• Home
  • Cybersecurity Monitoring
  • Remote Cleanup
  • Services
  • About
  • Tips and Tricks
  • Tech News & Updates
  • Contact Us
  • Review Us
  • Home
  • Cybersecurity Monitoring
  • Remote Cleanup
  • Services
  • About
  • Tips and Tricks
  • Tech News & Updates
  • Contact Us
  • Review Us
  Live - LDC Tech Support
  • Home
  • Cybersecurity Monitoring
  • Remote Cleanup
  • Services
  • About
  • Tips and Tricks
  • Tech News & Updates
  • Contact Us
  • Review Us

Tips & Tricks

    Author

    Lori Clifton;
    Seasoned IT Professional that loves sharing ways to make technology easier to use and understand.

    Archives

    October 2016
    August 2016

    Categories

    All

    RSS Feed

Back to Blog

How to prevent Identity Theft and Hacking

10/18/2016

 
Picture
The holiday season is prime for scammers and hackers out there. Here are some tips to help you prevent that from happening to you.

  1. Use A Firewall
    Hackers who do not have direct access to your computer can get into your system through your Internet connection. One way to get in is via an open network port. A firewall controls all traffic that passes through your network ports, whether it’s coming in or going out. The software acts like a gatekeeper and allows you to decide which programs get to send and receive information.
  2. Secure Your Network
    A person who has access to your network can intercept your network traffic and possibly gain access to sensitive data. Hence, it is imperative to change the default login information of your router and set a network password for your local WiFi.
  3. Use Anti-Malware Software
    Possibly the easiest way for a hacker to sneak into your system is by using malicious software installations authorized or performed by the naive user. In some cases, the user doesn’t even need to authorize anything, as the spyware auto-runs and installs itself  as soon as the user opens a file or allows a script to run off a website. Anti-malware software can protect your data by detecting malicious activity on your computer and preventing an infection. 
  4. Work With A Standard Or Limited User Account
    Most people prefer to work with the Administrator account because it seems more convenient. You can easily install a program without having to switch users or run an installation file with Administrator rights. Well, guess how many hackers or malicious programs like that
  5. Use Strong Passwords & Change Them Often
    The only thing you can do to protect online accounts, such as your webmail or online banking, is to choose strong passwords, a different one for each and every account, and then change your passwords often. This is hard, but for accounts that contain sensitive information, such as personal data or credit card numbers, it is incredibly important.
  6. Encrypt Sensitive Data
    When storing sensitive data on your hard drive or on an external storage device, encrypt it. This way it is hard to access, even if a hacker does gain access to your computer and manages to copy data. An excellent free open source tool to encrypt data is TrueCrypt.
  7.  Use Secure Connections For Sending Sensitive Data
    The Internet is just too convenient not to be used. It’s fun and easy to sign up for new accounts, participate in contests, shop from your couch, and plan your vacation. Every time you use such a service, you reveal a bit of personal information: your name, address, personal interests, banking details, and when you will be away from home.  This information is highly valuable!
    To protect your personal information when using online services, be sure that data is exclusively submitted via an encrypted secure connections (SSL/TLS protocol). You are dealing with a secure connection when the URL in your browser starts with https:// instead of http://. Presently, you can set Facebook, Gmail and Twitter to constantly connect through HTTPS, which increases the security of exchanging information through these sites.
  8. Keep Operating System & Software Updated
    Most programs have bugs and the worst of them are security holes. To fix bugs, software developers provide patches and software updates. Updating your operating system, your drivers, and all installed software thus is not a question of accessing new features, it’s a matter of keeping your system safe and functional.
  9. Wipe & Overwrite Storage Devices Before Discarding
    Before you dispose of hardware that previously stored personal information, for example hard drives, USB flash drives, memory cards, or DVDs, either physically destroy the item or overwrite the entire drive. Deleting files or formatting a drive alone is not sufficient. Hackers will be able to restore the information. You must overwrite the storage space with random data.
  10. Don't allow unsolicited callers to connect to your computer.
    There has been a rise in fake calls from companies stating that your computer is infected and they need to connect to it to resolve the issue for you. They have no way of knowing that legally. If they start giving you information that is on your computer or giving your your user names and passwords, that means they are the hackers and you need to get their information and tell them that you will have your IT person run scans and contact them. Call us immediately if this happens to you. 
 
Call LDC Tech Support for assistance.
713-444-1452
0 Comments
Read More



Leave a Reply.

Contact Us to  Assist you with your Tech Support needs!


Hours

M-Fri: 9am - 6pm

Telephone

(713) 444-1452

Email

[email protected]