How to Protect Your Data in Apps and Social Networks
For example, recently, there was a major WhatsApp data leaks. It is such cases that lead to the fact that companies start calling and endlessly offering their services.
What should you do? Today, we’ll talk about how to secure your data using popular applications and services.
Don’t forget about 6 types of social media accounts that cannot be abandoned.
Rules for data protection from third-party apps
Rule # 1: Follow the rules of use
The simple rules are enabling geolocation, creating different passwords for new resources, regularly updating information, and clearing the history in the browser.
If the application correctly disposes of the freedoms (providing information, specifying their data, updating payment information) that the application gives, most of the data can be secured. When creating different passwords on your devices, do not write them down in your smartphone notes.
If your data is still publicly available, most likely this part of the information will also be available to attackers. However, there are special programs that allow you to store personal data safely.
You can also use old but still effective methods, like writing down your password with the digits altered in a specific way. For example, if your password is “Hello 2020,” you write it in your notes “Hello 2030,” keeping in mind that you need to subtract 10 from everything written down.
A fully-fledged guide on password creation can be found here.
Also, do not forget about this logic: there are only 10 numbers but 26 letters, so it is more difficult to crack alphabetic passwords. Think also about how the attackers themselves act: the hacking process has long been automated.
The solution may be a random set of letters or numbers, which will have to be selected manually.
Use passwords that are generated automatically. This option is built into Apple devices. When creating a new password, any device will offer you an automatically generated set of letters and numbers with a high degree of protection.
Also, you can adjust settings in the browser so that this password will be filled in automatically on your device, but it is not saved in the cloud. This will be a safe and convenient option if you use a specific type of application on one gadget (for example, to call a taxi or order food delivery only from your phone.)
Don’t forget that even your funny passwords can be hacked!
# 2 Rule: Use proven services
Use large and proven resources. Among the disadvantages – it is unlikely that you will be able to win a lawsuit in the event of a data leak. On the plus side, companies have already invested billions in their brand and positive image; they will do everything not to lose it. It is most convenient to prioritize a certain ecosystem for access to the resources of which one password is suitable.
Password storage is also practiced by the largest market players – among them Google Chrome, which will remember and ensure the security of the password and bank data. Although due to this, you do not have to fill out a form for payment every time on various sites; the browser itself will offer available options for credit information.
There are specialized options for storing bank information – aggregators. In the public understanding, the aggregator is a protection against viruses. Still, they offer a much larger set of options, including monitoring the use of a webcam, detecting spyware, and encrypting online payments.
Create a backup email, prohibit logging in without two-factor authentication, and set the need to confirm the login from a second device. After completing all these steps, you can safely specify this email as a login and restore passwords safely if necessary.
Find out your best email security solution here.
Rule # 3: Store passwords secure
Even though storing data on different media is dangerous, it is impossible to do without it in the modern world. Even if you do not register in social networks in principle and have never flipped through the Instagram feed in your life, you use government services and the banking system. And this is information about your material wealth, marital status, and residential address. It isn’t easy to protect the data yourself in this case. But there are several steps to secure the process:
1. Pay attention to what data you provide. Copy or save all your passwords. Use the additional protection methods offered by the applications.
2. Store passwords from the essential resources in different places. In this case, if a hacker gets access to information about your bank account stored in one application, he could not get to your passport data, which is only available on another service.
3. It is also very important to carefully and regularly check whether your passwords have been hacked. To do this, there are separate services that you should add to your browser’s “bookmarks.”
One of them involves checking the safety of passwords by checking the email address: Have I been Pwned. It is worth choosing the most convenient application or website from this category, especially if you have suspicions that someone could use your page or data.
“If I do everything, will my data never be stolen?”
It is necessary to be aware of trends and follow basic network security tips, but it is important to remember that this can never guarantee complete data security. Regularly check your social media pages for hacking, update your passwords several times a year and monitor all strange transactions taking place on your accounts or in your offers.
Catch the essential checklist on security tips to protect yourself.
Rule # 4: Don’t be afraid to ask for help and advice
Study industry and professional resources where competent specialists share their experience and help avoid common mistakes. Very often, useful information can be found on forums dedicated to a certain topic.
Do not be afraid to write to the support chats or to the official mail in case of doubt.
Remember that the developers are doing this for you, so do not be afraid to contact the support services for help and advice!
Why is cybersecurity important? Read the article to find out more on this topic.