last posts

8 golden tips to keep your devices and data protected in 2023

Dear visitors to the (abouelmagd tech احمد ابو المجد 2) blog, we talked in a previous article about protecting Facebook from hacking. We mentioned 100% effective and safe ways to protect Facebook from hacking and get rid of it permanently. Today we will mention several golden tips to keep your devices and data protected.


Keep your devices and data protected
8 golden tips to keep your devices and data protected in 2023

The importance of the concept of cybersecurity is increasing in today's digital world which is crowded with daily activities that are carried out through the Internet on various devices, from games and entertainment activities to online shopping to banking services and electronic payment operations. Amid all these activities, attackers are constantly developing their methods of electronic attacks, They usually target computers and phones to infect them with malware and viruses to facilitate theft and control them remotely, either to steal the data on those devices to exploit them, or to encrypt the data to force the owner of the device to pay money (ransom) in exchange for restoring important files. The concept of cybersecurity includes all technologies, controls, and procedures that can be applied to protect the security of data, systems, networks, and digital devices, and reduce the risks of cyberattacks.


With the beginning of the new year 2023, the new types of computers, smartphones, and operating systems that have been launched on the market recently must have reached many of them the hands of users around the world, and with the use of these new devices come to the importance of data security rules and techniques, which must be adhered to. And to take care of it to avoid the infiltration of snoopers and electronic attackers and stealing our important data through it and exploiting it to serve their illegal and certainly unpopular interests. In this article, we offer a set of important tips and rules to maintain the safe use of devices.


Use unique and strong passwords and use a password manager


Using a strong and unique password for each device and each account or application that requires logins installed on these devices is a very important issue that should not be taken lightly using one password for all these accounts, applications, and all devices, as strong and different passwords for each account contribute to Sharpness in reducing the risk of exposure to blind force attacks, in which attackers resort to using algorithms that try to guess passwords for the user's different accounts based on the data extracted from the devices after being hacked, which may expose important data such as bank account data and financial transactions to theft.


To create strong passwords that take utmost care in data security, the generated password must meet special criteria such as containing a mixture of lowercase and uppercase English letters, numbers, and symbols to make it difficult for blind force software to guess it. Also, the chosen password should consist of an appropriate number of characters, as long passwords that fulfill the first condition make it difficult for blind force software to work and succeed in repelling this type of cyberattack very effectively.


Using a lot of passwords that are long and strong enough may not be a habit for most users due to the fear of not remembering the used passwords and thus losing access to accounts and devices, and it is certainly wrong to follow the method of writing passwords on a piece of paper and keeping it to avoid forgetting it, Perhaps the slip of paper will be lost or others will see it.


Here comes the importance of using the “Password Manager” program, where it is possible to use one password that is easy for the user to remember mainly with several additions, variations, extra characters, and changes that are made to obtain a different long password for each account separately, and the password manager remembers all the passwords Once the user types the master password, the password manager will show him the long list of passwords derived from it that the program stores, and therefore there is no need to worry about forgetting the long passwords with the use of the password manager program.


Enable two-factor authentication


Many apps and websites follow the two-factor authentication method of logging in to protect their users' accounts. The two-factor authentication method involves verifying the user's identity using two different logging methods before allowing him to access his account or personal data. The first method is usually by typing the user-created password, then writing a confirmation code that the site or application sends to the phone number or mail. The email associated with the account, and if the user fails to type any of the password or confirmation codes correctly, he is not allowed to log into the account.


Two-factor authentication is an additional means to confront cyber-attackers or snoopers if they succeed in one way or another in obtaining passwords for user accounts, which may allow them to access susceptible data such as financial transactions or bank accounts. Some banking applications allow the use of a two-factor authentication method that combines the use of passwords with a biometric authentication method such as a fingerprint, while social networking sites such as Facebook still use the two-factor authentication method based on passwords and confirmation codes sent to the phone.


Avoid clicking on untrusted links


Being careful not to click on links or download attachments sent from unreliable sources is one of the golden rules that should never be compromised, and it is an effective way to prevent phishing attacks, which is one of the most common types of cyber attacks, in which cyber attackers resort to Sending text messages or emails that include links or attachments with certain phrases to entice the user and push him to click on those links or download those attachments, which once they are clicked or downloaded to the device, a group of malicious software, viruses and spyware infiltrate through them to start installing themselves on the device Then the attacker can compromise the user's data.


Some of these attackers also use company names or impersonate trustworthy organizations to make it easier for their victims to be trapped by clicking on suspicious links and downloading attachments containing their malware. They send emails or texts from accounts and addresses that pretend to be Amazon, for example, or that look as if They were administrative messages from the Facebook company, so it is necessary to check any link before clicking on it and to make sure that it was sent from the email address or the original website of the company. The difference may be slight between the real website address and the fake address sent for phishing purposes as if the address contains " arnazon.com" instead of "amazon.com". You should also check before clicking on links and attachments sent by friends, and ask them whether they intended to send that or not.


LAN Security


Computers, phones, smart printers, surveillance cameras, and gaming devices in the same house can connect through a single Internet network via a router. If malicious software infiltrates one of the devices connected to the local network, it becomes easy for the cyber attacker to access the data of all other devices connected to the same local network. The rules for securing the local network are the following:


  • Change the Wi-Fi name that appears when viewing the list of nearby Wi-Fi networks.
  • Change the default password for the router when installing it, and replace it with a strong enough password.
  • Continuously update checking for firmware updates for the router, as these updates fix errors and remedy security vulnerabilities in the device's operating system as soon as they are discovered.
  • Using the latest security protocols available on the router, as older protocols usually use weaker data encryption, which facilitates hacking. Security protocols aim to encrypt the data sent over the network so that only the user's device and the Wi-Fi router can read the transmission data.
  • Disabling the UPnP feature and disabling the remote access feature if these two features are activated on the router.
  • Install a powerful antivirus and security software on the router if the device does not come with strong enough protection software.


All previous steps aim to provide a degree of security and privacy for data on devices linked together and connected to the Internet via a home local network. More protection can be given to these devices by connecting to the Internet using the Virtual Private Network.


Read also


Using a VPN


The use of a VPN is necessary in those cases where we have to connect to the Internet via a local wireless network or a public Wi-Fi network such as the Wi-Fi networks found in cafes, hotels, public libraries, and even in the streets of some cities, and through which the Internet connection is not sufficiently secure This allows third parties to view the data of the user's activity history, as well as access to the data that he sends to any party while using the public network, especially if he does not use the "HTTPS" secure protocol that encrypts the data transmitted through network servers to ensure its protection.


In this case, the virtual private network provides a degree of protection for sent and received data and user activity history data while using the Internet from the public Wi-Fi network, because it encrypts that data and sends it to remote servers to be redirected, which prevents access to the Internet service provider or other users of the same network. Wi-Fi to this data.


Continuous update of applications and software on devices


Hackers and cyber attackers are constantly developing their tricks, taking advantage of some security vulnerabilities that sometimes exist in applications, programs, and operating systems such as Windows, Mac, Android, and iOS, and the companies that develop these programs are usually keen to discover and fix security vulnerabilities as soon as possible, so it is important to make sure to update Applications and programs installed on devices, as the role of these updates is not limited to providing new features to the user, but as we mentioned, they are useful for protecting data and filling security gaps through which attackers can infiltrate devices. And to do this on the computer, there are completely free programs that help you update all your installed programs to the latest version easily, as well as on smartphones, applications can be updated through the main store, whether the App Store or Play Store.


Use apps that allow a high degree of privacy


Care should also be taken to use applications and programs that allow their users to have a high degree of privacy of data and personal information, and to stop using programs, applications, and games that allow advertisers to access the data and personal information of users. Examples of those sites and applications that provide an acceptable degree of privacy for their users are search engines such as DuckDuckGo. Startpage, web browsers like Firefox and Brave, messaging apps like Signal instead of WhatsApp, or ProtonMail email service instead of Gmail... and so on.


Avoid Rooting or Jailbreaking Your Smartphone


Some smartphone users resort to breaking the rules of the operating system by performing a process called "root" in the case of Android phones or "jailbreak" in iPhone phones. As this process allows access to some additional features that are restricted by operating systems, especially a closed system such as iOS, so jailbreaking will allow iPhone users to install applications that are not available on the Apple Store from external sources, and the ability to modify the system interface further, and so on.


Jailbreaking is a risky procedure, as while the Apple Store checks all applications and programs and makes sure that they are safe for users before making them available for download through it, the external sources used to download applications when jailbreaking do not set any standards that maintain the security of user data and personal information, which allows hackers And cyber attackers exploit these applications to infiltrate devices. Jailbreaking also makes devices unstable when turned on.


It is useful to take into account all the previous rules when using computers or smartphones to maintain data security and avoid the risks of cyber-attacks, but the most important rule remains to be careful not to keep important data and highly sensitive personal information on the phone or computer, as the danger does not come from attackers and hackers It may even fall into the hands of any bag thief, in which case being careful not to keep something important on the phone is very useful.


Abstract | Users of computers and smartphones face the risks of exposure to cyberattacks aimed at illegal access and exploitation of their data, using some tricks that enable them to hack users' devices, control them remotely, and install malware and spyware on them. Although the attackers' tricks are constantly evolving, there are a set of rules and practices that are still highly successful in reducing exposure to the risks of cyberattacks, the most important of which are the following:


  1. Create strong passwords for each account and each device that the user owns individually, with the help of a password manager program to avoid forgetting passwords.
  2. Using two-factor authentication methods to log into accounts of applications and sites that allow this.
  3. Ensure that the private local network is secured and protected from intruders by setting a strong password for the router, updating its firmware continuously, and installing strong anti-virus and protection programs on the router.
  4. Use the Virtual Private Network (VPN) when connecting to the Internet through a public Wi-Fi network.
  5. Continuously update applications and programs installed on devices to obtain security updates.
  6. Using applications, programs, and websites that provide their users with a high degree of privacy for their data and information.
  7. Do not click on links and attachments sent from unreliable sources or sent by friends before verifying them.
  8. Do not keep important personal data and information on computers or mobile phones as much as possible.
  9. Do not "root" or "jailbreak" your Android phone or iPhone.

احمد ابو المجد
By : احمد ابو المجد
Ahmed Abu Al-Majd is an Egyptian blogger. I work on the blog "abouelmagd tech | احمد ابو المجد 2" which is a technical blog whose most important priority is to provide a group of exclusive explanations related to computers, technology, and information. This includes detailed explanations of each domain and also includes creating and explaining topics in the Windows and Android domains. The blog was created in late 2019 and its purpose is to provide everything new in the field of computers, technology, and information. facebook ــــ twitter ــــ linkedin ــــ pinterest ــــ instagram ــــ visit site abouelmagd tech | احمد ابو المجد 2
Comments



Font Size
+
16
-
lines height
+
2
-