HACKERS ALERT!!! *PREVENT YOUR ACCOUNT FROM GETTING HACKED* Some Important Steps You Must Follow( IMPORTANT FOR NEWBIES)
As we all know that internet is world wide network hence hackers are always in the search of damaging one's personal data
As our elders have always said that prevention is better than cure, and this is also the case in the field of protection and security, especially ever since we started relying on computers and phones in the bulk of our work, and therefore certainly the protection and the security is important. Unfortunately, most of the users ignore the use of even the most basic precautions for prevention From getting their accounts and their data being enrupt. My idea is to show you all a set of tips and guidelines to protect your account from getting hacked because you put so much effort in your work and it can't be just ignored how important that is
*- Use the HOTSPOT SHEILD/ VPN
As we all know, VPN is used as a means of securing and encrypting communications, which is very basic in a public place and connects to the Internet through an unreliable and unauthorized network. Where anyone can easily intercept all the data that passes through that network, and therefore always highly recommended to use the VPN when you are in a public place such as cafes, the airport, etc.
- Do not save your password in an unauthorized device
Usually when you create more than one account you may find it difficult to remember the password of each account on its own. Here some of us resort to using a single password like all of their accounts. But this is very dangerous, since any hacker can access all your accounts just by hacking and getting a password for one of your accounts.
NOTE
never use a single password for all accounts, the solution is to use one password management software. try different
*- Do not link your primary account with other accounts
Hacker is very happy when he finds you linked your account with each other, you have made his task much easier, as he can access any account he wants in a very simple way. Therefore, you should separate your personal and functional accounts on social networks and other sites and avoid linking them to each other.
*- Make an secondary e-mail for other purposes
In most sites you will need a login process, however, the biggest mistake we make is using the primary email to log into any site even though it is not trusted! You may receive fraudulent messages that may cause your account to be compromised, thereby hacking all associated services. Therefore, it is always preferable to use an alternate email that can be used for all other purposes.
*- Always type the proper URL intead of just clicking the options
There are many techniques and tricks that hackers use to fall into their trap. One of the most common examples is the sending of fake phishing links, similar to the official sites used by the victim, including bank sites, social networking sites and others. If you do not have security experience, you may not find these links to be a trick, so you should always type the URL instead of clicking it directly.
*- Do not disclose your personal information on social media
Among the methods used by hackers is to reset the password, they scan your files in the sites to find out important details about you or may be published without your knowledge, including phone number, place of increase and the date of your real birth ..etc. Many sites enable you to hide this information from the latter and you can easily set it up in the privacy settings page.
*- Always use incognito mode
it is very important , Sometimes we may need to use a computer other than our personal computer, either in an Internet cafe or school, etc., but the majority only closes the browser when it finishes browsing its account and wants to leave the place. And forgets that anyone can open the last used tabs. So be sure to log out on your accounts and clear cookies. Or use Incognito Mode, which is available in most browsers.
These were some of the most important points you should remember in order to save your account
i hope you will this post. Follow for more content @hassansteemit.
upvote aswell
Thank you.
Resteemed your article. This article was resteemed because you are part of the New Steemians project. You can learn more about it here: https://steemit.com/introduceyourself/@gaman/new-steemians-project-launch
This post received a 30.71% upvote from @morwhale team thanks to @jonesteemit! For more information, click here! . this is @originalworks . steem @steemprice BTC
$4303.01 USD/BTC
Volume: 45191.82 BTC ($194460801.89 USD)
Last Updated Sat Sep 30 11:24:34 2017
The @OriginalWorks bot has determined this post by @hassansteemit to be original material and upvoted it!
To call @OriginalWorks, simply reply to any post with @originalworks or !originalworks in your message!
To enter this post into the daily RESTEEM contest, upvote this comment! The user with the most upvotes on their @OriginalWorks comment will win!
For more information, Click Here!
Special thanks to @reggaemuffin for being a supporter! Vote him as a witness to help make Steemit a better place!
Thanks for all your hard work doing this @jonesteemit ! I know it takes a long time!
Thank You So Much ??
hello, @hassansteemit
Thank you for posting this. I just want to be the one in the class who speaks up to ask what others may be wondering but are too afraid to look stupid and ask. I'm not only a newbie to Steemit, I'm a relative newbie to everything in internet security. I find that all of the posts I've read so far make these statements about what not to do, but it doesn't explain what that actually IS. So, I can try to figure out how each point applies or doesn't apply to me, but there are so many variables to sort through, I never really feel confident that I'm heeding the wise advise or not. For instance, how do you, "use a VPN?" I don't know how.
How do you, "not link accounts together"? I don't even know how to figure out if my accounts are linked together. Can I assume, then, that they are not, because if I knew how to link them, I would know they are linked? I mean, are we talking about how Google asks to have access to this and that app and the user clicks, "yes?" Are we talking about my blog site being linked to auto post to my FB account? It's hard to implement security steps when I have a hard time evaluating which ones apply and where, and if I need to do anything or not.
I recommend that for each point, please include the "steps for complete idiot's guide" that says HOW to know if you are doing the bad security thing, and then all the step of HOW to stop doing the bad security thing. I hope I'm not the only one who is backward this way, and struggle to find the time to google every term I don't get and what the tip is talking about. I really appreciate the tips and the concerns that you share. I just want to be able to actually implement them!! Thank you so much!