How can you protect yourself from hackers?

For years, one could read about attacks of the hackers on enterprises. They were far away and have nevertheless caused plenty of problems. Today the appropriate methods of the hackers, scammers and criminals on the internet are more and more frequently targeted on simple users. They have interest in the data of the normal customers and users and utilize many methods, in order to gain access to the computer. It becomes all the more important with each day that one procures the right protection from these attacks.

For companies, the danger of hackers has already been pervasive for years. A quite new development is the emergence of targeted attacks on private accounts, accounts and e-mail information of private users. The most recent large scandal was even announced by the Federal Office for Security in Information Technology (BSI), and this was about a large theft of e-mail accounts and passwords. The hackers use the methods of the developments on the Internet, in order to obtain access to the most sensitive data of the private users. For the normal use of the Internet, it thus becomes more and more important, to deal with searching for the right software for protection, but also for the suitable methods for one’s own security.

1. Good and Complex Passwords

Way too often, simple passwords are still being used. Birthdays, simple combinations of numbers or classical sequences of numbers on the keyboard belong to normality in the digital everyday life. It is especially important at the present time, that one defends oneself with elaborate, protected passwords. The automatic creation with the assistance of programs can be good: It may be difficult to memorize such a password at the beginning. As time goes by, however, the tapping sequence becomes automatic, or one automates learns the new password by heart. This is one of the most important points, when we are discussing the protection of our own data on the Internet, and therefore no compromise should be made here. This of course includes also the fact that different passwords should be used for different sites.

2. Two Factors Authentication

In the today’s time, however, even the allegedly most secure passwords are not enough anymore, in order to sufficiently protect one’s own data. Each person has data on his mobile phone, PC or Tablet, which are not intended for third parties. This applies both in the private and in the business sphere. Therefore, many services offer the possibility of using a further safeguard apart from the password. A code on the mobile phone or, for example, a separate token. With the separate code, which is sent to the user on his own mobile phone, one must always take into account the fact that one’s own mobile phone is not sufficiently protected thereby. Because here is also the possibility for hackers of stealing the code and getting entrance to the allegedly protected network (be it private or professional). An additional hardware token, which is necessary for the Login, clearly offers more security in this sense already. An extra-developed hardware token functions without any further interface. Here one user, together with entering the user name and the password, only has to push one button on one’s hardware token, in order to identify himself and gain entrance to one’s personal network. No additional code must be entered and the used tokens also do not have to be attached to an appropriate terminal. This method protects particularly sensitive data such as bank accounts, PayPal or the main e-mail address. In addition, internal firm data of an enterprise can be extra-protected due to the external token. For hackers it is not possible to log in to the network in such a way because only someone who possesses a token and identifies himself through it receives access to the Network.

3. Remaining in the current situation

The biggest security loopholes for one’s own computer are still to be found in the programs. It is therefore more important, to ensure that the Browser, the programs and the operating systems are always provided with the latest updates. They shut the most dangerous loopholes and thus the back doors, which the hackers can use for themselves.

4. Investing in security

Someone who works much on the computer and uses many sensitive data and services should also invest in security. A good account of a serious e-mail service is just as important as well-engineered software in the field of anti-viruses. These protect not only against viruses and hackers, but in many cases, also against Phishing e-mails and other frauds on the Internet. Someone who pays a little more attention to one’s own security on the Internet does also not have to be afraid of hackers. Important is, above all, a careful handling of passwords, emails and other services on the company’s or on one’s own PC.

Bitte um den ersten Kommentar.

You must be logged in to post a comment.