Skip to main content

Be careful!! 5 errors you make will break you easily second part



                                                  seconde part:

The first mistake: You do not use strong enough passwords.

Do not make your passwords as they are and do not update them from time to time as an example The password I used to protect you in 2016 is the same as in 2015 and 2014, and let you pass passwords like "123456." Do not use passwords in numbers only, but enter some symbols, big and small letters Make your password a combination of characters, numbers and symbols all this just to be relatively safe from your penetration
For example, a recent study by Primpt for Cybersecurity revealed that 35% of users of LinkedIn had used weak passwords, increasing the possibility of hacking their accounts. What elements should contain a strong password? Take note and note: • Minimum 12 characters. Remember the best protection codes better !!
   • Must include numbers, symbols, and uppercase letters.
   • Password must not be composed of letters or numbers such as ABCD or 1234.
   • It should not contain a clear alternative, for example: r0bber instead of robber.

On the Internet you can find many tools to help you analyze and evaluate the appropriate ideas for a strong password, a good example is the website www.passwordmeter.com. However, it is possible that creating hundreds of long passwords will cause you to collapse mentally. Do not worry because you will find a solution to it exactly at the next point.

The second error is that you do not use the password manager:

Security experts recommend using a different password for each account. In this way, if one of these accounts is captured, our other accounts will remain secure. However, in the current time, you may need to create between 20-50 different passwords. Fortunately, this process can be simplified with password managers that not only save passwords for us, but also add another layer of security. Password Manager is a program that creates, stores and organizes all passwords on your devices, social networks and applications. All you need to do is remember the main password of the program only. If you create a long and secure master password, as mentioned in the previous point, you must ensure that no one else can access any of your accounts. There are many password managers available , But one of the most secure and powerful is the Keeper Password Manager and features a military encoder system To protect your passwords, compatible with all major hardware and also has a self-destruct system, which deletes all records if you incorrectly enter a master password five times in a row.
You can download the program from its official site by clicking here.
https://keepersecurity.com/

Error 3: Do not use 2-step verification:

2-step verification is an additional layer of security that keeps your account safe, regardless of whether your password is too strong like "$ 8 & $ $ I 9" or "crap" like "123456."

This system is activated when you try to access your account from an unknown device. Since the system does not know whether a hacker, or an account owner using a different device than usual, it sends owner alerts by sending him a text message in his cell phone with a code. This code must be entered within a short period of time to access the account in question.
If the services you use like Google, Facebook ... provide 2-step verification, feel free to activate it. Well, it's a bit annoying but it's worth it.

Error 4: Not connected to a public Wi-Fi network:

Most Wi-Fi is dangerous and unsafe. Keep in mind that when you connect to a Wi-Fi network, you give the owner access to your personal identity and you may get an unpleasant surprise if you connect to any Wi-Fi point on the street without thinking about the consequences.

Does this mean you have to be suspicious of all public Wi-Fi? No luck, there are exceptions you can trust Wi-Fi in airports, cafes, restaurants and hotels ...

On the other hand, Norton has launched a series of tips to reduce your risk when connecting to public Wi-Fi: • If you are traveling, change your passwords before and after your trip.
     • Update programs and applications (that you have challenged).
     • Avoid logging into any online account that stores private information. Do not check your bank accounts over public Wi-Fi.
     • Make sure that the URL you're going to starts with HTTPS. S indicates that the data is encrypted.

The fifth error: is that you do not keep your program up-to-date:

Internet criminals are quick to find vulnerabilities in popular programs such as Windows or Chrome. To address this problem, developers are releasing updates at a rapid pace to fix these security breaches. What happens to those who are not updating their software? They become targets of Internet criminals for example the famous Anacry malware is a direct result of companies neglecting the update of their programs. It is important to update all operating systems especially Windows which has become weak protection, and the good news is that sometimes these updates prove on their own but sometimes This is not always the case with Windows and we already know that most users of iPhones are important to update Windows but it is also important to forget that the old update usually affects the performance of your computer if your computer is running slowly or your browser Y a great time in order to download the page thou forced last update what you need software work!

Comments

Popular posts from this blog

How to protect your files from loss on Windows without programs and easily!

There is no doubt that the worst thing you might encounter one day is the loss of your important files on the computer because of technical damage or a virus, a few days ago spread ransom virus or so-called "Wanna Cry" This latest encodes all your files on the computer and makes you unable To access them before paying a ransom amount. Because prevention is better than cure, this will protect you from losing your files at any moment and make you feel secure. This is about installing an external hard drive and programming your computer to store a copy of your files at any time specified by you. To do the following, follow these steps: After you connect the hard drive with your computer, go to Control Panel or Control Panel Then click on the File History option After clicking the desired option you will see the hard drive that you installed with the computer and if it does not appear, remove it and install it again, and click on Turn ON to activate the property. You can als...

Oppo F3 selfie expert

                                            OPPO F3 phone Introduction: Selfies, whether you’re fond of them or not, is one of the driving factors for device-makers to produce smartphones with good front cameras. OPPO is one of those brands that continue to heavily invest in the said feature and one of their latest offerings is the  OPPO F3 Oppo F3 key features: Body:  Aluminum unibody, Gorilla Glass 5, 153.3 x 75.2 x 7.3mm, 153g Screen:  5.5 inches, IPS LCD with 1080 x 1920 pixels resolution (401ppi) Chipset:  Mediatek MT6750T octa-core CPU (8x1.5 GHz Cortex-A53), Mali-T860MP2 Memory:  4GB of RAM plus 64GB of inbuilt storage; microSD slot (dedicated) Camera:  13MP, f/2.2, 1/3" sensor with phase detection autofocus and a single LED flash Selfie cam:  Dual, 16MP, f/2.0, 1/3" sensor size + 8 MP 120-degree, f/2.4 OS:  Colo...

Say goodbye to ransom viruses with this powerful program.

                                                                                             Folder Lock Our security is not something we can take for granted when we use computers. The ransom crisis that swept the world last month reminds us that the problem is still grim and that the threats we face are constantly evolving. We have the right to privacy but unfortunately, it is our duty to support this right. Our privacy will not protect itself. However, there is good news that deepens our mood as we seek to protect ourselves in this very modern world. There are multiple defense lines we can set up is just an antivirus program that will ensure that we do not become one of the growing number of Internet victims and soak prey to internet crim...