Protecting Your Valuables From Hackers

Reading Time: < 1 minute

A few weeks ago, I dealt with a breach in one my email accounts.

The issue was resolved quickly, but not before a tidal wave of spam was sent from my account.

Mega-corporations aren’t immune to digital attacks, either.

After changing login information for a few of my other accounts, I installed a few new safeguards.

Here are a few tips for thwarting hackers and other ill-intents:

Install 2-step verification if available.

Some websites (ex: Gmail) can insert an additional step into the login process. In addition to entering your login info, you’ll need to provide a separate code that will be sent to a phone number or email address linked to your compromised account.

Save for the most careless of individuals, you should be good to go.

It’s a bit of a hassle, but if your account contains priceless or highly-confidential information, it’s worth it.

Don’t be a passive victim: turn the tables on the hacker.

If you’ve already suffered an attack, you might be able to find the location of the offending server.

Get the hacker’s IP (domain hosts, websites, and applications can assist you with this) and plug it into this website: http://www.ip-address.org/lookup/ip-locator.php

That’ll give you the approximate origin of the attack.

Although hackers may utilize countermeasures to mask their true location, you may still be able to report the offenders and prevent future security breaches.

Paired with intelligent use of your computer and web-connected devices, you’ve now got several new layers of protection from unwanted access.

Share on facebook
Share on twitter
Share on linkedin
Share on pinterest
Share on vk
Share on reddit
Share on tumblr
Share on whatsapp

MY NAME IS KENE.

I’m an entrepreneur-among other things-specializing in helping people build businesses and develop fulfilling relationships.

Categories

Leave a Comment

Your email address will not be published.