Here is some tips:
Do use a combination of uppercase and lowercase letters and numbers.
Don't use "123456abc", the word "password123" or any of the other poor password examples shown above.
Do make sure your passwords are at least eight characters long. The more characters your passwords contain, the more difficult they are to guess.
Don't use a solitary word in any language. Hackers have dictionary-based tools to crack these types of passwords.
Do try to make your passwords as meaningless and random as possible.
Don't use a derivative of your name, the name of a family member or the name of a pet.
Do create different passwords for each account.
Don't ever write your passwords down and never give them out to anyone.
Do change your passwords regularly.
Update your software- Although sometimes annoying, these software updates often contain important security upgrades.
Don’t keep a list of logins/ passwords- You’d be surprised how many people carry around a list of passwords in their wallets or purses!
Install and use virus scanning software. Update this software at least once weekly. Consider a software that can detect and remove SpyWare and AdWare in addition to viruses and worms. You should scan your computer for "Malicious Software" (Malware) at least once per week.
Keep your computer locked and in a secure location. Know where your computer is at all times and don't leave it sitting out unattended in the library or other academic buildings. Investing in laptop locks or locking your desktop's case are both good ideas.
Switch to a more reliable web browser. More secure web browsers include Mozilla Firefox, Google Chrome, or Safari. Internet Explorer is NOT recommended. Many of the current security threats specifically target Internet Explorer.
Be careful of downloading and installing "free" software. These programs often also install malware on your computer without your knowledge. Even after the free program is removed, the malware often remains on your computer.
Beware of "phishing" expeditions. Do not respond to email messages requiring you to open a web site and provide personal information. "Phishing" scams often lead to Identity Theft.
Do not attempt to open or view email messages with attachments. These often contain malware and often even come from someone you know or trust.
Do not attempt to open or view unexpected files offered in your Instant Messaging program. These often contain malware and often also come from someone you know or trust.
Personal attacks. Hackers can try personal information such as your name, family member’s name, or pet’s name or your phone number or address.
Insider attacks. Someone at work, maybe a co-worker, a visitor, or cleaning staff, can see it attached to your monitor or next to your keyboard.
You give it to someone. Once you give it away, you don’t know what they’ll do. They may write it down next to their monitor.
Superb article, thanks for sharing.
ReplyDeleteBelow check out the platform for currencies to explore information on digital currencies.Meta Trader 5 Tool