{"id":21357,"date":"2021-07-07T14:56:03","date_gmt":"2021-07-07T09:26:03","guid":{"rendered":"https:\/\/valeurbit.com\/blog\/?p=21357"},"modified":"2021-07-07T14:56:05","modified_gmt":"2021-07-07T09:26:05","slug":"how-to-protect-your-computer-and-smartphone-from-hacking","status":"publish","type":"post","link":"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/","title":{"rendered":"How to protect your computer and smartphone from hacking"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"0\"><strong>Password is the basis for everything<\/strong><\/h2>\n\n\n\n<p>First of all, don&#8217;t write passwords on sticky notes or stick them to your office monitor.&nbsp;This is a very bad idea.&nbsp;Now let&#8217;s move on to the tips.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Use a strong password<\/strong><\/h3>\n\n\n\n<p>It is best to use generators for generating passwords.&nbsp;They will help you create a complex and reliable password, which can take years to crack using brute force (brute force).<\/p>\n\n\n\n<p>Also try to use different passwords for different sites.&nbsp;If one service is hacked or leaked, then access to other services will not be affected.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Install a password manager for storage<\/strong><\/h3>\n\n\n\n<p>If you followed the recommendations from the previous paragraph, then you should get a lot of complex and long passwords.&nbsp;It is simply impossible to remember and constantly keep in mind.&nbsp;Therefore, you need to use a password manager, such as KeePass, to store them.<\/p>\n\n\n\n<p>Never store passwords in text files on your desktop, and even more so in online documents (Google, Yandex, VK and others).&nbsp;Even if a hacker gains access to your device, he will face the problem of how to get these passwords from the manager.&nbsp;If you don&#8217;t use a password manager, the cracker can easily access all of your services.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Use two-factor authentication wherever possible<\/strong><\/h3>\n\n\n\n<p>If you do not use two-factor authentication, then, having received your password, an attacker will be able to access your account on a social network, mail, or any other web service.<\/p>\n\n\n\n<p>In addition, services with the possibility of two-factor authentication (Google, Microsoft, Vkontakte and others) also provide backup confirmation codes that must be printed and stored in a safe place.&nbsp;It is better to take care of this in advance, as the loss of the device may also result in the loss of access to the account.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"1\"><strong>Windows won&#8217;t protect itself<\/strong><\/h2>\n\n\n\n<p>We sorted out the passwords.&nbsp;Now let&#8217;s look at how to protect yourself and your Windows computer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Use a licensed version of Windows<\/strong><\/h3>\n\n\n\n<p>Pirated Windows repacks or illegal license activators often have malware embedded in them.&nbsp;Also, a licensed version of Windows is required to fully receive the latest system security updates.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Turn on automatic system update and update the software regularly<\/strong><\/h3>\n\n\n\n<p>New vulnerabilities are constantly found in the OS, so updates are necessary.&nbsp;Mass infections by the WannaCry ransomware occurred precisely because the systems were not updated, although the necessary updates were released a couple of months before the attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Do not work under an administrator account<\/strong><\/h3>\n\n\n\n<p>If you &#8220;pick up&#8221; the virus from under the administrator, then he will be able to instantly gain access to the entire system.\u00a0We recommend enabling User Account Control at level 3 or higher (\u201calways notify\u201d)<\/p>\n\n\n\n<p>If you are using a Microsoft account to log in, then you must definitely protect it with two-factor authentication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Set up your screen lock<\/strong><\/h3>\n\n\n\n<p>In Windows 10, you can additionally configure PIN sign-in.&nbsp;This is a faster and more secure way to authenticate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Install and enable antivirus<\/strong><\/h3>\n\n\n\n<p>You can use the built-in Windows Defender antivirus.\u00a0It protects against most threats.\u00a0There are free versions from Avast, Kaspersky and many others.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Turn on and configure the firewall<\/strong><\/h3>\n\n\n\n<p>It is recommended to deny all incoming connections by default.\u00a0It may break some programs.\u00a0In this case, you need to fine-tune the firewall and add exclusion rules, but it is not recommended to completely disable the firewall.<\/p>\n\n\n\n<p>Instead of the built-in Windows firewall, you can also use third-party solutions, for example from Avast or Kaspersky.&nbsp;They are usually paid, but more convenient to set up.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>7. Download programs on the official sites<\/strong><\/h3>\n\n\n\n<p>Do not download programs from &#8220;warez&#8221; sites and file hosting.&nbsp;No one guarantees that distributions downloaded from such resources will not contain malware.&nbsp;The rule also applies to torrent trackers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>8. Make backups<\/strong><\/h3>\n\n\n\n<p>For example, you can configure automatic copying of data from one hard drive to another.&nbsp;This will protect the data in the event of media failure.&nbsp;It is even better to store a copy of the data on an external drive &#8211; this will also protect information from ransomware viruses.&nbsp;The main thing is that the backup media is not constantly connected to the system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2\"><strong>Protected your computer &#8211; protect your smartphone<\/strong><\/h2>\n\n\n\n<p>Android smartphones are also susceptible to hacks.&nbsp;Now we will tell you how to secure them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Turn on screen lock<\/strong><\/h3>\n\n\n\n<p>Also note that the phone is automatically locked after a certain period of time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Set passwords for applications<\/strong><\/h3>\n\n\n\n<p>Try to protect as many programs as possible in this way.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Configure Find My Device function<\/strong><\/h3>\n\n\n\n<p>In case you lost your smartphone, or it fell into the hands of intruders, you can use this service.&nbsp;To do this, you need to know the password for the Google account that you signed in to through your phone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Install applications only from Google Play<\/strong><\/h3>\n\n\n\n<p>Installing programs from unverified sources increases the chances of catching a virus.&nbsp;Also, always pay attention to the permissions the app requires during installation.&nbsp;If it&#8217;s an alarm clock, it doesn&#8217;t need permission to read or send your messages, it&#8217;s most likely a virus.<\/p>\n\n\n\n<p>In recent versions of Android, you can enable or disable various permissions for installed apps.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Clean your apps&#8217; photo and audio cache regularly<\/strong><\/h3>\n\n\n\n<p>For example, Telegram saves all your audio messages, photos and other content in a separate folder on the device.\u00a0If an intruder gains access to the device, he can find a lot of your data in such folders.\u00a0Clearing the cache is disabled by default in Telegram for Android.\u00a0But you can turn it on yourself and adjust the cleaning time convenient for you.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Encrypt your data on your phone<\/strong><\/h3>\n\n\n\n<p>To do this, you need to go to &#8220;Settings&#8221; \u2192 &#8220;Security&#8221; \u2192 &#8220;Encrypt phone&#8221;.\u00a0Additionally, you should enable the &#8220;Encrypt SD card&#8221; checkbox.\u00a0It will also help you when you lose your device, or fall into the wrong hands.\u00a0However, it is worth paying attention to the side effects: you will not be able to use the alarm when the phone is turned off, you will have to set a new screen lock password.\u00a0You will also need to enter your password every time you restart your phone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>7. Monitor your Wi-Fi connections<\/strong><\/h3>\n\n\n\n<p>Android smartphones by default try to join wireless networks to which you have connected at least once.&nbsp;It may well turn out that instead of the familiar open access point, it turns out to be a malicious point (Fake AP).&nbsp;There are also special programs and devices that allow you to find out the name of the points to which you connected earlier, and study your movement around the city, create Fake APs, and more.&nbsp;Therefore, you should avoid public Wi-Fi hotspots.<\/p>\n\n\n\n<p>\u2318\u2318\u2318<\/p>\n\n\n\n<p>Share your own security life hacks in the comments.&nbsp;If you use a smartphone or computer with other operating systems &#8211; also write to us.&nbsp;We will definitely consider and talk about them in the following materials.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Password is the basis for everything First of all, don&#8217;t write passwords on sticky notes or stick them to your office monitor.&nbsp;This is a very bad idea.&nbsp;Now let&#8217;s move on to the tips. 1. Use a strong password It is best to use generators for generating passwords.&nbsp;They will help you create a complex and reliable&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to protect your computer and smartphone from hacking | ValeurBit Infosec<\/title>\n<meta name=\"description\" content=\"Here you can learn how to protect your computer and smartphone from hacking, password is the basis for everything.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your computer and smartphone from hacking | ValeurBit Infosec\" \/>\n<meta property=\"og:description\" content=\"Here you can learn how to protect your computer and smartphone from hacking, password is the basis for everything.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"ValeurBit Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/valeurbitinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-07T09:26:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T09:26:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:site\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\",\"name\":\"Valeurbit Infosec\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/valeurbitinfo\/\",\"https:\/\/www.instagram.com\/valeurbit\",\"https:\/\/www.linkedin.com\/company\/valeurbit-infosec\/\",\"https:\/\/twitter.com\/valeurbit\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"contentUrl\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"width\":1080,\"height\":512,\"caption\":\"Valeurbit Infosec\"},\"image\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"name\":\"ValeurBit Infosec\",\"description\":\"Cyber Security Company\",\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/valeurbit.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/#webpage\",\"url\":\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/\",\"name\":\"How to protect your computer and smartphone from hacking | ValeurBit Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\"},\"datePublished\":\"2021-07-07T09:26:03+00:00\",\"dateModified\":\"2021-07-07T09:26:05+00:00\",\"description\":\"Here you can learn how to protect your computer and smartphone from hacking, password is the basis for everything.\",\"breadcrumb\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/valeurbit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your computer and smartphone from hacking\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/#webpage\"},\"author\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\"},\"headline\":\"How to protect your computer and smartphone from hacking\",\"datePublished\":\"2021-07-07T09:26:03+00:00\",\"dateModified\":\"2021-07-07T09:26:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/how-to-protect-your-computer-and-smartphone-from-hacking\/#webpage\"},\"wordCount\":1178,\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"articleSection\":[\"Valeurbit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\",\"name\":\"ValeurBit\",\"sameAs\":[\"https:\/\/valeurbit.com\/blog\"],\"url\":\"https:\/\/valeurbit.com\/blog\/author\/valeurbit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21357"}],"collection":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/comments?post=21357"}],"version-history":[{"count":1,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21357\/revisions"}],"predecessor-version":[{"id":21358,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21357\/revisions\/21358"}],"wp:attachment":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/media?parent=21357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/categories?post=21357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/tags?post=21357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}