National Cybersecurity Awareness Month and recent cyber attacks remind us that every person is at risk.
This year Yahoo announced that a hacker stole the information from 500 million accounts. Another hacker exposed the email and password combinations from 117 million people’s LinkedIn accounts.
Even Facebook founder Mark Zuckerberg’s account information was exposed. No matter your status or computer science experience, no person is immune to a hack.
Want to protect your personal accounts, confidential business data and more? Read Macate’s Cybersecurity Roadmap and learn how to detect and prevent cyber attacks.
What Sets You at Risk
– Free Wifi
Hackers create faux Wi-Fi networks to lure unsuspicious users and gain data access. While conserving data is important, it’s not worth setting your confidential information at risk. Don’t connect to a Wi-Fi network if you see “Cannot Verify Server Identity” on your phone.
– Downloading Jailbroken Apps
A Jailbroken app is any type of remodified app that has new features. People download jailbroken apps from sources other than Google Play or the Apple store. But cyber criminals make hundreds of jailbroken apps and insert different types of malware. Different features from jailbroken apps are great, but not at your personal information’s expense.
Bluetooth is convenient, but users should never leave their Bluetooth on after use. Hackers look for people with active Bluetooth and WIFI. Once detected, hackers can see what networks you’ve connected to before. Then infect those networks and redirect your Bluetooth to connect to their private network.
How to Prevent
– GATCA Elite
Macate’s GATCA Elite smartphones have patented security defenses that prevent security breaches. One security feature called CoinSL protects your data in the case of theft. The GATCA Elite locks down if the SIM card is removed, and secures all mobile data. For more information about the GATCA Elite, go to Macate.com.
– Two-factor Authentication
Use two-factor authentication for all online accounts. Two-factor authentication provides an extra security layer on top of the username and password. The extra verification passcode prevents criminal intrusion. The individual provides a piece of information like a randomized code or another password. The information should be accessible by no one other person.
– Strong password & Password manager
Be creative when choosing your password. Yes, choosing a difficult password is hard to remember, but crucial for data privacy. To keep track of all your passwords, use a password manager such as LastPass. Password managers store all passwords to avoid mix up different passwords and different accounts. They also help you generate strong passwords and audit passwords to prevent password reuse.
– Stay in the Know
If you don’t know what a phishing email looks like, you are more likely to download a virus. Many people can’t recognize the red flags of an email, website or app that has hidden malware. People who don’t know about different hack tactics won’t know what to avoid.
How to React
– Shut down the Account
If someone hacks into any type of personal account, change your password immediately.
– Change Other Account Passwords
Don’t reuse passwords for multiple accounts. If you experience a data breach, change your passwords for all other accounts. Hackers will test different variations of username and password combinations on different accounts. This includes online banking accounts, your Paypal account and more.
– Notify the Response Team
For personal security breaches, contact and notify all bank accounts and credit card holders. Sign up for a credit-reporting agency like Equifax to prevent fraud or identity theft.
At work don’t keep a data breach to yourself and notify upper management and HR immediately.
If you want to create a personalized cybersecurity roadmap for yourself or your company, contact us at email@example.com !