Categories: world

The unique and extreme ways people protect themselves against hacks

November 28, 2018 Technology 0 Views While the security level is not always necessary, the possibility of getting your credit…

While the security level is not always necessary, the possibility of getting your credit card stolen or misunderstood, suffering from identity theft or hacking increases. And people like Weinstein find creative ways to protect their passwords and devices.

Facebook CEO Mark Zuckerberg famously covers his laptop webcam with a sticker, an exercise that is becoming more common and most now know not to use the same password for all their accounts. Some security experts take additional personal protection.

Now, Vice President of Emergency Exploration at Claroty, an industry security company, uses at least two different identity theft protection plans, such as Experian, Equifax or Lifelock, to ensure that his information is not compromised or sold online.

These services monitor financial information such as credit card information, loan applications and bank accounts to ensure that information is not compromised or sold online.

Weinstein’s security practices are far from rare. Wendy Nather, Head of Advisory Manager Information Security Officer at Duo Security, has a clever trick to counteract hacking.

“I use another credit card to make automatic [bill] payments online than I make for purchases on the street,” said Nather.

Nather keeps things separate so that if her daily credit card is broken, she does not need to change cards for all their automatic payments. It also minimizes the potential damage a hacker can do because it is not linked to any important online accounts.

Others focus on sharing parts of their lives, such as using different physical computers for work and personal use, or creating separate digital stands for work, shopping and banking.

Nather said that she is even known for people who only make certain tasks on paper and keep it locked in a safe.

Kevin Kosh, a partner at CHEN PR, representing technology companies, uses a Google Voice Number &#821

1; not his mobile number – to get two-factor authentication texts. Two-factor authentication requires that you use a one-time code to access accounts, except for a password.

His logic is that if you ever change your SIM card – like when you get a new phone or change carrier – there is no connection to your sensitive information.

<img alt = “Hackers

Nather and Weinstein are also great proponents for to keep mobile software up to date

Weinstein said he is known for some people who completely eliminate email because of the high risk of phishing and malicious code.

Although it is known for some people who completely eliminate email because of the high risk of phishing and malicious code. is not a reasonable solution for most, he noted an area where people could assume a more cautious approach is with routers.

“Most get them through their ISP and they do not necessarily prioritize security,” Weinstein said. “Consider buying a home router you would have any other technology that you care about. It’s more than just giving you wireless access. Security must be part of the equation. “

These routers are easily hacked and can provide sensitive information because most people feel safe to use computers on a protected network.

But Weinstein warned to take all the extrema security measures, such as using personal e-mail servers.

“That’s what people do to be safe and then it stops being back,” he said. “If you do not have a state-of-the-art facility and 24 / 7 operations center that supports it, you can not compare the level of security to something that is commodized as Gmail. “

Nather agrees and notes” if you’re “enough paranoid, you can never prove to yourself that you’re sure.”

She said there are some things that should be done by bat as 2-factor authentication and password loading to a password manager. But “if you do not know you are at high risk of being targeted, say a government or senior executive, you probably will not be.”

Published by