5 things you need to do to protect your accounts from hackers in 2021


There are two main reasons for online personal account hacking which are software flaws or human error. While there isn’t much you can do about the weaknesses of the software you use, changing your bad behavior with your online accounts and electronic devices helps you reduce risk.
We have seen many data breaches that have occurred in 2020 for many VIPs due to negligence only. For example, the account of US President Donald Trump was compromised until recently. Boris Johnson himself was the victim of a massive hack on Zoom calls. There is no doubt that these world leaders received security training from protection agencies, but as a result of their mistake, these violations occurred.

The risks are just as real for the average person. If your accounts aren’t properly protected, your bank account or credit card could be hacked, or your private messages and photos stolen and shared for everyone to see. To find out whether or not your accounts have been hacked, you’ll need to go through a lengthy and potentially frustrating verification process.
So it is better that you take certain security measures to protect your accounts from hacking. Now is the best time to organize your digital life early in the year.
So here are 5 things you need to do with your online accounts:

1- Make sure you activate the two-factor authentication feature on your accounts:


Perhaps the most effective thing you can do to protect your online accounts is to turn on the 2FA feature. This is a step that dramatically increases the costs of hackers trying to hack your accounts. This is why the penetration rate of accounts that use any type of authentication is lower. Many accounts are based solely on passwords.
There is a directory for all accounts that support the authentication feature through this link, but you must first enable it for all accounts that have personal information that could be misused, such as: messaging (WhatsApp, Telegram, etc.) and social networking applications.
But keep in mind that not all forms of two-factor authentication are created equal. In fact, security experts suggest that app-based authentication is better and more secure than phone number-based authentication solutions because hackers can easily forward text messages or phone calls to another number. via several techniques.

There are many authenticator apps that make this task easier for you including: (Microsoft Authenticator), (Google Authenticator), (Authy) and many more. These are apps that provide you with identification codes that a hacker has difficulty accessing because they actually have to reach your phone.

2- Use a password management application:


Passwords relate to identity; You prove your identity to the site, service or application by logging in with the correct password. So if your password is weak, anyone trying to access your data can easily guess and pretend to be you. So, using a strong and unique password for every website or service you use will reduce the likelihood that your accounts will be hacked.
But with the large number of services, sites and apps that we use on a daily basis, no one can remember all the passwords, so we need apps to manage passwords, and there are a lot of these. apps that protect your payment information and credit card data in the event of such leaks.

3- Learn how to spot a phishing attack:


Quickly clicking on whatever comes your way is your worst enemy. So when you get a new email or text message and include something clickable, don’t.
Phishing campaigns have increased in recent times due to the spread of the COVID-19 pandemic. Hackers have used the outbreak as a cover to launch waves of phishing attacks on Google Drive.
In fact, anyone can fall victim to these types of scams. So the main thing to do is think before you click, because these scam messages work to deceive people. Hackers claim to be making immediate demands on a certain party, and there are messages that say, “Urgent Response Needed,” but this is all a deception, of course.
There is no specific method to identify every type of phishing. Hackers are constantly striving to improve their methods and techniques. However, threat awareness can help reduce its effectiveness. So be careful, think carefully before you click anything, and only download files from people and sources you know and trust.


4- Make sure to update everything:


Every part of the technology you use, from the Facebook app installed on your phone to the operating system that controls the smart light, is vulnerable to attack. So companies always look for errors that appear in their software and fix them. This is why it is so important to make sure that all the technologies you use are updated to the latest version available.

Start with your phone; Go to settings, find the version of the operating system it is running in, and update to the latest version of iOS 14 on an iPhone or Android 11 on an Android phone.
As for apps and games, they are automatically updated in iPhone phones if you are using iOS 13 or later. In the Android system, you can also run automatic updates through the Google Play Store, through these steps:

• Go to the Play Store on your phone.
• Click on the three line menu icon in the upper left corner, you will see an options menu.
• Click on the Settings option.
• Click on the Automatic update of applications option.
• A window will appear containing three options, select the second option, which is to allow an update when connected to a Wi-Fi network.
Once your phone has updated, you will need to select the devices you want to update next. In general, any laptop or desktop that you own should be at the top of the list, then come gaming devices like: PlayStation and Xbox, then other connected devices.


5- Make sure to permanently delete old accounts:


Old online accounts and their login credentials could be used as weapons against you, if you didn’t do anything about it. Hackers often use details of past data breaches to gain access to accounts people are currently using.
A very simple step is to regularly delete your Google search history. You can also use Google’s alternatives that rely on privacy first.
Plus, there is a lot you can do to protect your accounts from being hacked. Find old accounts that you no longer use and delete them. This will reduce the amount of spam you receive and the number of ways hackers can target you.
Make sure to use VPN services to protect your data and improve your privacy while browsing, and download Tor browser if you really want to improve your anonymity on the internet.

Leave a Reply