We all have at least, one or two online accounts, if not more than two―It could be social network accounts, email, cooperate or even those for publishers or bloggers. With news of account exploitation, hacking and other data breaching flooding the internet, it is not difficult for us to be engulfed in the waters of fear.
You may wonder, “Is my account Safe?” or “Do I also stand the risk of my online account being stolen?” Well, to secure an online account, most depends on the end user though some account breaches have been attributed to site administrators. Follow the steps below to learn more tricks in securing your online accounts.
Try as much as possible to avoid using public computers
Public computers, mostly those available at internet cafes are frequently used and by people of diverse intentions. You will never know what someone has set on such public computers. There are a whole lot of malicious software ranging from phishers to spywares. What if someone has secretly installed one to track your path on the computer and your internet route? Such malicious apps may be working at the background to track your keyboard inputs as well as how you interact with files and other data on the internet or even local documents.
What if your online account passwords are followed, guessed or at least collected by the aid of hidden malicious programs which may have been installed on such public computers?It is always a bad idea to use public computers for working on sensitive data, be it personal or business oriented. While the bad guys are increasingly using modern technology for so many dirty games, it is always thinkable to consider our privacy and reweave better means to protect ourselves when it comes to the world of computers, internet and related technologies.
Possibly, the least to think of, and of course a bad idea too, is to consider using public computers. Using public computers is a real threat to our data security and protection of our online accounts. It’s very funny when many people try to use different technologies in attempt to protect their electronic data but ignore, or at least fail to apply, the real basic practices that can work better to set things straight.
Build stronger passwords
Here come passwords. I’ve written a complete article on five (5) tips to build stronger passwords. Interestingly, when faced with ways to build a stronger password, it is best to consider these: A good password should not be a real dictionary word or a related code. Do not use anything related to your personal information. Use lengthy passwords or codes whenever possible. Build a stronger password with multiple characters combined, and the bonus: do not use the same password for multiple accounts!
Try two way authentication
What about that? Well this is a “one-two” means to verify that an online account is being accessed by the right person. This includes a code entry stage that acts as a secondary verification after passwords are successfully authenticated for a specific account just to make sure it is the real person behind the account and not someone with a stolen password. A typical example is the Facebook Login Approval (code generator).