Devices are everywhere! Computers, smart phones and tablets make the world a much more convenient place, but it does come with a down side – security. How do you protect your privacy and personal and financial data, while enjoying the convenience that this technology can bring? How can you protect yourself from being hacked through the use of malware, the malicious software that can harm your device?
Malware, includes computer viruses, spyware, worms and Trojan Horses. These types of programs can be responsible for stealing, hijacking or altering computer functions, encrypting or deleting sensitive data, and monitoring computer activity without the permission of the user. Situations, such as mirroring your keystrokes, or accessing your camera and/or microphone to spy on you, can be done through this type of hacking.
The good news is that, although there is no guarantee, there are some things that can be done to greatly reduce the chances of being hacked:
• Make sure all your apps and operating systems are updated. If a product is no longer supported, upgrade it to a newer version. You should even make sure your router is up to date, which is especially important.
• Change your router’s administrative user name and password after setting it up. Also change your wi-fi network name, but don’t use your name or address.
• Disable the Adobe Flash Player or make it click-to-run so it only loads when you allow it to.
• Use strong passwords, at least eight characters and include numerals and symbols. Don’t use common words, personal information or adjacent keys on the keyboard. Change your passwords at least every ninety days. Use a different password for each account.
• Don’t install any unofficial, unauthorized apps on your phone. Go to “settings”, then “security” and make sure Unknown Sources is toggled off. Enable “find my iPhone or Android Device Manager, which allows the user to remotely locate, lock or factory-reset your smartphone if it is lost or stolen.
• Don’t download free movies, music or software on your computers, as they can be full of malware.
• Install antivirus software on every device.
• Enable two-factor authentication on every online account. A password and a Pin should be used on every account, including Microsoft, Apple, Google, Facebook, Dropbox and other services.
• Remove any app you don’t use. They can create unnecessary security risks.
• Turn off wireless services when not in use. Leaving Bluetooth on can be an active infection risk.
• Create a guest Wi-Fi network on your router if it allows it, that has a different name and password from your main network. With this setup, online access can be gained without gaining access to computers, phone, printers and other devices.
• Make sure your computer has only one admin account and use it only for managing software. Create regular accounts for all users for regular computer tasks. That way if a malware hijacks the user account, it probably won’t be able to do much to the rest of the computer.
• Don’t access your online banking account with the same browser you use to check your mail or surf the web. Install another browser and use it only when accessing your banking or other financial accounts.
• Don’t give out your social security number. Your employer, accountant, potential creditors and the IRS should be the only ones who really need it.
• Cover your webcam when not in use. Malware can easily turn it on and record what you are doing.
• Stick a headphone jack that has been cut off into your laptop’s microphone jack when not in use, as malware can also turn it on and record private conversations.
• Don’t open unknown and unsolicited email. Do not click on any attachments or links in emails. Scan all email attachments with your antivirus software.
• Be careful with what links you click on in social media sites, as they can take you to a malware site.
• Don’t use public or open Wi-Fi networks, such as in an airport, café or hotel, as it allows anyone on the same network, access to your web dealings.
• Regularly back up important files onto a removable disc and store it in a secure place, somewhere other than near the computer.

By GLORIA PLEVA KACIK
Contributing Writer