contador web Saltar al contenido

Online Security: Here's 7 Ways to Protect Yourself From Identity Theft | Security

Identity crimes have gained new facets as technology evolves. If previously it was necessary to steal the physical version of identification documents to commit fraudulent actions, today hackers can gain almost unrestricted access to personal and bank information from credentials discovered on the Internet. With this kind of data in hand, criminals can cause great harm to victims, ranging from unauthorized credit card purchases to notifications for crimes they have not committed. In the following list, the TechTudo has separated seven security measures to protect you from online identity theft.

READ: Serious error releases millions of passwords on the Internet; take cover

Here's how to protect your data online Photo: Pond5Here's how to protect your data online Photo: Pond5

Here's how to protect your data online Photo: Pond5

Want to buy a cell phone, TV and other discounted products? Meet the Compare TechTudo

Strong passwords should be long and match upper and lower case letters, numbers and special characters. Photo: Pond5Strong passwords should be long and match upper and lower case letters, numbers and special characters. Photo: Pond5

Strong passwords should be long and match upper and lower case letters, numbers and special characters. Photo: Pond5

Long passwords, longer than nine or ten characters, offer greater protection against the action of attackers. It is noteworthy, however, that there is no use using weak sequences, such as 123456789, or personal information, such as the full name. To be considered strong, the code must also combine upper and lower case letters, numbers and special characters. Another valid tip to enforce password security is to replace letters with numbers, as in "T3chTud0". If you are having difficulty creating the combination, try using online generators.

2. Use unique passwords for each site

Although common among many users, reusing passwords is a practice that compromises account security. This is because if hackers have access to a site's credentials, all other services that use the same login and password can be hacked from the discovered combination. Not to be the victim of scams credential stuffingIt is important to use unique passwords for each site.

3. Use a password manager

Writing passwords in browsers is another attitude that, although recurring, can compromise data preservation, as browsers are more susceptible to security breaches. If you have accounts on multiple sites and need to concentrate your passwords in one place so as not to forget them, it is ideal to use password managers, specific programs that use encryption to ensure information security.

4. Avoid connecting to public Wi-Fi networks.

Criminals can create fake Wi-Fi networks to steal user data Photo: Pond5Criminals can create fake Wi-Fi networks to steal user data Photo: Pond5

Criminals can create fake Wi-Fi networks to steal user data Photo: Pond5

Attracted by the ability to access online services away from home for free, many users connect to open Wi-Fi networks. However, this ordinary and seemingly harmless practice hides a risk: criminals can create fake public networks to steal user data. From login, hackers can crawl all websites visited and even steal passwords and other personal information provided. To avoid criminal interception, always use a virtual private network (VPN) to connect to the Internet and never log in to Wi-Fi networks whose origin is unknown.

5. Do not use social networking profiles to log in to other sites

When starting to sign up for some site, it is common for users to be offered to sign in from their account on another service, such as Google or Facebook. While saving time, single sign-on is not a completely secure alternative as it gives the site access to personal information contained in the email account or social network, paving the way for privacy violations. Whenever possible, choose to register in the traditional way.

6. Enable 2-Step Verification

2-Step Verification Makes Attacker Action Difficult Photo: Aline Batista / TechTudo2-Step Verification Makes Attacker Action Difficult Photo: Aline Batista / TechTudo

2-Step Verification Makes Attacker Action Difficult Photo: Aline Batista / TechTudo

As its name implies, 2-step verification makes hacking difficult by inserting an extra phase into the login process. With the procedure, it is not enough for criminals to have access to the victim's credentials; They also need to have the person's cell phone in hand as the final authentication code is sent to the handset. You can enable 2-step verification on services like Gmail, WhatsApp, and Instagram.

7. Decrease social media exposure

Reduce attention to content posted on social networks Photo: Carolina Ochsendorf / TechTudoReduce attention to content posted on social networks Photo: Carolina Ochsendorf / TechTudo

Reduce attention to content posted on social networks Photo: Carolina Ochsendorf / TechTudo

Social networks can act as valuable sources of information for malicious people. This month, it was revealed that a crack in Instagram allows all private posts to be accessed and shared with people outside the social network. On Facebook, in turn, attackers resort to various tactics to gain access to closed accounts.

The scenario reinforces the importance of redoubling attention to the posted content. Avoid making publications that reveal details about your privacy or expose sensitive information. It is also worth "clearing" the list of followers or friends and make sure that the profile is accompanied only by trusted people.

How to recover Gmail password? Ask questions on the TechTudo forum.

What ransomware: five tips to protect yourself

What ransomware: five tips to protect yourself