- April 24, 2017
- Posted by: admin
- Category: Tips & Tricks
Storing your data in the cloud is convenient as it gives you access to it on multiple devices anywhere, anytime, thus making life easier for you. However, you need to understand that wherever you store your data, you are not guaranteed of 100% safety all the time as there’s no such thing as perfect security.
Fortunately, there are some things you can do to ensure that your data is protected.
●Hide Your Birthdate
Hackers are interested in your private details to see how can they penetrate into your account, and one thing that they can use is your birthdate. Do not show it in your bio section on any social media sites, online forums or websites. By keeping your personal information private, you can make it less likely for a hacker to get to know you more through search engines.
Your very first line of defence against hackers is your password. That is why you need to create a strong one so it can’t be easily cracked. It should be at least eight characters; you can even make it 15 or more for even more password strength.
Although you want to make sure that you won’t forget your password, you should also remember not to make it simple like using your first name, family name or even company name. These are details about you that are easily crackable.
It is also better if you can use a combination of numbers, uppercase and lowercase letters as well as symbols. Another important thing that you need to do is to regularly update your passwords to give no room for hackers to crack it.
●Don’t Allow Automatic Upload of Media
You need to update the settings of your cloud storage accounts if you don’t want your photos or videos to be automatically uploaded. This is the best way to ensure that no one can hack them.
If you’re an iPhone user, you can prevent photos from automatically uploading from your iPhone or iPod to your iCloud account, by going to Settings > iCloud > Photo Stream, and turn off My Photo Stream.
If you’re an Android user, you can prevent automatic uploading by checking any auto-backup settings on individual apps. Apps that upload media automatically to the cloud include Facebook, Twitter, and Dropbox. Check the settings menu of your apps, then disable any photo-syncing that you’re not comfortable with.
●Keep Your Password Secure
Your passwords are only for your consumption so keep them only to yourself. Store them in an area that is only visible to you to make sure that nobody else can see or use them. It is ideal to just memorise them, but if it’s impossible for you to do it, you can just write them in your notebook and keep it safe.
You can also add an extra layer of security to your password by activating two-factor authorisation (also known as 2FA). This makes it harder for hackers to crack your password. If you don’t activate your 2FA, it will be very easy for hackers to attack you as they only need your username and password to access your data.
Several cloud-based services, such as Dropbox and Office 365, offer 2FA by sending you a code via text or phone call that you need to access your account. It’s an extra step, but once you’ve set it up on all of your devices, you are good to go.
It is a fact that many people today make use of public wifi to continue tasks while on their way to the workplace or when they’re on a trip. If you happen to do this often, you need to be extra careful when using Public Wi-Fi because the data that transfers over such network aren’t encrypted, making it much easier for hackers to take advantage of these public networks to tap into tablets and smartphones.
These digital thieves can then entice internet users with the offer of free Internet, and then have access to all kinds of private data. They can be as far as 100 feet away from their victims. Take this fact seriously as to avoid falling into the trap of expert hackers.
To ensure that you are accessing a legit Wi-Fi connection, try using these strategies when connecting to public Wi-Fi:
○Bear in mind that not all public areas offer free Wi-Fi, so you need to verify the official name of the network with the place offering it. After having verified the authenticity of that Wi-Fi connection, it is only then that you should activate the Wi-Fi feature of your device.
○You should use your company’s Virtual Private Network (VPN) network if it is available when reviewing work files. The VPN encrypts all your data during your session and hides the identity of the servers to which you are connected, thus making you safe from hackers.
○Another reminder is you should keep your device’s operating system up to date for it to be safe all the time.
To ensure the safety of all your data, you need to have an offline backup for your media. This can save you from trouble in cases when your phone is lost, stolen or severely damaged. This is also the best way to maintain your peace of mind when somebody hacks into your cloud account and deletes all your data!
Good thing that most smartphones offer a way to backup your device’s media that is not cloud-based and can be stored in your personal computer.
If you feel that some details need to be kept only to yourself, then delete them so they won’t be seen by others. These can include those personal pictures, videos, financial or tax documents, etc. This way, you can keep others’ hands away from your data.
●Be Wary of Fake Messages
You need to always remember that cloud-based storage services are prone to virus infections and to hacker attacks, so you need to be careful when you receive phishing emails. They can look like real messages from developers or service providers, but the fact is they are tricks from hackers who want to get into your profile. They try to lure you into providing your personal information. Here are some of the red flags that you need to be aware of:
○The spelling of the sender’s name can be unusual and the hyperlinked URLs have misleading domain names. It is also very likely that the message has several misspellings or typos.
○You will be asked to submit your password or personal information like your mailing address, phone number or social security number via email. These emails include a form in Word or PDF format that you need to fill out.
○The worst thing here is, you will be asked for money to cover the expenses.
If you see any of these red flags, delete the email immediately.
While doing all these reminders can help you, your employees and your company do away with scary hackers, it will be much better if you have a team of professionals like IT consulting companies who can have your back when the worst happens. One name that you can check out is Infinite IT. We are here to help you and your business in keeping all your data in the cloud safe. For more information on how we can assist you, visit our website http://www.8it.com.au/.