Safe Browsing - Personal Security Part 2

Hello! Today we are continuing from part one of "Safe Browsing - Personal Security". Before i go to the  next tip, In Part One we concluded with Using strong password. Now strong password is a mixture of numbers, letters, and symbols to create a given password. The mixture makes it difficult for hackers to brute force and guess your password. Understand now? Good!



Don't Use One Password To All Your Online Accounts:

Not quite long ago i was among those using one password to almost all my social media and online accounts. I just couldn't have several passwords saved on my had drive upstairs since it was quite much and like you, i just wanted to have an easy and fast access to my accounts and save myself the stress of always trying to sort them out. Well i'm sorry to disappoint you but that's not an habit to be kept this days of Cyber attacks and internet frauds. You see one of your account can be hacked and that spells doom for your other accounts and also enable hackers to get sensitive information about you such as bank accounts, social security number, BVN etc. These are information that can be use for identity theft and financial fraud against you.
So it's advisable to always use different password to different account.



Log Out From Your Online Accounts After Use:

Yes! It's your phone and your notebook. We all know that, but that doesn't mean you should stay logged in after using an online account because it does not guarantee security. Always log out from websites that might have sensitive information about you. This is 21st century and most of the things we do today is done online. From shopping for the trending fashion to buying house hold stuffs. The problem here is most of the times we assume because we are using our devices for these transactions, then we are safe! But that's not safe practice in reality because hackers can remotely get access into your system and having a free pass into your online accounts thereby using it for personal gain!. So it's advisable to always log out from your online accounts after using it for your personal security!

No comments:

Post a Comment

Intel Tiger Lake CPUs to come with Anti-Malware Protection

Intel’s Tiger Lake CPUs will come with Control-flow Enforcement Technology (CET), aimed at battling common control-flow hijacking attacks. I...