Don’t use the same password for more than one website or account. This limits the damage to you if a hacker happens to crack one of your passwords. [1] X Research source

Highly praised third-party password managers include “Dashlane 4”, “LastPass 4. 0 Premium”, “1Password”, “Sticky Password Premium”, and “LogMeOnce Ultimate”. Most browsers have a built-in password manager that stores your passwords (although they don’t typically encrypt them).

This logic applies to IT workers and Microsoft or Apple representatives. Similarly, don’t tell people your phone or tablet’s PIN or passcode combination. Even your friends might accidentally tell someone your passcode. If you do have to give someone your password for some reason, change it as soon as they are done with whatever they needed to do on your account.

Be sure not to use the same password twice (e. g. , your Facebook password should be different than your bank password, etc. ). When you do change your password, you should change it substantially. Don’t simply replace one letter with a number.

Most major websites, including popular social media networks, have some form of two-factor authentication available. Check your account settings to learn how to enable this feature. You can set up two-step verification for your Google account. Popular app alternatives to receiving a text message include Google Authenticator, Microsoft Authenticator, and Authy. Some password managers also include a built in authenticator app.

For example, for the security question “What is your mother’s maiden name?” make the answer something like “Pineapple”. Better yet, you a combination of random numbers, letters, and symbols like “Ig690HT7@. " You might want to write down the answers to your security questions and keep them in a safe place, so that you can still recover your account if you forget the answers.

Most people simply click through the privacy policy without reading it. Although the reading can be cumbersome, it’s worth at least skimming it so you know how your data is being used. If you see something in the privacy policy that you disagree with, or that makes you uncomfortable, you may want to reconsider sharing information with that company.

For example, enter your Twitter login information on Twitter’s official page only. Avoid doing so on a page that asks for the login information in order to share an article or something similar. An exception to this rule is when a university uses an existing service (e. g. , Gmail) through their home page.

Make sure that you substantially change the passcode each time you change it–don’t just change one number. On most phones, you can set a “complex” or “advanced” password that includes letters and symbols in addition to the typical numerical characters. Avoid Using Touch ID or other fingerprint verification features. While these seem more secure than a passcode, it is actually easier to hack than a password because hackers can replicate your fingerprint with a printer. [4] X Research source Fingerprints are also not protected by the 5th amendment, but passcodes are. [5] X Research source

Many updates are patches to repair weaknesses and address security vulnerabilities. Failing to update your software will eventually result in an exploitable weakness appearing, which puts your device at risk. If you have the option to download all updates automatically, make use of this feature. It will save you a lot of trouble.

For this reason, it’s a good idea to bring an electrical outlet connector in addition to your USB cable if you’re traveling.

Android phones have a built-in security suite that prevents you from downloading apps from unknown sources. If you do choose to disable this option (from the Security tab in Settings), you’ll need to carefully verify websites from which you download apps before proceeding with the downloads.

Mac - FileVault is the encryption service for Macs. You can enable it by clicking the Apple icon in the top-left corner of your Mac’s screen, clicking System Preferences, clicking the Security & Privacy icon, clicking the FileVault tab, and clicking Turn On FileVault. You may first have to click the lock icon and enter your Mac’s administrator account password. [6] X Research source Windows - BitLocker is Windows’ default encryption service. To enable it, simply type “bitlocker” into the Start search bar, click the “Bitlocker Drive Encryption” option, and click Turn on BitLocker. Keep in mind that Windows 10 Home users won’t have access to BitLocker without first upgrading to Windows 10 Pro.

There are cloud-based services you can use to back up your data. Check the security of these services carefully before joining one. While you may be tempted to go with the least expensive service, you want to make sure your data will be kept safe. You also can use an encrypted external hard drive to back up your data. Set up your computer to run automatic backups daily, at a time of day when you aren’t normally on your computer.

Keep in mind that even replying to the email will let the sender know that your email address is active and valid. While you may be tempted to send them a sarcastic reply, even this will give them information they can use to hack you.

Go into the security settings of your computer and look for “firewall” settings. Once there, make sure it is turned on and that it is blocking incoming connections. If you have a wireless network, your router should have a firewall as well.

Mac - Restart your Mac, then hold down ⌘ Command and R as it boots up. Click Utilities, click Firmware Password Utility, click Turn On Firmware Password, and create your password. Windows - Restart your computer, then hold down the BIOS key (typically Esc, F1, F2, F8, F10, or Del) as your computer boots up. Use the arrow keys to select the password option, then enter your preferred password.

If you have remote access enabled, you essentially leave an open door for hackers to get into your computer and steal your data.

It’s also a good idea to make sure your computer’s firewall program and Bluetooth function are only letting trusted connections access your computer.

If the wireless network isn’t secured, your computer will let you know before connecting. In some operating systems, there will also be an exclamation mark next to the network’s name. If you have to use the internet but don’t have access to a secure network, change your passwords immediately the next time you log into a secure network. If you have a wireless network at home, make sure it’s secure and encrypted. Keep in mind that wireless routers typically aren’t secure by default – you have to set this up yourself.

For example, a site masquerading as Facebook might have faceboook. com as its URL. Sites which display dashes between multiple words in the site name itself (the words in between “www” and “. com”) are generally not reliable.

Many of these files are designed in such a way that the virus or malware hidden within won’t be picked up by anti-virus software screenings. The virus won’t infect your system until you try to play the file.