular company, for example, they can find vast amounts of information on that company just by searching the web. They can then use that info to exploit weaknesses in the company’s security, which in turn puts the data you’ve entrusted to that company in jeopardy.

Think of your home computer as a company. What can you do to protect it against cybercriminals? Instead of sitting back and waiting to get infected, why not arm yourself and fight back?

Bad guys, beware. We’ve got 10 ways to beat you.

  1. Update your OS and other software frequently, if not automatically. This keeps hackers from accessing your computer through vulnerabilities in outdated programs (which can be exploited by malware). For extra protection, enable Microsoft product updates so that the Office Suite will be updated at the same time. Consider retiring particularly susceptible software such as Java or Flash, especially as many sites and services continue to move away from them.
  2. Download up-to-date security programs, including anti-malware software with multiple technologies for protecting against spyware, ransomware, and exploits, as well as a firewall, if your OS didn’t come pre-packaged with it. (You’ll want to check if your OS has both firewall and antivirus built in and enabled by default, and whether those programs are compatible with additional cybersecurity software.)
  3. Destroy all traces of your personal info on hardware you plan on selling. Consider using d-ban to erase your hard drive. For those looking to pillage your recycled devices, this makes information much more difficult to recover. If the information you’d like to protect is critical enough, removing the platters where the information is stored then destroying them is the way to go.
  4. Do not use open Wi-Fi on your router; it makes it too easy for threat actors to steal your connection and download illegal files. Protect your Wi-Fi with an encrypted password, and consider refreshing your equipment every few years. Some routers have vulnerabilities that are never patched. Newer routers allow you to provide guests with segregated wireless access. Plus, they make frequent password changes easier.
  5. Speaking of passwords: password protect all of your devices, including your desktop, laptop, phone, smartwatch, tablet, camera, lawnmower…you get the idea. The ubiquity of mobile devices makes them especially vulnerable. Lock your phone and make the timeout fairly short. Use fingerprint lock for the iPhone and passkey or swipe for Android. “It’s easy to forget that mobile devices are essentially small computers that just happen to fit in your pocket and can be used as a phone,” says Jean-Philippe Taggart, Senior Security Researcher at Malwarebytes. “Your mobile device contains a veritable treasure trove of personal information and, once unlocked, can lead to devastating consequences.
  6. Web browser have become one of the most important parts of our lives, as we are using them more often than any other application. Think about it: you send and receive emails , you watch videos, you listen to music, you buy things online, and you keep in touch with your friends: all of these are done from your browser. But how much time have you spent wondering how secure your browser actually is?

    I have an anti-virus, should I keep reading this?

    Having antivirus, anti-malware or firewall applications installed increases your overall security, but it's not always enough. This means that improving the safety of your browser will never be a redundant action. Most popular browsers like Chrome, Firefox, Opera or Safari have pretty strong default security settings, so you don't need to learn how to configure them from the get-go, but knowing how to keep yourself safe while using them is a totally different story.

    Main risks for your browser

    In case if you're curios about what kinds of things put your browser in peril, there are three main categories: browser vulnerabilities, the users and required third-party apps. Here's an explanation for each of them:

    Browser vulnerabilities

    As we all know, nothing in the world is perfect, so it's unjust of us to think that our web browsers could be completely hacker-proofed. Unfortunately, most common browser-related attacks were caused by a vulnerability which the cyber-attackers exploited to infect their victims' PCs, steal their data or damage important system files.

    Users misuse

    Even though we don't like to admit it, we represent a big peril for our web browsers. Whether you're an inexperienced user or simply because you don't care, there is a bunch of things that you can do that will compromise your browser's security. Here are some of them:

    • clicking on unknown links without caring where they lead to or who put them up and why;
    • unknowingly modifying security settings for wider / quicker Internet access;
    • accepting a website's request to install an additional application (from an unknown source) in order to be able to browser it;
    • installing applications or browser add-ons and then never taking the time to maintain them;
    • downloading bundled application and allowing the unnecessary ones to get installed without knowing exactly what they are.

    Dangerous but (sometimes) necessary add-ons

    • ActiveX - Commonly associated with Internet Explorer's, ActiveX is required to browse and perform actions on certain websites. However, it's also often used by hackers who add malicious ActiveX software to websites and thus infect your PC.
    • Java and JavaScript - while both are necessary on a whole bunch of websites, JavaScript and a script for a virus can be easily intertwined and the Java browser add-on is full of security problems which allow cyber-attacker to gain access to private data saved on your PC.
    • Flash Player - the Flash browser add-on also has a lot of security holes that many hackers exploit. I've already talked about this in The Flash Player Revolution article, so you can find more data about this by following that link.
    • Cookies - originally used by websites to avoid overcrowding their servers, cookies have evolved into real dangers to your privacy.

    Protection methods

    Fortunately, keeping your browser as safe as possible isn't incredible difficult, but it sometimes (rarely) involves sacrificing some convenience and functionality. Here's what you can do to hacker-proof your web browser:

    Updates are important

    Everyday security researchers find new vulnerabilities, and new security patches are being released. The quicker you allow your browser to update itself, the sooner you'll have the latest security available. Waiting too long before updating allows the slower hackers to exploit vulnerabilities which have already been fixed and became public knowledge. The same goes for the add-ons /  plug-ins that you have installed, as they are vulnerable to exploits as well. Just leave the automatic updates setting turned on for Google or Chrome and don't use outdated browsers like Internet Explorer (unless you really have to), and you should be fine.

    Click-to-play plug-ins

    Flash content which automatically starts on webpages is generally annoying, makes websites load slower and forces your browser to take up a lot of your PC's resources. Furthermore, it can represent a security risk, so I recommend installing an extension that will help you avoid these problems. If you're a Mozilla Firefox user, an add-on like Flashblock can do the trick nicely. In case if you're a Google Chrome user, I recommend using the browser's settings instead of an extension (as the application already takes up enough resources as it is): Just go to Settings, press Advanced Settings and click on the Content button. Now navigate to the Plugins and check the box marked Let me choose when to run plugin content. Finally, Opera users should also go to their browser's Settings, click on the Websites button and then check the Click to play field.

    Install anti-exploit applications

    Over the course of this article I've used the word exploit more times than in the entire last month, so I probably don't need to tell you how beneficial it would be to have an anti-exploit application installed on your PC. Why are these tools so cool? They don't use blacklists and huge databases like the anti-virus applications do, but instead simply stop your browser whenever it acts suspiciously. As far as I know, the best anti-exploit tools currently on the market are Microsoft's EMET and Malwarebytes Anti-Explot. (Both of them can be used for free, so you don't have to worry about money.) If you're not an advanced user, I recommend using Malwarebytes Anti-Exploit as it's easier to understand and set up.

    Additional advice

    I have two more little tips for you which are not as effective as the previous ones, but were too important to ignore completely:

    • Firstly, if you can, always install a 64-bit version of any browser (instead of the 32-bit one). 64-bit applications have always had, and always will have, better protection than the others, so they will improve your system's security. At the moment, Mozilla doesn't have a 64-bit version for the main version of Firefox, but you can choose the Nightly build of the browser if you can cope with it.
    • And secondly, uninstall all the plug-ins / extensions / add-ons that you don't actually use. They don't only take up resources and can be annoying from a visual standpoint, but they also represent a security risk. It only takes a few seconds to remove them, so it's not that much of an effort.

    Conclusion

    The web browser is the application that you use most often and the one that's always interacting with the Internet, so it's constantly exposed to a lot of risks. Now that you know how, why not take a little time and make sure that your browser is secure?





  • Hackers are criminals who gain unauthorized access to a network and devices, usually with the intent to steal sensitive data, such as financial information or company secrets.
  • You can protect your computers by using firewalls and antivirus software and by following best practices for computer use.
  • You can protect your mobile devices by turning off Bluetooth when it’s not in use, being mindful of the Wi-Fi networks you connect to and using security applications to improve monitoring and protection.

The growth of the World Wide Web in the 1990s introduced new possibilities and spawned new industries, but it also brought about new downsides of connectivity. Tons of spam started to infiltrate email accounts, and computer viruses wreaked havoc on business networks. A new threat known as computer hacking extended the definition of thievery to include infiltrating your computer, stealing personal information, tricking you into revealing private data, and using that data to steal and extort personal information, such as business secrets, bank account credentials and even people’s identities.

What are computer hackers?

Computer hackers are people who break into internet-connected devices such as computers, tablets and smartphones, usually with the intent to steal, change or delete information.

Just as other thieves have malicious intent, hackers usually find their way into devices for negative purposes. (However, one exception is so-called white hat hackers, whom companies hire to break into their devices to find security flaws that need to be fixed.) Hackers may want to steal, alter or delete information in your devices, and they often do so by installing malware (software used for malicious purposes) you might not even know is there. These thieves might get access to your most precious data before you’re aware of a break-in.

Key takeaway: Hackers are interested in gaining unauthorized access to your devices to steal sensitive data.

Types of hacking

Here are some of the reasons computer hackers break into devices:

  • Financial crimes. We’ve all heard the classic story of somebody checking their credit card statement, only to find transactions they didn’t make. These false transactions are often the result of computer hackers stealing your credit card numbers, checking account info or gaining access to other financial data.

  • Vandalism. Hacking has its own subculture, so some hackers may want to vandalize certain websites just to show off to other hackers. Does it sound ridiculous? Don’t make the mistake of not taking this motivation seriously; it’s fairly common, according to Malwarebytes.

  • Hacktivism. This portmanteau describes a form of hacking somewhat like vandalism. Some hackers may want to alter or destroy certain websites for politically motivated reasons.

  • Corporate espionage. Spying existed long before the internet era, and hacking has only made espionage more accessible to the everyday person. With much of the world constantly connected to the internet, one company can hack into other companies’ devices to steal their information and use it to build an unfair competitive advantage.

Key takeaway: Hackers have a variety of motivations, ranging from financial gain to political goals. Awareness of these intentions can help you anticipate attacks that could affect your small business.

How to secure your computer from hackers

Despite the prevalence of computer hackers, most businesses rely on the internet to track their financials, order and maintain inventory, conduct marketing and PR campaigns, connect with customers, engage in social media, and perform other critical operations. Yet we continue to hear about massive computer breaches, even at giant corporations with robust security measures in place.

Small businesses are often targeted as well, especially because they may underestimate the risk of cybercrime and may not have the resources to employ expensive cybersecurity solutions. Follow these tips to protect your devices and safeguard your sensitive data:

1. Use a firewall.

Windows and macOS have built-in firewalls – software designed to create a barrier between your information and the outside world. Firewalls prevent unauthorized access to your business network and alert you to any intrusion attempts.

Make sure the firewall is enabled before you go online. You can also purchase a hardware firewall from companies such as Cisco, Sophos or Fortinet, depending on your broadband router, which also has a built-in firewall that protects your network. If you have a larger business, you can purchase an additional business networking firewall.

2. Install antivirus software.

Computer viruses and malware are everywhere. Antivirus programs such as Bitdefender, Panda Free AntivirusMalwarebytes and Avast protect your computer against unauthorized code or software that may threaten your operating system. Viruses may have easy-to-spot effects – for example, they might slow your computer or delete key files – or they may be less conspicuous.

Antivirus software plays a major role in protecting your system by detecting real-time threats to ensure your data is safe. Some advanced antivirus programs provide automatic updates, further protecting your machine from the new viruses that emerge every day. After you install an antivirus program, don’t forget to use it. Run or schedule regular virus scans to keep your computer virus-free.

3. Install an anti-spyware package.

Spyware is a special kind of software that secretly monitors and collects personal or organizational information. It is designed to be hard to detect and difficult to remove and tends to deliver unwanted ads or search results that are intended to direct you to certain (often malicious) websites.

Some spyware records every keystroke to gain access to passwords and other financial information. Anti-spyware concentrates exclusively on this threat, but it is often included in major antivirus packages, like those from WebrootMcAfee and Norton. Anti-spyware packages provide real-time protection by scanning all incoming information and blocking threats.

4. Use complex passwords.

Using secure passwords is the most important way to prevent network intrusions. The more secure your passwords are, the harder it is for a hacker to invade your system.

More secure often means longer and more complex. Use a password that has at least eight characters and a combination of numbers, uppercase and lowercase letters, and computer symbols. Hackers have an arsenal of tools to break short, easy passwords in minutes.

Don’t use recognizable words or combinations that represent birthdays or other information that can be connected to you. Don’t reuse passwords, either. If you have too many passwords to remember, consider using a password manager, such as DashlaneSticky PasswordLastPass or Password Boss[See related article: How to Create a Strong Password]

5. Keep your OS, apps and browser up-to-date.

Always install new updates to your operating systems. Most updates include security fixes that prevent hackers from accessing and exploiting your data. The same goes for apps. Today’s web browsers are increasingly sophisticated, especially in privacy and security. Be sure to review your browser security settings in addition to installing all new updates. For example, you can use your browser to prevent websites from tracking your movements, which increases your online privacy. Or, use one of these private web browsers.

6. Ignore spam.

Beware of email messages from unknown parties, and never click on links or open attachments that accompany them. Inbox spam filters have gotten pretty good at catching the most conspicuous spam. But more sophisticated phishing emails that mimic your friends, associates and trusted businesses (like your bank) have become common, so keep your eyes open for anything that looks or sounds suspicious.

7. Back up your computer.

If your business is not already backing up your hard drive, you should begin doing so immediately. Backing up your information is critical in case hackers do succeed in getting through and trashing your system.

Always be sure you can rebuild as quickly as possible after suffering any data breach or loss. Backup utilities built into macOS (Time Machine) and Windows (File History) are good places to start. An external backup hard drive can also provide enough space for these utilities to operate properly.

8. Shut it down.

Many businesses, especially those operating a web server, are “all systems go” all the time. If you’re not operating a complex internet-based company, however, switch off your machine overnight or during long stretches when you’re not working. Always being on makes your computer a more visible and available target for hackers; shutting down breaks the connection a hacker may have established with your network and disrupts any possible mischief.

9. Use virtualization.

Not everyone needs to take this route, but if you visit sketchy websites, expect to be bombarded with spyware and viruses. While the best way to avoid browser-derived intrusions is to steer clear of unsafe sites, virtualization allows you to run your browser in a virtual environment, like Parallels or VMware Fusion, that sidesteps your operating system to keep it safer.

10. Secure your network.

Routers don’t usually come with the highest security settings enabled. When setting up your network, log in to the router, and set a password using a secure, encrypted setup. This prevents intruders from infiltrating your network and messing with your settings.

11. Use two-factor authentication.

Passwords are the first line of defense against computer hackers, but a second layer boosts protection. Many sites let you enable two-factor authentication, which boosts security because it requires you to type in a numerical code – sent to your phone or email address – in addition to your password when logging in.

12. Use encryption.

Even if cybercriminals gain access to your network and files, encryption can prevent them from accessing any of that information. You can encrypt your Windows or macOS hard drive with BitLocker (Windows) or FileVault (Mac), encrypt any USB flash drive that contains sensitive information and use a VPN to encrypt web traffic. Only shop at encrypted websites; you can spot them immediately by the “https” in the address bar, accompanied by a closed-padlock icon. [See related article: A Small Business Guide to Computer Encryption]

Key takeaway: Combining security tools and best practices can protect your computers and your network from unauthorized access.

How to secure your phone from hackers

To secure your mobile device, you may need to take different security measures than you would to secure a computer. Follow these tips from Webroot to help you protect your mobile devices from hackers:

13. Turn off Bluetooth.

When you’re not using Bluetooth, turn it off. Keeping your Bluetooth on but dormant opens another back door for computer hackers.

14. Don’t use unsecured public Wi-Fi.

Password-free, widely used Wi-Fi networks have no security features. As such, they’re prime targets for computer hackers.

15. Get a security app.

Install a security app on your phone, just as you should install a firewall, antivirus software and an anti-spyware package on your computer. Popular options include Avast, Kaspersky Mobile Antivirus and Bitdefender.

16. Use a better passcode.

Unlock codes like 0000 and 1234 are easy to remember, but they’re also easy to guess. Instead, opt for a randomly generated, six-number passcode.

17. Switch off autocomplete.

Autocomplete is the feature that guesses what you’re typing and completes the word, phrase or other information for you. While convenient, this tool all but hands your email address, mailing address, phone number and other important information to hackers. Switch it off.

18. Clear your browsing history.

Your mobile web browser has a browsing history, too. Clear it often – including cookies and cached files – to give hackers as little information as possible to work with if they do break into your phone.

Key takeaway: Mobile devices require additional efforts to protect, including deactivating certain features when they’re not in use and installing security applications.

Where was the last public place you visited that had Wi-Fi? These days, nearly every coffee shop, library, airport and hotel offer a way to access the internet from your cell phone or other mobile device. That means the information you have on your phone could be available to hackers in the area – unless you’ve taken steps to protect your data. Here are a few recommendations from the University of Michigan:

  1. Don’t access personal or financial data with public Wi-Fi.

    This may seem like a no-brainer, but you’d be surprised how many people check their bank accounts or make purchases with a credit card while using public Wi-Fi. It’s best to do those things on a secure connection.


    Article Img1


  2. Turn off anything you don’t need.

    Hackers can use certain features on your phone to get at your information, location or connection. So, instead of keeping your GPS, wireless connection and geo-tracking on all the time, just turn them on when you need them.

     

  3. Choose your apps wisely.

    Only download apps from trustworthy sources that have established a good reputation. Make sure you update your software and apps regularly and get rid of old apps you don’t use.

     

  4. Use a password, lock code or encryption.

    Make sure your passwords are at least eight characters long, with a mix of upper and lower case, and include numbers or other characters, and never use the auto-complete feature for passwords. You can use the storage encryption feature on your phone to protect your private data, and set your screen to timeout after five minutes or less.


    Article Img2

  5. Be skeptical about links and attachments.

    If you’re not sure about the source, don’t use the link or open the attachment.

     

  6. Trace or erase.

    Make sure your data is secure if your mobile device is stolen or lost. You can set up your device to lock itself after a pre-set number of failed log-in attempts.

Post a Comment

Previous Post Next Post