How do we protect themselves against hackers and cyber attacks

In the last decade, whether we wanted to or not, technology and the internet have become part of our lives. With the exception of the elderly, most have interacted and are interacting at least once a day with a device connected to the Internet.
This huge network, the Internet, currently connects about 15 billion devices. From mobile phones, smartphones, computers, TVs, laptops and tablets, to systems and medical equipment, industrial, educational and research.
On the internet you can do almost anything. From Online dating and marriage, up to bank transfers, control air conditioning and household elective remote feeding cat or dog, The acquisition of movable and immovable property, and even controlling heartbeat for the sick.
As far as 2020 it is estimated that this maze called the Internet, will connect over 50 billion devices, Allowing hackers to infiltrate our electronics device and computer systems.
Major targets are targeted by hackers big companiesWhere industrial espionage is practiced, banking institutions, research institutes, The educational, governmental institutions and the business environment.
Of course, even the average user, the so-called "home user" is not exempt from cyber attacks launched by hackers. Data can be stolen from a simple laptop bank cards, of documents and confidential information prejudicial to the victim.
According to a Merrill Lynch Global Research April 2016, global cyber attacks caused damages of about $ 575 billion.

How can we protect against hackers and cyber attacks

There have been many cases when anti-virus software makers have been hacked, and many computer systems have been broken, even if they have integrated protection software. Despite the enormous investments made in online security, there will always be bangs to be exploited by hackers.
If you ask a hacker who is the best way to protect the information on a computer, laptop or smartphone, he says:
- close all Wi-Fi, Bluetooth connections
- remove the internet cable from the device
- do not connect the device to another that is connected to a local or internet network.
- do not connect external hard drives or other data storage units.

Basically, a maximum security solution is total isolation of the device. Preventing it interact with any type of device or external network.
A solution is impossible as long as we are dependent connections.
It remains still handy option to secure our own devices connected to the internet and to be very careful which websites they visit and what files open in the email.
Here are some safety measures that any home user can easily apply:

  1. Constant update of anti-virus softwareTo recognize phishing websites and malware applications that try to enter the system.
  2. Dual-factor authentication online accounts, biometric solutions si data encryption stored and sent to the Internet.
  3.  The periodic change password and the use of a strong passwords which contain characters made up of symbols (@ # $% ^), letters (az) and numbers (0-9).
  4. Evaluation system by a hacker to identify possible vulnerabilities of the system.
  5. Avoid public Wi-Fi connections (Airports, restaurants, cafes, and other public places where percent Free Wi-Fi networks)
  6. Backup (Backup) data in a Cloud service or an external hard drive.

Last but not least, an important factor for online protection, it is education and user attention. Accessing adult websites or having unlawful content, opening links on e-mail, without identifying the URL and investigate where it leads, can lead to inflitrarea hackers or compromise confidential data.

How do we protect themselves against hackers and cyber attacks

About the author

Stealth

Passionate about everything gadget and IT, I write with pleasure on stealthsettings.com since 2006 and I like to discover with you new things about computers and operating systems macOS, Linux, Windows, iOS and Android.

Leave a Comment