It’s no coincidence that Halloween and National Cybersecurity Awareness Month fall together! Phishing and fraud efforts peak over the holidays, starting in October and continuing through January. While data threats are undoubtedly spooky, these tips from Computer Troubleshooters can help you boost your personal cybersecurity! Read more
If you’re one of the 1.2 billion monthly active users of Gmail, your online life is probably heavily tied to Google. For many, the account is a primary email address or used with Google Drive for work, so it’s worth making sure that your account is as secure as it can be. Utilise these options to secure your Gmail account.
Easy Methods to Secure Your Gmail Account
New security threats emerge every day, and Google updates their defence options often to help you protect your data. Continue reading to learn how to defend your Gmail account.
Add Ways to Verify it’s You
One of the best ways to protect your Gmail account is to utilize 2-Step Verification, and yet, less than 10% of users enable it. 2-Step Verification means that for someone else to get into your account, they not only need to have your Gmail password, but also access to your unlocked phone, or similar. It only takes a minute or two to set up, and Google will walk you through the process.
It works by adding an extra layer of security onto your account, so when you sign in from an unfamiliar device, you’ll be prompted to enter a one-time use code. Google can send the code via a text message, give you a phone call, or utilise other verification options. After signing in, you can choose whether or not to remember that particular device. Turning off 2-Step Verification allows Google to recognize the device so that you’re only asked for your password the next time you sign in.
Run a Security Checkup
There are also steps you can take to make sure that your account hasn’t already been compromised. First, navigate to the security sidebar of your Gmail account. You’ll see several different sections to check, each one devoted to a different aspect of your account.
The top portion of the page will alert you to any potential weaknesses in your account security. Clicking’ secure account’ takes you to a menu that highlights common issues. Here, you can add or update account recovery options. Once you enter a phone number and recovery email, Google can alert you if there’s suspicious activity on your account, and allow you to recover your account if you’re ever locked out.
Google also lists new sign-ins, password changes, and added recovery options, as well as devices that have been active in the last 28 days. If you see anything you don’t recognize, Google will prompt you to change your password and sign you out of all devices except the one you’re using.
Monitor What Sites and Apps Have Access to Your Account
Finally, you can view and manage what platforms and pages have access to your account at the bottom of the security page. When you log in on another site using your Google account, it can request basic information, such as your name, email address, and profile picture. Other websites and apps can see and change almost any information in your Google account. In this section, you can see what platforms have access to your account, and remove any that you no longer use or trust.
Securing your Gmail account is quick and easy, and can save you from future problems. Consider adding these security measures or visit your local Computer Troubleshooters office for more help securing your data.
With billions of emails sent every day, there’s a huge opportunity for malware and viruses to find their way into your inbox. While the percentage of emails containing dangerous attachments is relatively low at 2.3 percent, keep in mind that translates to millions of emails. The best defence against malicious content delivered to your inbox is knowing how to quickly spot a threat. To help keep you safe from harmful attachments, phishing scams, and more, keep these tips in mind to identify a dangerous email. Read more
Two out of five people experience a security incident that could have been avoided with stronger cybersecurity efforts. With today’s technology, you need a password for every online account or device including social media accounts, emails, smartphones, and more. Keeping personal and business data safe begins with a secure password. Utilise these password best practices to avoid becoming a hacking or identity theft victim.
4 Password Best Practices to Keep Your Information Secure
New security threats emerge every day, so it’s crucial to adapt and improve your cybersecurity measures in order to protect your data.
Use Different Passwords for Each Account
While this can seem like an insignificant step in securing your personal or business information, research shows that 73 percent of online accounts use duplicated passwords. Using the same password for multiple accounts is a security risk because once a hacker is able to identify one of your passwords, they can easily login to one or more of your other accounts that use the same password. Ensure your data is protected by assigning original passwords to each account.
Utilise Secure Password Generators
If creating multiple passwords seems challenging, try using a password generator. Select how long the password should be, what symbols and numbers to include, and a strong password will populate. Apple users can take advantage of strong password suggestions when signing up for a new account or changing passwords on their device. Both password generators and Apple suggestions tend to create long passwords in an effort to best secure your data. Since passwords should be difficult to guess, the experts at Computer Troubleshooters recommend using password generators to help you create original login information.
Use a Password Managing Software
Secure passwords include multiple characters and numbers and keeping track of several complex logins can be difficult. Using a password managing software eliminates the need to remember every high-strength password you create and which account it belongs to. Software programs such as Dashlane streamline both personal and business account passwords. You simply need to remember one master password, and LastPass will keep track of the others so you can rest assured knowing your information is secure.
Enable Two-Factor Authentication
Along with using strong passwords, enabling two-factor authentication on all of your accounts ensures your data is safe from security threats. When you log in to an account using two-factor authentication, you are required to prove your identity in two steps. The most common way websites use this is by texting a code to your cell phone, which you then have to enter on the account you’re logging into along with your password. Using two-factor authentication provides an extra layer of security beyond a username and password.
When you’re targeted by a hacker, not only is your personal information at risk, but hackers can also install malware onto your device causing harm to your computer. Utilizing the above password best practices will improve your cybersecurity and your defense against hackers, but passwords are only one component of cybersecurity. Contact your nearest Computer Troubleshooters office to create a personalised plan to secure your data and keep your network safe.
As more consumers and businesses alike embrace the on-the-go mentality, finding a public WiFi hotspot is easier now than ever before. While there are plenty of hotspots available – about 362 million to be exact – remember that not every hotspot is trustworthy. Be sure you’re staying safe while using public WiFi with the following tips from Computer Troubleshooters. Read more
The best defence for potential security threats is to have rock-solid security practices in place. Whether you’re a savvy tech user who works with gadgets daily or one who prefers a more minimalistic lifestyle, it’s important to stay prepared against possible threats. To help assess your current tech safety measures, follow this security guide to keep your personal information safe. Read more
With 2 weeks to go most businesses will have heard of GDPR and have an understanding of what that means for their business. Putting it into practice is where some businesses need help. Read more
2016 saw the largest data breach in history. According to IdentityForce.com, Yahoo discovered a breach from 2013 that may have put as many as one billion Yahoo accounts at risk. With such big league companies falling victim to cyber security attacks, how do you begin protecting yourself? Though security software is always growing stronger and more protective, hackers are developing new strategies at a rapid pace, too. The best way to avoid a security breach is to plan ahead, and these tips for cyber security for your business are a great way to start building up your defence. Read more
It is a no-brainer that your work and home computers, as well as your personal laptop, needs more than just an antivirus program in place. Eset Security is an essential tool to help keep your information protected, your devices safe from hackers, and your system’s software up-to-date. That’s why Computer Troubleshooters recommends ESET Security. Read more
Do you suspect your laptop or computer has a virus? Is it running slow or do random windows pop up as you browse the web? Your computer may have an infection, or two. The good news is this can be fixed with a few helpful tips and programs. During this four-step process, Computer Troubleshooters guides you through the actions you can take to remove these irritating computer viruses. Read more