Still is unclear, how the sometimes very private data, the Unknown in the past weeks, German politicians and celebrities on the net. In some cases, private E-Mail seem to be compromised, in other cases, the published Material looks as if it had been by network research collected together.
what is Clear, however: The publication of the data is for the Concerned and angry – and for you as an Internet user, a good occasion on which, for a moment, and to protected questions, your data .
Basically: Every System can be cracked in . However, as a prudent user, you can make it more difficult for attackers at least, harm. Who is easy to hack, if in doubt, just quickly hacked.
Here are ten basic rules for Online everyday:
Use strong, long passwords : never Use pass phrases such as “123456 or “password”.
your passwords do not double : Is chopped a service – and possibly have your password, you can steal them away, for of data.
you can Use the Two-factor authentication : Set your E-Mail Account and your Social Media Apps so that you have to confirm the Login via mobile App. How to do that, you can find here.
Check whether there are back doors , with which Criminals come in without a password in your account. Often about supposed security issues are so insecure that even third parties can answer them (“Where were you born?”). In such cases, it helps no answer, but another strong password to be entered.
Be careful with email attachments : Ransomware is introduced via E-Mail attachments that masquerade as harmless Word documents. You should disable the Macro function in a document, you will receive via E-Mail. Total security does not exist, but Also as a “Drive-by”, so when you visit a Website, you can catch Ransomware.
take regular Back-ups and to take care of it on : Who backs up photos and work documents on a regular basis, do not need to tremble in the event of an attack with Ransomware to his data. Remember also: a Backup can be stolen, and if it is then unencrypted, the attacker of your data.
Communicate encrypted : A normal E-Mail, you should hold out for not much more secure than a post card. The situation is different for example in messages encrypted by PGP end-to-end. Here you will find a guide to Setting up. Some applications such as the Facebook Messenger to have become an end-to-end encryption on Board, but it must be manually activated.
be Careful with unsecured Wi-Fi Hotspots : In a free Wi – Fi, for example, in the Café – can be read alongside seater, under certain circumstances, the data traffic, because open networks are often unencrypted. To ensure that your data will not be depleted easily, the only solution is a trusted virtual private network, abbreviated VPN.
you Install the latest Updates : The Computer and Smartphone operating systems, your Browser, Office applications and the Flash Player. Malware programs often taking advantage of security holes in this Software. Also a virus protection program helps to protect your System against known pests.
do not Give your data everywhere : With Fake web sites trying Criminals, for example, account data. Therefore, be sure whether or not you really are getting on the correct Website. Click, for example, prefer to use Links to Bank sites, but type in their addresses, even in the Browser. Click the error messages, not unread. More on the topic of secure Online Banking is here.
Keep track : How many computers you have at home, what devices hang on Internet? Television, smoke detectors, light bulbs, and perhaps the baby monitor – all of which can be attacked, if it’s Internet capable.
These tips will show: Even without any special computer knowledge, it is possible to increase the own security. Usually a More associated to security, unfortunately, with less comfort for the user. But: Who’s making it easy on yourself, it’s often too easy for hackers. More about Hacker Michael Walter/ THE MIRROR Without cyber alert: The world of the Hacker – at last to understand
Our ten tips are an excerpt from our explainer piece, “Finally understand: hackers”. His total collection, in which we explain, for example, yet lay-friendly, what Hacks or hacking at all, you can find here.