Internet Security

New Internet Security Tips That You Should Know

Internet security tips you should follow to avoid more damage.

One of the things that we find most unsettling when a company such as JPMorgan Chase goes through a cyber attack is not the number of people that are affected. That is not to say that a hacking attack that affects millions of people is no big deal, but it is more alarming that it happened to a huge company such as JPMorgan, as well as a number of major banks and retailers, including Target, Kmart, Staples and Home Depot.

And if these big companies with entire IT departments and security experts on the payroll fail to thwart a hacking attack, what does this mean for the ordinary Internet user? Will you be able to protect yourself from hacking attacks and can you keep your information and online accounts safe?

You’re doomed. Or are you really?

The bad news is that using a strong password that is simply not easy to guess, making sure that your software is up to date, using some sort of data encryption, and backing up everything on your computer would not be enough. These steps would have worked ten to fifteen years ago, but because hacking attacks are becoming more and more sophisticated, these security tips are no longer enough to protect you.

But all is not lost. There are some things that you can add to the old security steps.

  1. One recourse is to use two-factor authentication. This process sends you a SMS message with a code that helps you verify that you are indeed the owner of the account. So a hacker might be able to get hold of your login credentials, but without that code that is sent to your mobile phone, they will still not be able to access your account. For some services, such as Facebook and Google, you would need to enter the code sent via SMS if you log on using a different computer or have a different IP address. Most banks and major Web sites have this option.
  1. You could also try to limit the damage if your account gets hacked into. For one, there is no sense in using the same password for all your online accounts. If a hacker gets into your iCloud, they could very well try to use those login credentials on other sites and services. Also, it might help to delete personal data and information from cloud services. That means no archived e-mails, no photos, and no documents should be stored online.
  1. On the other side of the fence, if you are trying to secure your system, then it makes sense to set up traps. Create accounts that you know is fake, ones that nobody uses and should not be used. If you get hacked into, one good way to know early on is when these accounts are used. Same thing with files; set up files that are meant to serve as traps. If somebody tries to download these files, then you can immediately detect an attack.

If you are concerned about Internet security or is currently rethinking ways of how to keep your online accounts secure, then be sure to contact Four Cornerstone. Our team of security experts can help you know the best technologies out there that can help you with fortifying your Internet security.

Photo by Blogtrepreneur.

Uncategorized

Performance Boost in MySQL 8.0.35…

Oracle has recently published interesting performance numbers that show MySQL 8.0.35 Enterprise Edition about 25%, or higher, faster than MySQL Community Edition.   A great...

Keep Reading

Uncategorized

Security Trends For 2024: SBOMs

A recent article on Forbes, linked below, lists five security trends that are likely to be important in 2024. Of course, AI-related security topics top...

Keep Reading

Uncategorized

Getting started with your first…

Anyone looking at writing their first Generative AI application should read this to save time. In June 2023, Google Cloud published a useful blog post,...

Keep Reading

Uncategorized

Read-Write and Read-Only query splitting…

Optimize the usage of the standby (secondary) read-only MySQL InnoDB Cluster servers by automatically and transparently distributing read-queries to them. A great feature in MySQL...

Keep Reading

Uncategorized

Considering Cloud Diversification?

Moving an enterprise to a Public Cloud can quickly feel like moving into a locked-in relationship with the Cloud vendor. One solution to diminish this...

Keep Reading

Uncategorized

Gartner: Global cloud consumption will…

Gartner forecasts that 2024 will see a 20% global cloud consumption increase from 2023 to $679B, while 2023 has seen an 18% increase from 2022...

Keep Reading

Uncategorized

ByteDance: Use AI for tuning…

ZDNet is reporting that a ByteDance (the maker of TikTok) Linux kernel developer has proposed to implement AI to tune the performance of Linux systems...

Keep Reading

AI Governance

What is AI TRiSM?

If reading now about AI TRiSM for the first time, it might be good read on and learn what it’s about because it leads the...

Keep Reading

Cloud Blog

4 Ways To Benefit from…

One of the benefits you get when you work with cloud applications is that you often have quarterly updates that are packed with features. This...

Keep Reading

Artificial Intelligence

Data and Analytics: Cross the…

  Artificial intelligence is a manna sent from digital heaven. That’s how blessed your business can get if you immerse into the AI of things....

Keep Reading

Live Chat | Emergency