24 Shares Google+ 6 Twitter 0 Facebook 18 LinkedIn 0 Reddit 0 Pin It Share 0 Buffer 0 24 Shares ×

A Day in the Life of a Hacker

Hacking isn’t as simple as Hollywood would tell you. In reality there are a lot of different ways that data can be compromised – and it’s happening all around you.

Use Stronger Passwords

The easiest way to protect yourself is to have strong passwords. Mix uppercase, lower case, numerals, and special characters. And avoid words that can be found in a dictionary, or that have a significance to you someone else could guess!

Don’t Use the Same Password Everywhere

To make matters more complicated, you need to use different passwords for different services. That way if one login is stolen it doesn’t work for a criminal everywhere.

Watch Out for Third-Party Authentication

You may have given social media services like Facebook or Twitter permission to share your credentials with other services, like Klout. Review this list, and remove anything you’re not currently using.

Your Phone is Your Biggest Risk

Think about all the data on your phone. It has access to your email and social media, contains your contacts, photos, maybe even an unencrypted list of passwords. Keep it locked down and make sure you can remotely wipe its contents if you need to.

24 Shares Google+ 6 Twitter 0 Facebook 18 LinkedIn 0 Reddit 0 Pin It Share 0 Buffer 0 24 Shares ×
Connect With Us:
Our email robots can be trusted. Please add your name and email to get posts like these sent to your inbox
Email Frequency:

About The Author

Avatar of John P.

John P. is CEO of Livid Lobster and co-host of Geek Beat TV. You can also find him on Twitter and Google+.

6 Responses

  1. wade lamkin

    Just showed WC and Terry your video on hacking as an example of your work.
    They are impressed!!!!
    wade & linda

  2. Charlie Indelicato

    I have asked – nay, implored – my contacts that if they refuse to put a PIN on their smartphone or tablet AND have any personal data about me to please delete my info immediately.

    • Avatar of John P.
      John P.

      Wow! Good point Charlie! I had forgotten that, but you also put other people’s info at risk with weak security too!

    • Robert Bigelow

      I don’t even OWN a smart phone or mobile-networked device, but I use a pass-code lock on my iPod Touch.