PaulSpoerry.com

Social Media, technology, and geeky stuff for your brain.

  • Home
  • About
    • Privacy Policy
  • Categories
    • Google+ Posts
    • Site news
    • Tech
      • Android
      • Apple
      • Chrome
      • Gadgets
      • Hacking
      • Linux
      • OSX
      • Privacy
      • Web Life
        • Bittorrent
        • Facebook
        • FireFox
        • GMail
        • Google
        • Google+
        • Twitter
        • WordPress
        • Windows
          • Windows 7
    • Google+: Getting Started Guides
    • Games
    • Meditation
    • Politics
    • Science
    • That’s freakin hilarious
  • Code
    • FreeImageZoom
    • Post Editor for Google+™
    • The Plus Editor
  • Contact
You are here: Home / GuestPost / Hacked! Protect Your Password From Predators

Hacked! Protect Your Password From Predators

April 17, 2013 by Paul Spoerry Leave a Comment

Guest post by Jennifer Morris

In this digital age when everything from banking accounts to photo albums are online, people are left wondering just how safe the Internet age is. While the risks are real, staying protected is possible. Being aware and taking the right measures can help you avoid being a target. Jennifer Morris tells you how.

log in

Why Passwords are Stolen

Mainly to obtain profit, but also as a way to gain leverage and embarrass or expose a person or company, passwords are stolen for several reasons. It’s easy to think “Oh, I don’t have anything worth stealing” but that’s where you are wrong. Even if someone hacking your social media account isn’t at the top of your worry list, someone stealing your personal information and identity or implanting viruses on your computer and sending them to others should be. Hackers target large corporations, rich CEOs and average Joe Blows and Jane Does.

How it is Done

Passwords are stolen in several ways. According to an infographic on preventing hacking, common security breaches happen through guessing, phishing, shoulder surfing and computer programs that track keystrokes or use a database of passwords to hack accounts. Guessing is a common hacking tool, as most people create passwords using personal information that is easy to remember, such as birthdays, anniversaries and names. Tricking users into providing information through legitimate-seeming emails and prompts is another common way. Hackers also roam Internet cafes and libraries and watch users type personal information into websites.

Don’t Be a Target

While there are risks when using the Internet and social media, there are many ways to stay protected. Don’t ever click on links that seem suspicious, are from people you don’t know or are unorganized and hard to understand. If someone you know sent you a link without an explanation, contact the person and ask them if the link is legitimate. When creating passwords, don’t use personal information or easy-to-remember terms that can be easily guessed by a hacker. Also, avoid using the same password on several sites. This way, if one of your passwords is stolen hackers won’t be able to break into every one of your accounts. Monitor your accounts online closely. Identity theft companies such as Lifelock can help users stay protected by monitoring accounts and alerting them if something seems suspicious.

Clean Up Your Accounts

Linking your accounts together is a great tool to stay connected and many common apps have access to your Facebook, Twitter and LinkedIn accounts for this reason. Every once in a while, though, you’ll want to clean up your accounts and make sure you are only allowing apps you use to have access to your accounts. Eliminating unused apps helps you stay protected from unnecessary security breaches. Do this by logging into your social networking accounts and through the settings tab, un-authorize applications that are no longer in use. LinkedIn makes this easy, by allowing users to check off apps they want removed. Twitter and Facebook also have this feature, but revoking access to apps must be done one by one.

Password Fails

In late October, SplashData.com released its annual “25 Worst Passwords of the Year” list, using notable password breaches from Yahoo!, LinkedIn, eHarmony and others. Just in time for Halloween, the results were scary. At the top of the list were “password,” “123456? and “abc123.” These frequently used passwords put people at risk of being hacked and haven their information or identity stolen.

“…Those who have been through it can tell you how terrifying it is to have your identity stolen because of a hacked password,” said Morgan Slain, SplashData CEO, on the company’s site. “We’re hoping that with more publicity about how risky it is to use weak passwords, more people will start taking simple steps to protect themselves by using stronger passwords and using different passwords for different websites.”

Jennifer is an ardent follower of cloud solution trends and database security improvement. She shares tips and advice with her readers on several business-related sites.

Paul’s Recommendations

I always recommend LastPass as it simplifies keeping your passwords random, different for each site, and yet always available and simple to use. LastPass Sentry even monitors your accounts for security breaches for free! In addition to LastPass you should use Google Authenticator and use two-step authentication. You should use it because 2-step verification can significantly reduce the chances of having the personal information in your Google account stolen by someone else.

Filed Under: GuestPost, Hacking, Privacy Tagged With: google, is, to, use, www.paulspoerry.com

About Paul Spoerry

I’m a groovy cat who’s into technology, Eastern Thought, and house music. I’m a proud and dedicated father to the coolest little guy on the planet (seriously, I'm NOT biased). I’m fascinated by ninjas, the Internet, and anybody who can balance objects on their nose for long periods of time.

I have a utility belt full of programming languages and a database of all my knowledge on databases... I practice code fu. Oh, I've also done actual Kung Fu, and have a black belt in Tae Kwon Do.

I run. I meditate. I dance. I blog at PaulSpoerry.com, tweet @PaulSpoerry, and I'm here on Google+.

I'm currently work for IBM developing web enabled insurance applications for IBM and support and develop a non-profit called The LittleBigFund.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Copyright © 2023 · Epik on Genesis Framework · WordPress · Log in