How to protect yourself online



In a time where companies, celebrities, and even governments are frequently coming under cyber-attack, getting hacked might seem inevitable. The good news however, is that you can do something to protect yourself, your family, and your work by following just 5 essential cyber tips.

These tips stop hackers like those seen in Mr Robot in their tracks.

So what’s the relevance of Mr Robot when it comes to hacking and cyber attacks? The popular TV series “Mr. Robot” is probably one of the most accurate portrayals of what hackers actively do in real life, and some of the techniques used.

So if you want to get more street wise, it’s an entertaining way of educating yourself about hackers and their tricks.If you’re interested in hacking and don’t understand a lot of this, the TV show itself actually employs hackers to work on the show to depict real-life hacks that could happen in real life and it’s a very accurate portrayal of everything that we see today. From being able to hack smartphones to getting access to a big corporation and being able to bring them to their knees from a cyber perspective.

So let’s reveal 5 important things you can do to make yourself much more secure both at home, as well as whilst at work, and beat those hoodied hackers:

1. Use two-factor authentication (aka two-step, 2FA, multi-factor) everywhere that you can

The majority of modern banking platforms, email, Twitter, Facebook etc all support the ability for you to enable multi-factor / two factor. So even if your username and passwords are exposed to hackers (believe me it happens) you are still protected by an additional factor.

What you may not know is that most cyber criminals also know how to steal your mobile phone number, so that they receive your SMS multi-factor code instead of you in order to get around SMS based multi-factor solutions. The cyber attacks can port or SIM swap your mobile phone service, hence why where possible – always use application based two factor rather than just SMS e.g. like Microsoft Authenticator or Google Authenticator, Authy etc.

2. Don’t use the same password everywhere

I know it’s hard, but using the same password everywhere is one of probably the easiest ways that we break in as hackers. So if you re-use the same password across LinkedIn, Dropbox or your cloud based email password – we can easily find your password from breach data on the dark net, and get into your email and reset your passwords for other accounts.

If you think I’m making it up, go check out your personal email addresses on the www.haveibeenpwned.com service, and see if your password are already in the hands of hackers. Identity take-overs are then easy – whereby hackers could take out loans, credit cards, mortgages etc using your identity.

Consider using a password manager across all of your devices, so that you only use long unique passwords, that your password manager remembers rather than you. Enable multi-factor on your password manager too.

3. Update update update!

Yep – those pesky security patches. Every time you have a Windows update, mobile phone / tablet, or Apple device that says “hey I need to update your device!”, it’s usually to fix a known attack that hackers have figured out how to use against you. So keep up to date in order to protect yourself. Some people think Apple devices are impenetrable to cyber attack – however that’s not the case. They have security weaknesses too, and often need to be updated. So if you’re using Windows or Apple computers – it’s the same thing, update your systems.

It’s also the same thing for third-party applications. If you’re using Java, Adobe, PDFs, MS Office, those are all things that you want to keep up to date and that makes it much harder for hackers to break in to your system.

4. Carefully consider the information you share online

Your personal information is incredibly valuable to hackers so be aware of what info is collected about you and what information you share online. We as attackers can look at information you share online and craft custom phishing attacks against you.

Think of what we could do with info such as your personal or professional interests, what events you are attending, job description & connections…. shared publicly on Facebook / LinkedIn. We can use this info as a method to attack you.

Be proactive in managing your privacy by checking the privacy and security settings on your online accounts and apps, watch out for fake profiles and don’t connect with people you don’t actually know in real life.

A very common trick hackers use is to create a customised phishing email.

Most hackers these days know how to play on your emotions.

Be it curiosity, urgency, whatever it takes to get you to open an email, and click on a malicious link. If you do click on that link, hackers might install a key stroke logger, or a back door into your system, and the network they are connected to.


5. Last but not least, safe guard your personal information.

That’s one of the biggest things that attackers can leverage to get access to you and your data. Things like your date of birth, TFN, or your credit card numbers. So as an example, someone shouldn’t be calling you from a banking service and asking you for that type of information.

This is a common scam – where they’ll pretend to be your bank / /financial service, your mobile phone service provider, Microsoft, or the ATO. So whenever you get a call asking for personal information tell them you’ll call them back. Look up the contact number on their website and call back to verify.

That’s it – 5 simple steps that will help protect you against hackers.

Have any more tips, suggestions or feedback? Leave in the comments below.



Latest articles

Related articles

Keep learning - get cyber advice from Phil Hall

Keep learning - get cyber advice from Phil Hall

Automatically receive the very latest cyber security info & advice by providing your email address:

You have successfully subscribed to philiphall.com