April 21, 2025
Trending News

FBI Shared 10 Safety Precautions To Follow To Protect You From Hackers

  • May 18, 2022
  • 0

With the widespread use of smartphones, computers and the Internet, our digital securityIt’s starting to get a little more important than ever. So much so that even though

FBI Shared 10 Safety Precautions To Follow To Protect You From Hackers

With the widespread use of smartphones, computers and the Internet, our digital securityIt’s starting to get a little more important than ever. So much so that even though we are in 2022, we could fall into very simple hacker traps. While this sometimes causes us to lose our account on a social media platform, sometimes we even lose our money. What about ensuring digital security and? protect against hackers what should I do?

FBIUS National Security Agency (NSA), the United States Agency for Cybersecurity and Infrastructure Security (CISA) and a group of cybersecurity experts from the United Kingdom, New Zealand, the Netherlands and Canada have prepared an advisory guide for casual users. This guide shows some things we can do to protect ourselves from hackers. If you want, without more to the folder Let’s take a closer look at that.

10 things to consider to be protected from hackers

What to do to ensure cybersecurity

  • Don’t forget multi-factor authentication
  • Permissions granted to apps and services should be checked
  • Do not use vendor-supplied default settings with outdated software
  • If possible, don’t use a VPN. Note the following if you:
  • The importance of strong and unique passwords
  • Cloud services are not as secure as expected
  • Beware of open ports and misconfiguration
  • Don’t fall victim to phishing
  • Provide endpoint security

Don’t forget multi-factor authentication

The first title in the guide prepared by the industry’s leading names, of multi-factor authentication systems usage. According to CISA statements, users who keep the security level low are the first target of hackers. So, if you want protection from hackers, use multi-factor authentication services. neglect you should not†

Permissions granted to apps and services should be checked

Sometimes we install applications on our smartphones, sometimes we use different web services. we give permissions† The manual that has been drawn up states that this is of great importance to guarantee cyber security. According to cybersecurity, application or service experts wrong or unnecessary Granting permissions can make it easier for hackers to infiltrate through these applications or services. That’s why you have to be careful.

Do not use vendor-supplied default settings with outdated software

Cybersecurity

According to cybersecurity experts and US officials, software used on a computer or smartphone always up to date needs. However, using standard usernames and passwords that vendors provide to customers also makes it easier for hackers to operate. offered for any network or service, according to the NSA. no default settings should be used†

If possible, don’t use a VPN. Note the following if you:

VPN services, which have become popular according to CISA statements, are sufficiently protected against unauthorized access. not sheltered† Therefore, it is better not to use VPN services. However, according to experts, there are a few things to do if using a VPN is required. The first is to use a VPN with multi-factor authentication. Another method is to use VPN as a the firewall to use with. According to experts, using VPN sparingly will help protect against hackers.

The importance of strong and unique passwords

Password protection

Cybersecurity experts also use it as one of the ways to protect themselves from hackers. use strong passwords they point. Moreover, a strong password alone is not enough. Setting one password for the internet world increases the risk, even if the password is strong. Therefore different passwords should be used in different media has been expressed.

Cloud services are not as secure as expected

Guide to research done by a company called Palo Alto Networks, on 99 percent of cloud services He argues that it is a very important problem. According to the research, permissions used in cloud services increase the chances of hackers breaking into devices.

Beware of open ports and misconfiguration

Sometimes for devices connecting to a network gate opening process we can. While this is usually exceptional, it is a must for some systems. Here is the latest report, stating that a lot of attention should be paid to this point. Because opening the wrong port for a device can help hackers. On the other hand, for all devices that connect to the Internet through a modem check your configurations has to be done†

Don’t fall victim to phishing

phishing attack

One of the simplest methods used by hackers is: phishing attacks† This attack method, which we mainly see in incoming emails, has hurt countless people so far. Cybersecurity experts say users should be wary of phishing. So how will this happen? It is in the simplest way possible to explain: marked as safe Be sure to check the url of the site. In incoming emails check the sender’s email address† If there is any problem at all, you can easily understand it.

Provide endpoint security

The last of the issues in the guide is about ensuring endpoint security, which is more of a concern for businesses. †Three points” means all devices on a network. All devices connected to the Internet, from POS devices to printers… Businesses should pay attention to this point and ensure the security of the endpoint. Otherwise, if a single device is exposed to a cyber attack , companies all devices for the work will be over.

Source: Web Tekno

Leave a Reply

Your email address will not be published. Required fields are marked *