Password is the basis for everything

First of all, don’t write passwords on sticky notes or stick them to your office monitor. This is a very bad idea. Now let’s move on to the tips.

1. Use a strong password

It is best to use generators for generating passwords. They will help you create a complex and reliable password, which can take years to crack using brute force (brute force).

Also try to use different passwords for different sites. If one service is hacked or leaked, then access to other services will not be affected.

2. Install a password manager for storage

If you followed the recommendations from the previous paragraph, then you should get a lot of complex and long passwords. It is simply impossible to remember and constantly keep in mind. Therefore, you need to use a password manager, such as KeePass, to store them.

Never store passwords in text files on your desktop, and even more so in online documents (Google, Yandex, VK and others). Even if a hacker gains access to your device, he will face the problem of how to get these passwords from the manager. If you don’t use a password manager, the cracker can easily access all of your services.

3. Use two-factor authentication wherever possible

If you do not use two-factor authentication, then, having received your password, an attacker will be able to access your account on a social network, mail, or any other web service.

In addition, services with the possibility of two-factor authentication (Google, Microsoft, Vkontakte and others) also provide backup confirmation codes that must be printed and stored in a safe place. It is better to take care of this in advance, as the loss of the device may also result in the loss of access to the account.

Windows won’t protect itself

We sorted out the passwords. Now let’s look at how to protect yourself and your Windows computer.

1. Use a licensed version of Windows

Pirated Windows repacks or illegal license activators often have malware embedded in them. Also, a licensed version of Windows is required to fully receive the latest system security updates.

2. Turn on automatic system update and update the software regularly

New vulnerabilities are constantly found in the OS, so updates are necessary. Mass infections by the WannaCry ransomware occurred precisely because the systems were not updated, although the necessary updates were released a couple of months before the attack.

3. Do not work under an administrator account

If you “pick up” the virus from under the administrator, then he will be able to instantly gain access to the entire system. We recommend enabling User Account Control at level 3 or higher (“always notify”)

If you are using a Microsoft account to log in, then you must definitely protect it with two-factor authentication.

4. Set up your screen lock

In Windows 10, you can additionally configure PIN sign-in. This is a faster and more secure way to authenticate.

5. Install and enable antivirus

You can use the built-in Windows Defender antivirus. It protects against most threats. There are free versions from Avast, Kaspersky and many others.

6. Turn on and configure the firewall

It is recommended to deny all incoming connections by default. It may break some programs. In this case, you need to fine-tune the firewall and add exclusion rules, but it is not recommended to completely disable the firewall.

Instead of the built-in Windows firewall, you can also use third-party solutions, for example from Avast or Kaspersky. They are usually paid, but more convenient to set up.

7. Download programs on the official sites

Do not download programs from “warez” sites and file hosting. No one guarantees that distributions downloaded from such resources will not contain malware. The rule also applies to torrent trackers.

8. Make backups

For example, you can configure automatic copying of data from one hard drive to another. This will protect the data in the event of media failure. It is even better to store a copy of the data on an external drive – this will also protect information from ransomware viruses. The main thing is that the backup media is not constantly connected to the system.

Protected your computer – protect your smartphone

Android smartphones are also susceptible to hacks. Now we will tell you how to secure them.

1. Turn on screen lock

Also note that the phone is automatically locked after a certain period of time.

2. Set passwords for applications

Try to protect as many programs as possible in this way.

3. Configure Find My Device function

In case you lost your smartphone, or it fell into the hands of intruders, you can use this service. To do this, you need to know the password for the Google account that you signed in to through your phone.

4. Install applications only from Google Play

Installing programs from unverified sources increases the chances of catching a virus. Also, always pay attention to the permissions the app requires during installation. If it’s an alarm clock, it doesn’t need permission to read or send your messages, it’s most likely a virus.

In recent versions of Android, you can enable or disable various permissions for installed apps.

5. Clean your apps’ photo and audio cache regularly

For example, Telegram saves all your audio messages, photos and other content in a separate folder on the device. If an intruder gains access to the device, he can find a lot of your data in such folders. Clearing the cache is disabled by default in Telegram for Android. But you can turn it on yourself and adjust the cleaning time convenient for you.

6. Encrypt your data on your phone

To do this, you need to go to “Settings” → “Security” → “Encrypt phone”. Additionally, you should enable the “Encrypt SD card” checkbox. It will also help you when you lose your device, or fall into the wrong hands. However, it is worth paying attention to the side effects: you will not be able to use the alarm when the phone is turned off, you will have to set a new screen lock password. You will also need to enter your password every time you restart your phone.

7. Monitor your Wi-Fi connections

Android smartphones by default try to join wireless networks to which you have connected at least once. It may well turn out that instead of the familiar open access point, it turns out to be a malicious point (Fake AP). There are also special programs and devices that allow you to find out the name of the points to which you connected earlier, and study your movement around the city, create Fake APs, and more. Therefore, you should avoid public Wi-Fi hotspots.

⌘⌘⌘

Share your own security life hacks in the comments. If you use a smartphone or computer with other operating systems – also write to us. We will definitely consider and talk about them in the following materials.