In this digital age, where almost the entire human knowledge is stored online, some of the most valuable information you possess is your own identity. The term refers to information that enables an identity thief to impersonate their victim to access their bank account, to obtain and abuse a credit card in their victim’s name, or to tap into other resources.
Hackers have found many ways to come by this information, for example cracking email account passwords, introducing keyloggers that record every keystroke made on a computer, or intercepting the Internet traffic of their victim and recording the transmitted information. Likewise, there are a multitude of steps you can take to protect yourself and your personal information from these attacks.
Use Firewall
A firewall enacts the role of a security guard. There are of two types of firewalls: a software firewall and hardware firewall. Each serves similar, but different purposes. A firewall is the first step to provide security to the computer. It creates a barrier between the computer and any unauthorized program trying to come in through the Internet. If you are using a system at home, turn on the firewall permanently. It makes you aware if there are any unauthorized efforts to use your system.
Technical definition for Firewall
Windows OS comes with a basic firewall. There are several alternatives to the default Windows firewall, which offer more features for advanced users.
TOP 5 Firewall programs for Windows:
- Comodo Free Firewall
- ZoneAlarm Free Firewall 2017
- Tinywall
- Anti NetCut3
- PeerBlock
If you are using a Mac (OS X v10.6 and later), first you have to enable firewall. So follow this steps:
- Choose System Preferences from the Apple menu.
- Click Security or Security & Privacy.
- Click the Firewall tab.
- Unlock the pane by clicking the lock in the lower-left corner and enter the administrator username and password.
- Click “Turn On Firewall” or “Start” to enable the firewall.
- Click Advanced to customize the firewall configuration.
For older versions of Mac click here.
Third party firewall applications for Mac that I recomend:
- Little Snitch
- Private Eye
Secure Your Network
A person who has access to your network can intercept your network traffic and possibly gain access to sensitive data. Hence, it is imperative to change the default login information of your router and set a network password for your local WiFi.
Always remember: Your wireless router comes with a default password for its administration interface. The password is required to log into the device and configure countless critical settings. To avoid damage it’s essential to secure this area by replacing the default password with a strong password. The same applies to all devices you’re going to connect to your wireless network.
Install Anti-Spyware Software
Spyware is a software program that collects personal information or information about an organization without their approval. This information is redirected to a third party website. Spyware are designed in such a way that they are not easy to be removed. Anti-Spyware software is solely dedicated to combat spyware. Similar to antivirus software, anti-spyware software offers real time protection. It scans all the incoming information and helps in blocking the threat once detected. Comodo Free Antivirus comes with spyware protection built in.
Work With A Standard Or Limited User Account
Most people prefer to work with the Administrator account because it seems more convenient. You can easily install a program without having to switch users or run an installation file with Administrator rights. Well, guess how many hackers or malicious programs like that!
Windows Vista and Windows 7 have made the system more secure by requiring a confirmation or Administrator login information when programs attempt to make changes to the system. If you are still using Windows XP, however, be sure to make your default account a non-Admin account. You can still run processes as Administrator from within this account, provided you know the login information.
Also, do set a password for the default Administrator account. Often, the Administrator account has no password. This is another open door into your system, especially if someone had direct access to your computer, so you better lock it.
Use Strong Passwords & Change Them Often
The only thing you can do to protect online accounts, such as your webmail or online banking, is to choose strong passwords, a different one for each and every account, and then change your passwords often. This is hard, but for accounts that contain sensitive information, such as personal data or credit card numbers, it is incredibly important.
Encrypt Sensitive Data
When storing sensitive data on your hard drive or on an external storage device, encrypt it. This way it is hard to access, even if a hacker does gain access to your computer and manages to copy data. An excellent free open source tool to encrypt data is VeraCrypt.
Use Secure Connections For Sending Sensitive Data
The Internet is just too convenient not to be used. It’s fun and easy to sign up for new accounts, participate in contests, shop from your couch, and plan your vacation. Every time you use such a service, you reveal a bit of personal information: your name, address, personal interests, banking details, and when you will be away from home. This information is highly valuable!
To protect your personal information when using online services, be sure that data is exclusively submitted via an encrypted secure connections (SSL/TLS protocol). You are dealing with a secure connection when the URL in your browser starts with https:// instead of http://. Presently, you can set Facebook, Gmail and Twitter to constantly connect through HTTPS, which increases the security of exchanging information through these sites.
Keep Operating System & Software Updated
Most programs have bugs and the worst of them are security holes. To fix bugs, software developers provide patches and software updates. Updating your operating system, your drivers, and all installed software thus is not a question of accessing new features, it’s a matter of keeping your system safe and functional.
Wipe & Overwrite Storage Devices Before Discarding
Before you dispose of hardware that previously stored personal information, for example hard drives, USB flash drives, memory cards, or DVDs, either physically destroy the item or overwrite the entire drive. Deleting files or formatting a drive alone is not sufficient. Hackers will be able to restore the information. You must overwrite the storage space with random data.
TOP 5 hard disk cleaning and erasing tools: