Skip to main content

How to protect our Data and Identity online?

In this post we will know how to protect our data and identity because every three seconds someone’s identity is stolen. With social media channels like Facebook, Twitter or Instagram as popular as ever cyber criminals are able to access a wealth of personal information online. Even people who think they are being cautious with their privacy settings could be vulnerable to a cyber attack particularly if they allow third party applications to access their profiles. Once a user’s information such as location, date of birth and family connections has been logged, this can be used to hack into their other accounts, such as banking and online storage etc. if our confidential information is in so much danger then how can we protect it online? The best way is to limit your data sharing online. The following ways can help you limit your data exposure online. 

1. Details like your phone number, address, children’s age or school can all help hackers to collect more information. 

2. You can use privacy settings for a more secure profile on any social website change the settings to “Friends Only” for all posts. 

3. Select a password which is difficult to be traced but which you can remember. Always use a password which is a combination of letters, numbers and special characters. 

4. Turning your GPS location settings to “off” can also keep your family’s where-about more private. 

5. Spam email is getting increasingly refined. Never react to any messages with account data or passwords. 

6. Secure your Wi-Fi connection with a strong password so that the hackers in the local area cannot use your connection to carry out malicious activity. 

7. Before entering payment details into any website check the web address has ns s which stands for secure after the http. 

8. Beware of anything suspicious in the mail, like pre approved credit card that you have not applied for and other money related offers. 

9. If your computer or phone is infected with malicious software, other safeguards are of little help because you have given the criminals the key to all your online actions. 

10. You should switch all your most important online accounts such as email accounts and social media profiles to a two step authentication. Two step authentications also have the advantage of warning you in the event of an intrusion.

Comments

Popular posts from this blog

How Many Type of Keys on a Keyboard?

Friends you know a keyboard is the most important part of a computer. It consists of different sets of keys that help us to enter information into the computer. Today we will discuss about keyboard and its keys types and use. A standard keyboard has 104 keys. Types of Keys in a Keyboard: Alphabet Keys Number Keys Special Keys Function Keys Navigation Keys 1. Alphabet Keys:   26 alphabet keys are present on a keyboard from A to Z. these keys are not present in the alphabetical order. These keys are used to type words, sentences or paragraphs. 2. Number Keys:   These keys are used for typing numbers. These keys are present above the top row of the alphabet keys and also present on the right side of the keyboard. 3. Special Keys:   Keyboard has more special keys such as Space bar Key, caps lock key, backspace key, shift key, enter key, symbol keys and tab key etc. 4. Function Keys:   12 function keys are present on a keyb...

Advantage and Disadvantage of Computer Generations

All computer generations have some advantage and disadvantage today we explain some computer generation advantages and disadvantages. First Generation Computers (1946-1959) The computers produced during the period 1946-1959 with the them technology are regarded as the first generation computer. These computers were manufactured with the vacuum tubes. These tubes were used in the arithmetic and logical operations.  Advantages: They were capable of making arithmetic and logical operations. They used the electronic values in place of the key punch machines or the unit record machines.  Disadvantages: They were too big in size, very slow, low level of accuracy and reliability. They consumed lot of electricity, generated a lot of heat and break down frequently. Second Generation Computers (1959-1965) The computer produced during the period 1959-65 with technology is known as second generation computers. These comp...

What is Vacuum Tube

A vacuum tube is, reasonable enough, a sealed glass tube containing a vacuum in which are present several electronic elements: the cathode, anode, grid, and filament. When the cathode and anode are heated by the filament, and a voltage is applied across them, current flows between the cathode and anode. If a grid is inserted between them, the flow can be controlled by changing the grid between a positive and negative voltage.  The grid voltage can be quite small, and the plate voltages can be quite high, thus providing an amplifying capability. More importantly for computers, switching the grid voltage causes the tube to act as a switch with respect to the plates. Thus, we have an electronically controlled switch that is much faster than a relay. A type of vacuum tube also served as a popular storage mechanism, the Cathode Ray Tube (CRT). Other memory devices used during the period include mercury or glass delay lines, and magnetic core memory. Vacuum tubes, however, are la...