USA TODAY US Edition

TIME TO DO A 15-MINUTE CYBERSECUR­ITY MAKEOVER

You don’t need to be techsavvy or spend countless hours setting up just a few simple security measures

-

Scan today’s headlines, and it’s easy to see it’s a scary time in the digital age: an Equifax hack exposing up to 143 million credit records; mobile malware (malicious software) that targets early versions of Android Oreo; and new “phishing ” scams affecting WhatsApp and Facebook Messenger users.

Makes you want to unplug and go back to basics, no?

You don’t have to — so long as you take some necessary precaution­s to safeguard your informatio­n.

And despite popular belief, you don’t need to be tech-savvy or spend countless hours setting up a few security measures.

The following is a look at how to up your game in only a few minutes.

STEP 1: STRONG AND UNIQUE PASSWORDS

Never use the same password for all your online activity. Why? Because if a service is hacked and your password is exposed, cybercrimi­nals may try it on another account.

After the last Yahoo breach, for example, stolen email passwords may have been cross-referenced with users’ bank accounts, cybersecur­ity experts say. Out of laziness, many people use the same password for everything.

Not only should you use different passwords for all accounts — and password manager apps are a handy way to remember them all — try to use a passphrase instead of a password, therefore a sequence of words and other characters including numbers and symbols.

STEP 2: ENABLE TWO-FACTOR AUTHENTICA­TION

Make it harder for the bad guys to access your data by adding a second layer of defense.

Two-factor authentica­tion is highly recommende­d for all your online activity, such as your Web mail, online banking, cloud accounts and so on.

Sometimes referred to as twostep verificati­on, two-factor authentica­tion means you not only need a password or passcode (or biometrics log-on, like a fingerprin­t of facial scan) to confirm only you can access your accounts, but you also receive a one-time code to your mobile phone to type in.

On the Equifax hack, everyone should set up a “credit freeze” for credit reporting agencies, which is a personal identifica­tion number (PIN) required for anyone to access your credit report. Also, check your credit history for anything suspicious, along with bank statements, notices from insurance companies after medical procedures, and so on.

STEP 3: HAVE GOOD ANTI-MALWARE

Just as you wouldn’t leave the front door to your home unlocked, you shouldn’t let your tech be vulnerable to attacks, whether it’s a virus (or other malware) that sneaks onto your device or caused by “social engineerin­g ” (including ransomware and phishing scams) because you were deceived into divulging confidenti­al informatio­n.

Reputable anti-malware on all your devices — laptops, desktops, tablets and smartphone­s — can identify, quarantine, delete and report any suspicious activity. The most robust software offers a suite of services, including a firewall and encryption options.

STEP 4: UPDATE YOUR SOFTWARE

If we’ve learned anything from this past spring ’s WannaCry ransomware — a global attack that infected some 230,000 Windows machines running an out-of-date operating system — it’s to set your software to automatica­lly update so you don’t have to remember to do so.

Set up automatic updates wherever you can, including your operating system, browser, plugins and other software. You only need to do this once. For software that doesn’t allow for automatic updates, check them regularly.

On a related note, take a moment to secure your wireless router, too, by ensuring you have a password on it — both to gain access to the Internet (so your neighbors don’t steal Wi-Fi), and for entering the settings of the router ( by changing the default password, such as “admin”).

STEP 5: BACK-UP YOUR INFO

It doesn’t really matter how you want to do it — a free cloud service, external hard drive, USB thumbdrive or what have you — so long as you’re proactive about backing up your important files regularly, you’ll minimize the damage if hit with a direct or indirect attack.

Other assorted cybersecur­ity tips: Set up biometrics security on your smartphone and a “find my phone” app to locate it if lost or stolen; be cautious when using your laptop in free public Wi-Fi hotspots (use your smartphone as a personal hotspot instead); and be sure to exercise common sense when reading emails and text messages (no respectful company, such as your bank, will ever ask you to urgently confirm your identity by filling out forms), and never click on suspicious attachment­s or links.

These steps take mere minutes and don’t require major technical know-how. If it still seems daunting, bribe a tech-savvy friend with a good meal in exchange for setting up this 15-minute makeover.

 ?? SHUTTERSTO­CK ?? Marc Saltzman
Out of laziness, many people use the same password for everything. Have a different password for every account. Better yet, use a passphrase.
SHUTTERSTO­CK Marc Saltzman Out of laziness, many people use the same password for everything. Have a different password for every account. Better yet, use a passphrase.
 ??  ??

Newspapers in English

Newspapers from United States