While the security level is not always necessary, the possibility of getting your credit card stolen or misunderstood, suffering from identity theft or hacking increases. And people like Weinstein find creative ways to protect their passwords and devices.
Facebook CEO Mark Zuckerberg famously covers his laptop webcam with a sticker, an exercise that is becoming more common and most now know not to use the same password for all their accounts. Some security experts take additional personal protection.
Now, Vice President of Emergency Exploration at Claroty, an industry security company, uses at least two different identity theft protection plans, such as Experian, Equifax or Lifelock, to ensure that his information is not compromised or sold online.
These services monitor financial information such as credit card information, loan applications and bank accounts to ensure that information is not compromised or sold online.
Weinstein’s security practices are far from rare. Wendy Nather, Head of Advisory Manager Information Security Officer at Duo Security, has a clever trick to counteract hacking.
“I use another credit card to make automatic [bill] payments online than I make for purchases on the street,” said Nather.
Nather keeps things separate so that if her daily credit card is broken, she does not need to change cards for all their automatic payments. It also minimizes the potential damage a hacker can do because it is not linked to any important online accounts.
Others focus on sharing parts of their lives, such as using different physical computers for work and personal use, or creating separate digital stands for work, shopping and banking.
Nather said that she is even known for people who only make certain tasks on paper and keep it locked in a safe.
Kevin Kosh, a partner at CHEN PR, representing technology companies, uses a Google Voice Number ̵
1; not his mobile number – to get two-factor authentication texts. Two-factor authentication requires that you use a one-time code to access accounts, except for a password.
His logic is that if you ever change your SIM card – like when you get a new phone or change carrier – there is no connection to your sensitive information.
Nather and Weinstein are also great proponents for to keep mobile software up to date