{"id":17824,"date":"2017-12-27T20:36:40","date_gmt":"2017-12-27T10:36:40","guid":{"rendered":"http:\/\/tomgrimshaw.com\/tomsblog\/?p=17824"},"modified":"2017-12-27T20:36:40","modified_gmt":"2017-12-27T10:36:40","slug":"simple-steps-for-preventing-your-online-presence-from-being-hacked","status":"publish","type":"post","link":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=17824","title":{"rendered":"Simple steps for preventing your online presence from being hacked"},"content":{"rendered":"<p>The recent Equifax Cybersecurity Breach was an eye opener like no other. The personal information of 145 million Americans were taken, including but not limited to social security numbers, addresses, and credit card numbers. This means that some enterprising and unscrupulous individuals have access to confidential data \u2014 and were able to accomplish this with relative ease. In light of this, cybersecurity experts have put out a number of helpful tips to help you maintain your safety online.<br \/>\nUse special passwords:<br \/>\nAs much as possible, avoid birthdays, chronological number sequences, literary quotes, and popular song lyrics. According to News.USF.edu, hackers have software to guess and crack passwords in seconds. Instead, use phrases or statements known only to you (\u201cThe chair is against the wall\u201d), or the first letters of each word in those statements (\u201ctciatw\u201d).<br \/>\nDon\u2019t use the same password more than once:<br \/>\nUtilizing duplicate passwords for multiple accounts make it easier for hackers to enter these accounts.<br \/>\nChange passwords every six months:<br \/>\nThough this seems tedious, switching up your passwords can make a world of difference.<br \/>\nAvoid clicking on links in emails and opening attachments:<br \/>\nEnsure first that the emails are authentic, meaning that they don\u2019t come from trick email addresses (e.g. \u201clotsamoney.com\u201d). To check if links are safe, just hover your cursor over them. Doing this will show the address. In line with this, steer clear of any ads or apps in these emails.<br \/>\nBe wary of apps:<br \/>\nIf you really must download apps, do so from the app store for your operating system. And before you install them, check to see if they won\u2019t be accessing unnecessary information (e.g. a drawing app doesn\u2019t need to see your contacts list).<br \/>\nUse secure networks:<br \/>\nIf you can, avoid using public WiFi networks. They may be convenient, but they\u2019re not secure. Connecting to public WiFi leaves you vulnerable and exposed to any hackers keeping an eye on that particular network. (Related: Software security group demonstrates how hackers can use ransomware to harm and potentially kill hospital patients.)<br \/>\nKeep up to date with security measures:<br \/>\nMake use of antivirus software and ensure that it\u2019s up to date, and make it a point to do the same for any security features your browser and operating system may have. This will give you a much-needed extra layer of protection whenever you\u2019re online. In addition, choose multi-factor authorization. It\u2019s an extra bit of work but totally worth it, since a second level of verification can notify you if and when someone is attempting to hack into your account.<br \/>\nLook for the lock:<br \/>\nSpecifically, the little green padlock before the website URL in the web address bar. The padlock serves as an indication to let you know that your login and account information is encrypted and won\u2019t fall victim to unauthorized access.<br \/>\n<a href=\"https:\/\/nexusnewsfeed.com\/article\/science-futures\/simple-steps-for-preventing-your-online-presence-from-being-hacked\/\" target=\"_blank\" rel=\"nofollow\">https:\/\/nexusnewsfeed.com\/article\/science-futures\/simple-steps-for-preventing-your-online-presence-from-being-hacked\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent Equifax Cybersecurity Breach was an eye opener like no other. The personal information of 145 million Americans were taken, including but not limited to social security numbers, addresses, and credit card numbers. This means that some enterprising and unscrupulous individuals have access to confidential data \u2014 and were able to accomplish this with &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=17824\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Simple steps for preventing your online presence from being hacked&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,10],"tags":[],"class_list":["post-17824","post","type-post","status-publish","format-standard","hentry","category-computer-tips-basic","category-general-interest","category-wealth-tips"],"_links":{"self":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/17824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17824"}],"version-history":[{"count":0,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/17824\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=17824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=17824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}