{"id":38629,"date":"2021-05-27T01:27:30","date_gmt":"2021-05-26T19:57:30","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=38629"},"modified":"2021-05-26T17:22:46","modified_gmt":"2021-05-26T11:52:46","slug":"top-15-ways-to-protect-from-online-hacking","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/","title":{"rendered":"Top 15 ways to Protect from Online Hacking"},"content":{"rendered":"<p>Cybercrimes are on the upswing. There are more than 1 million <a href=\"https:\/\/www.the-next-tech.com\/security\/5-tips-manufacturers-can-take-to-combat-cyber-attacks\/\">cyber attacks<\/a> pioneered daily. To safeguard yourself, your loved ones, and your company, there are particular steps you can take that will almost certainly keep hackers away from the individual information. Here are some of my personal tips, not in any particular order.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_17 counter-hierarchy counter-decimal ez-toc-white\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" style=\"display: none;\"><i class=\"ez-toc-glyphicon ez-toc-icon-toggle\"><\/i><\/a><\/span><\/div>\n<nav><ul class=\"ez-toc-list ez-toc-list-level-1\"><li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Top_15_ways_to_Protect_from_Online_Hacking\" title=\"Top 15 ways to Protect from Online Hacking\">Top 15 ways to Protect from Online Hacking<\/a><ul class=\"ez-toc-list-level-4\"><li class=\"ez-toc-heading-level-4\"><ul class=\"ez-toc-list-level-4\"><li class=\"ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_1_Dont_open_a_file_from_an_unknown_sender\" title=\"Tip 1. Don\u2019t open a file from an unknown sender\">Tip 1. Don\u2019t open a file from an unknown sender<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_2_Dont_use_same_password_everywhere\" title=\"Tip 2. Don\u2019t use same password everywhere\">Tip 2. Don\u2019t use same password everywhere<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_3_Enable_Multi-Factor_Authentication\" title=\"Tip 3. Enable Multi-Factor Authentication\">Tip 3. Enable Multi-Factor Authentication<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_4_Try_not_login_to_your_accounts_on_public_networks\" title=\"Tip 4. Try not login to your accounts on public networks\">Tip 4. Try not login to your accounts on public networks<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_5_Dont_keep_a_copy_of_plain_text_login\" title=\"Tip 5. Don\u2019t keep a copy of plain text login\">Tip 5. Don\u2019t keep a copy of plain text login<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_6_Social_Media\" title=\"Tip 6. Social Media\">Tip 6. Social Media<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_7_Dont_give_your_personal_info_on_phone_or_email\" title=\"Tip 7. Don\u2019t give your personal info on phone or email\">Tip 7. Don\u2019t give your personal info on phone or email<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_8_Dont_visit_fishy_websites\" title=\"Tip 8. Don\u2019t visit fishy websites\">Tip 8. Don\u2019t visit fishy websites<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_9_Change_credit_cards\" title=\"Tip 9. Change credit cards\">Tip 9. Change credit cards<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_10_Enable_Auto_Updates\" title=\"Tip 10. Enable Auto Updates\">Tip 10. Enable Auto Updates<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_11_Dont_Use_Public_WiFi_to_Access_Your_Sensitive_and_Financial_Information\" title=\"Tip 11. Don&#8217;t Use Public WiFi to Access Your Sensitive and Financial Information\">Tip 11. Don&#8217;t Use Public WiFi to Access Your Sensitive and Financial Information<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_12_Logout\" title=\"Tip 12. Logout\">Tip 12. Logout<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_13_Change_Passwords_Every_Year\" title=\"Tip 13. Change Passwords Every Year\">Tip 13. Change Passwords Every Year<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_14_Keep_Separate_devices\" title=\"Tip 14. Keep Separate devices\">Tip 14. Keep Separate devices<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-4\"><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Tip_15_Enable_Guest_WiFi_at_Home\" title=\"Tip 15. Enable Guest WiFi at Home\">Tip 15. Enable Guest WiFi at Home<\/a><\/li><\/ul><\/li><\/ul><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.the-next-tech.com\/security\/top-15-ways-to-protect-from-online-hacking\/#Summary\" title=\"Summary\">Summary<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Top_15_ways_to_Protect_from_Online_Hacking\"><\/span>Top 15 ways to Protect from Online Hacking<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h4><span class=\"ez-toc-section\" id=\"Tip_1_Dont_open_a_file_from_an_unknown_sender\"><\/span>Tip 1. Don\u2019t open a file from an unknown sender<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Emails are among the ordinary ways hackers access your information. The attachment could be a script which puts code in your own device, begins collecting information, and sends it to the user. Some scripts can also delete your documents and much more.<\/p>\n<p>In addition, if you become aware of a hyperlink in an <a href=\"https:\/\/www.the-next-tech.com\/business\/things-to-make-sure-while-outsourcing-to-an-email-marketing-agency\/\">email<\/a>, prior to clicking on it, then try to hover and watch the URL is untrue. If it seems fishy, don&#8217;t click.<\/p>\n<p><strong>Action<\/strong><br \/>\nDo not open an attachment unless you know the person. Also check the file type before opening it. Sometimes the file extension can be tricky, make sure you&#8217;ve your <a href=\"https:\/\/www.the-next-tech.com\/security\/how-to-choose-a-best-antivirus-for-your-company\/\">anti-virus<\/a> settings to check for email attachments.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/review\/ddr4-vs-ddr5\/\">DDR4 vs DDR5: Tech Differences, Latency Details, Benefits & More (A Complete Guide)<\/a><\/span>\n<h4><span class=\"ez-toc-section\" id=\"Tip_2_Dont_use_same_password_everywhere\"><\/span>Tip 2. Don\u2019t use same password everywhere<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Don&#8217;t use the exact same password for more than 1 account. Create distinct passwords. I know it&#8217;s extremely tough to remember passwords. If any program or site offers secure logins like face recognition in programs, empower it.<\/p>\n<p>Did you understand the 10 most well-known passwords would be the next?<\/p>\n<p>123456<br \/>\n123456789<br \/>\nqwerty<br \/>\npassword<br \/>\n111111<br \/>\n12345678<br \/>\nabc123<br \/>\n1234567<br \/>\npassword1<br \/>\n12345<\/p>\n<p>Just don&#8217;t use them. Also don&#8217;t use Password1 or Password123 or password123.<\/p>\n<p><strong>Create difficult passwords for different account<\/strong><\/p>\n<ul>\n<li>At a study project, a cyber security company discovered the most-used password was Password123.<\/li>\n<li>Make certain to modify the default password given by a corporation.<\/li>\n<li>Make certain to change passwords every couple of months, or even before.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Tip_3_Enable_Multi-Factor_Authentication\"><\/span>Tip 3. Enable Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>The majority of the sites and programs that save sensitive and fiscal information now supply a 2-factor or even multi-factor authentication. To login into a site or an program, you&#8217;ll need to allow it. I know this is just one additional step but allow it. Text message confirmation isn&#8217;t so hard.<\/p>\n<p>For my financial and bank accounts, I have put a 2FA. That means, every time I login into my account, I have to affirm a PIN text for my cellphone.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Tip_4_Try_not_login_to_your_accounts_on_public_networks\"><\/span>Tip 4. Try not login to your accounts on public networks<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Public networks like an airport, are generally not protected. Unless its mandatory, don&#8217;t log to your significant accounts on public networks. Tourists locations and private home rentals are also a simple target for hackers. Some hackers install tracking on house routers. Attempt not to get into your bank account, private info on untrusted networks.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Tip_5_Dont_keep_a_copy_of_plain_text_login\"><\/span>Tip 5. Don\u2019t keep a copy of plain text login<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>If your password is \u201cxatpatro\u201d and your house number is 404, you can save password as \u201cxatpatro404\u201d or \u201cxat4pa0tro4\u201d.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/mobile-apps\/tiktok-video-downloader\/\">13 Best TikTok Video Downloader Apps & Websites (No Watermark) | Remove TikTok Watermark In Seconds!<\/a><\/span>\n<h4><span class=\"ez-toc-section\" id=\"Tip_6_Social_Media\"><\/span>Tip 6. Social Media<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Do not keep your login information in text. If you have to keep your login credentials, then maintain the document in a secure place and password protect it. Microsoft Word or Excel lets you password protect a document. Also, you might even add a few codes to your own password which only you understand. As an instance, at a password, you can add your date of arrival or your home number.<\/p>\n<p>Hackers track your<a href=\"https:\/\/www.the-next-tech.com\/business\/top-5-trends-in-social-media\/\"> social websites<\/a> to find out about your traveling along with other statuses. Do not set your upgrades on social media like travel programs or place. Disable auto upgrades from programs using where you are or maps.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Tip_7_Dont_give_your_personal_info_on_phone_or_email\"><\/span>Tip 7. Don\u2019t give your personal info on phone or email<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>No business or company calls you and request your social security number. If a person wants to be from a business that you are not anticipating a call from, be certain that the individual is out of that corporation. If not needed, don&#8217;t provide your personal information over the telephone or email.<\/p>\n<p>Occasionally, spammers will telephone you and present since they&#8217;re calling from a financial institution. You have to clarify if they&#8217;re in fact calling from the lender. OR request them to supply you a number at which you are able to affirm its bank&#8217;s amount and you&#8217;ll be able to call them.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Tip_8_Dont_visit_fishy_websites\"><\/span>Tip 8. Don\u2019t visit fishy websites<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Just do not visit fishy sites. Don&#8217;t click those ads which appear suspicious. If you are uncertain about an advertisement or a site, first seek that title from the browser to detect the first site.<\/p>\n<p>If you have to use questionable and unprofessional sites, attempt to open them onto another device in a high degree security setting on your internet browser. Any site which opens links and hyperlinks, you don&#8217;t wish to see them.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/artificial-intelligence\/janitor-ai-not-working-fixed\/\">[Fixed!] Janitor AI Not Working (2025 Guide)<\/a><\/span>\n<h4><span class=\"ez-toc-section\" id=\"Tip_9_Change_credit_cards\"><\/span>Tip 9. Change credit cards<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Every year attempt to modify your charge cards. This is also great that you understand, what monthly fees being billed that you are unaware of. Additionally, attempt to track your monthly credit card bill and search for any trades that you are unaware of.<\/p>\n<p>If you&#8217;re able to, use 1 credit card for the majority of the internet transactions and maintain a close watch on that. This way, you are not risking your complete bank accounts.<\/p>\n<p>Bank move by providing your bank account information is a free of charge. Think about the way. Whatever you enter online will be saved somewhere on a server. You do not know whether your personal and <a href=\"https:\/\/www.the-next-tech.com\/finance\/supercharge-your-financial-data-with-no-code\/\">financial data<\/a> is encrypted or not, if its protected or not, and anybody can gain access to the.<\/p>\n<p>I understand its difficult to eliminate it, but in the event that it is possible, do not give anyone access to whatever but one credit card.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Tip_10_Enable_Auto_Updates\"><\/span>Tip 10. Enable Auto Updates<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Last but the most important suggestion: Update your system with the most recent patches and security upgrades. Ensure that you&#8217;re current with all the upgrades. It is possible to enable Vehicle Upgrades so that your <a href=\"https:\/\/www.the-next-tech.com\/business\/best-business-intelligence-software-and-business-operating-system-options-for-2020\/\">operating system<\/a> will automatically install and upgrade security patches.<\/p>\n<p>Don&#8217;t use old browsers. New browser are becoming better at tracking and stopping fishing strikes. Get yourself the newest browser.<\/p>\n<p>Anti-virus another major need. Ensure you&#8217;ve got a antivirus installed with the latest patches and upgrades.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/review\/drive-4-walmart\/\">Everything You Need To Know About Drive4Walmart<\/a><\/span>\n<h4><span class=\"ez-toc-section\" id=\"Tip_11_Dont_Use_Public_WiFi_to_Access_Your_Sensitive_and_Financial_Information\"><\/span>Tip 11. Don&#8217;t Use Public WiFi to Access Your Sensitive and Financial Information<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>I understand WE LOVE linking to our shares, bank account, and even health records from people Hotel Lobby WiFis. That is a big NO NO. Control yourself till you&#8217;ve got a safe connection.<\/p>\n<p>Your Hotel Room is much more protected than a Hotel Lobby <a href=\"https:\/\/www.the-next-tech.com\/gadgets\/survey-69-of-ads-request-coming-from-wifi\/\">WiFi<\/a>. Bear in mind, your own money, stocks, and other information will still be there. It is not going anyplace.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Tip_12_Logout\"><\/span>Tip 12. Logout<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>I understand we get lazy and store our passwords and programs. When you done obtaining your sensitive information like bank accounts and fiscal information, LOGOUT of your browser. Bear in mind, the majority of the hackers are after your money.<\/p>\n<p>If you join to your other servers and machines with remote connections, be sure to logout when you are done with the job.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/top-10\/opus-clip-alternative\/\">[New] Top 10 Opus Clip Alternatives To Create Viral Short Clips<\/a><\/span>\n<h4><span class=\"ez-toc-section\" id=\"Tip_13_Change_Passwords_Every_Year\"><\/span>Tip 13. Change Passwords Every Year<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>When you haven&#8217;t altered your passwords in just a little while, alter them now. I strongly suggest altering your passwords every calendar year, or perhaps every 6 month. As for me, I change my passwords every 6 months to get several common programs and websites I use.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Tip_14_Keep_Separate_devices\"><\/span>Tip 14. Keep Separate devices<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>In case you&#8217;ve got several devices, attempt to separate apparatus based upon your activities. I strongly suggest using one device only when you get sensitive information like your bank account, financial information, investments, stocks etc..<\/p>\n<p>When you&#8217;ve got a work machine, then simply use that for work function only. If your business has supplied you a job machine, do not do anything private on it such as information, social networking, or even films.<\/p>\n<p>You&#8217;ll have one apparatus for entertainment function.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Tip_15_Enable_Guest_WiFi_at_Home\"><\/span>Tip 15. Enable Guest WiFi at Home<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Most internet service providers offer a Guest <a href=\"https:\/\/www.the-next-tech.com\/gadgets\/survey-69-of-ads-request-coming-from-wifi\/\">WiFi<\/a> feature. Enable a Guest WiFi and any guest needs your WiFi access, give them the Guest WiFi. Keep your Guest WiFi password separate from your personal WiFi password.<br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/entertainment\/how-to-create-a-second-youtube-channel\/\">How To Create A Second YouTube Channel? Steps To Create Multiple YouTube Channel + FAQs<\/a><\/span>\n<h2><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In this article, I shared some of the tips I use to keep myself safe from hackers. Hope you enjoy and apply these tips. If you have any tips, please feel free to share them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrimes are on the upswing. There are more than 1 million cyber attacks pioneered daily. To safeguard yourself, your loved<\/p>\n","protected":false},"author":1547,"featured_media":38638,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[632,4855,4856,4852,4854,4853,4857,148],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/38629"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/1547"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=38629"}],"version-history":[{"count":3,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/38629\/revisions"}],"predecessor-version":[{"id":38640,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/38629\/revisions\/38640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/38638"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=38629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=38629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=38629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}