4/06/2021

Headline, April 07 2021/ ''' '' STUDENTS DIGITAL SURVIVAL '' '''


''' '' STUDENTS 

DIGITAL SURVIVAL '' '''



VIJAY BALSUBRAMANIYAN - THE CHIEF EXECUTIVE OF PINDROP - a security firm that develops technology to detect fraudulent phone calls, said :

We should always remember that any piece of our identity we post online could eventually be used by fraudsters to hijack our online accounts.

TECH IS ALWAYS CHANGING - and so is the way we use it. That means we are always finding new ways to let our guard down for bad actors to snoop on our data.

Remember when you shared your address book with that trendy new app? Or when you posted photos on social networks? Those actions may weaken security for ourselves and those we care about.

''Your digital identity, which comprises all your pictures, videos and audio is going to fundamentally allow hackers to create a complete persona of you that looks exactly like you, without you being in the picture,'' illuminated Vijay Balsubramaniyan.

So here are some of the most important guidelines - like strengthening passwords and minimizing the data shared by your phone camera - to keep you and your loved ones safe.

I refer to those as the five tech commandments in the hope that you will remember them as if they were gospel.

DO NOT USE WEAK PASSWORDS

Let's talk about bad password hygiene. About 45% of Americans use weak passwords that are eight characters or fewer, according to a survey by Security.org, a research firm.

[Fourteen percent used ''Covid'' in their passwords last year.] The majority of Americans also acknowledge reusing passwords across different sites.

This opens doors to many security issues. Weak passwords can easily be guessed by hijackers trying to gain access to your account.

And if you use the same password for multiple sites, like your bank account and Facebook, then all it takes is for one of those sites to be hacked to make all those accounts vulnerable.

For most people, the simplest solution is a password manager, software that helps automatically generate long, complex passwords for accounts. All the passwords are stored in a vault that is accessible with one master password.

My favorite tool is 1Password, which costs $36 a year, but there are also free password managers like Bitwarden.

The other option is to jot down passwords on paper that is stored in a safe place. Make sure the passwords are long and complex, with letters, numbers and special characters.

USE MULTIFACTOR AUTHENTICATION

No matter how strong you make a password, hackers can still get it if they breach a company's server containing your information. That's why security experts recommend multifactor authentication, also known as two-step authentication.

Here's how two-factor authentication has generally worked. Say, for instance, you enter your user name and password for your online bank account. That step 1.

The bank then sends a txt message to your phone with a temporary code that must be punched in before the site lets you log in. That's step 2.

In this way, you prove your identity by having access to your phone and that code.

Most mainstream websites and apps, including Facebook and major banks, offer methods of two-step verification involving text messages or so-called authentication apps that generate temporary codes. Just do a web search for the setup instructions.

If a company doesn't offer multifactor authentication, you should probably find a different product, Mr. Balasubramaniyan said.

DO NOT OVERSHARE 

Many of us rely on our smartphones for our everyday camera. But our smartphones collect lots of data us, and camera software can automatically make a note of our location when we snap a photo.

This is more often a potential safety risk than a benefit.

Let's start with the positives. When you allow your camera to tag your location, photo-management apps like Apple's Photos and Google Photos can automatically sort pictures into albums based on location.

That's helpful when you go on a vacation and want to remember where you were when you took a snapshot.

The Honor and Serving of the Latest Global Operational Research on Digital Times and Drapes, continues. The World Students Society thanks author Brian X. Chen.

With respectful dedication to the Students, Professors and Teachers of the world. See Ya all prepare and register for Great Global Elections on The World Students Society : wssciw.blogspot.com and Twitter - !E-WOW! - The Ecosystem 2011 :

''' Digital - Drape '''

Good Night and God Bless

SAM Daily Times - the Voice of the Voiceless

0 comments:

Post a Comment

Grace A Comment!