ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Stay Safe from Hacking

Updated on December 28, 2014

You may think that your usernames and passwords are safe, but hackers have ways of gaining access to your supposedly “secret” information. For example, your PC could have spyware with a key logger installed that provides the hacker with info about everything you enter using your keyboard, including your login information.

Or, hackers can use a brute-force style of attack using password-cracking software that will attempt to log in using various combinations of words and numbers. These programs can try thousands of different combinations in seconds. And once the hackers break into a single account, such as your webmail, they can take a guess at your other login and password pairings to break into your other online accounts— or even steal your identity. We’ll examine what you’ll need to protect your digital life from intrusion.

Anti-phishing tools can help protect you by keeping your Web browser from accessing suspect websites.
Anti-phishing tools can help protect you by keeping your Web browser from accessing suspect websites.

Security Starts at Home

How you can protect yourself from hacking. The first step is to install security software on all of your devices, including your PCs, Macs, and mobile devices. Security software is often the first defense against online threats and can detect and block most threats before they appear on your device. It’s also important to ensure that your security software is active and has access to the Internet to download the latest virus definitions. Thousands of new malware variants are discovered every day, so falling behind on virus definitions updates for even a day or two can put your system at risk.

Note that to protect your PC, Mac, smartphones, and tablets; you’ll want a security application designed specifically for use on both desktop and mobile devices. For example, Norton 360 Multi-Device provides protection for up to five devices running Windows (XP, Vista, 7 & 8), Mac (OS X 10.7 or 10.8), Android smartphones and tablets, and iPhones and iPads. Ensure that all of the applications on your computers and mobile devices are up-to-date, because software developers routinely fix bugs and vulnerabilities that hackers can use to infiltrate your PC. It’s most important that you keep the operating system up-to-date, because it’s the most common target for hackers.

Avoid Pop-Ups & Email Links

It may seem obvious, but be sure to avoid clicking on website pop-ups and also on links in emails from unknown entities—and even in emails that purport to be from someone you know. Malicious software is commonly installed when users inadvertently install a program sent to them in an email.

To prevent identity theft, it’s best to limit the amount of information you make public on social networking websites.

Why You Want a Suite

Modern security suites offer more than just traditional antivirus protection; that’s because today’s threats require a more robust, all-around defense. For example, most security suites provide you with a firewall, a piece of software that determines which network traffic is allowed to enter and leave your PC, as well as providing protection against some forms of spyware and viruses. When comparing security software, check out the extras added by the software provider. Norton Internet Security offers Vulnerability and IPS (Intrusion Protection) to look for signs of malicious activity deep within the network traffic entering and leaving your computer to ensure that attackers are blocked from exploiting weaknesses in your computer’s operating system and the software running on it. This defense technique is particularly effective at blocking web-based attacks, which have increasingly become the attack vector of choice.

Another technology found in Norton Internet Security is Symantec’s SONAR technology, which monitors the regular execution of software applications on your computer by looking for signs of trouble that typically indicate the presence of malware. To avoid phishing scams, many security suites, including Norton Internet Security, offer the ability to block known dangerous websites and emails by scanning content before you open it. For instance, anti-phishing tools will look through links in emails to assure that they aren’t taking you to malware-filled websites. One up-and-coming threat is ransom ware, an attack in which cybercriminals use malicious software to lock your computer and then demand a fine in order to unlock it.

A strong security suite can prevent this locking software from ever installing itself on your computer, whereas a basic antivirus program would not.”

How to stay safe from hacking
How to stay safe from hacking

Tips to stay safe online from hackers

Why You Shouldn’t Repeat Passwords

Do you use the same password for all of your online accounts? Many do, but it’s not a good practice. Even if the password is very complex, once a hacker steals one password, he can use it on the rest of your accounts. Everyone is aware that it can be disastrous if cybercriminals gain access to your banking accounts, but it can be equally harmful if email and social networking accounts are left poorly protected, since they can be used to verify other accounts and to reset passwords. You should make sure the passwords for those accounts are complex and that they are changed every few months.

The problem is that it’s tough for us to remember the all the different passwords we need, or even which passwords correlate with a given Web sites. And storing the passwords somewhere—is not advisable.. Consider using a password manager, such as Norton Identity Safe, which will save you the hassle of remembering the password for each site. It’s also a good idea to log out when you’re finished accessing sensitive accounts.

Once the password manager has your usernames and passwords stored, the software will automatically and securely log on to the sites you enter by automatically filling in the open fields. Besides reducing the burden of remembering the credentials, this method also helps to defeat hackers who use keyloggers to monitor the keys you press. Some password managers also feature a random password generator, which is a great tool for creating highly secure passwords. After a password is generated, the software will save the password and associate it with the website and username you prefer, so you’ll never need to remember the complex sequence.

You may need to reset your email password to prevent a hacker from sending out further emails.
You may need to reset your email password to prevent a hacker from sending out further emails.

A Final Check

In addition to changing your password and examining your account recovery, check back through your email account settings to make sure nothing has been changed. It’s possible that the hacker configured your account with a forwarding rule, so he can continue to monitor your email account.

Once you’re changed the password and examined your account settings, you should be able to return to your online accounts with relative confidence in the new security.

What To Do If You’re Hacked

If you suspect that your accounts have been hacked, take action immediately by shutting down or changing the password for any affected accounts, Notify your account provider and give as many details as possible. Let your friends and family know you’ve been hacked and that they shouldn’t click on links in suspicious emails from you or posts on social networks. Also, run a security scan on your computer to make sure no malicious programs have been installed. Most websites that require a login, including Outlook. com, Gmail, and Facebook, include detailed instructions about what you should do if your account has been compromised.

Most online services offer some form of account recovery options, so you’ll be able to reset the password or gain access to the account through an alternate email or mobile phone number if the hackers has changed the password. Some websites also have an account history, so you may be able to determine when your account was logged into. Check regularly to see if hackers are logging into your account. If your account has access to your financial details, like your credit cards, check your banking and credit reports carefully. The sooner you catch fraudulent behavior, the easier it will be to refute.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)