7 Tips to Protect Your Online Accounts

The security of your online accounts should never be compromised in a digital age. These proven strategies will help you secure your online accounts.

Feb 4, 2024 - 08:10
Feb 10, 2024 - 11:28
 0  359
7 Tips to Protect Your Online Accounts
A computer user checking his security settings

We all have one or two online accounts if not more than a few multiple service accounts. It could be social network, email, corporate or organizational accounts. With news of account exploitation, hacking and other data breaches flooding the internet, it is often not difficult for us to live in worries of account insecurities.

You may wonder, "Is my account safe?" or, even,  "Do I also stand the risk of my online account being stolen?"  Before attempting to answer those questions, note that securing online accounts usually depends on the end user, though some account breaches have been attributed to data managing organizations. Learn more about tricks for securing your online accounts.

Try as much as possible to avoid using public computers

Public computers, mostly those available at internet cafes, are frequently used by people with diverse intentions. You will never know what someone has set up on such public computers. There exists a lot of malicious software, including spyware or phishing software.

What if someone has secretly installed one to track your activities on a public computer and your web route? Such malicious apps may be working in the background to sniff your keyboard inputs and track how you interact with data over the internet or even local files and documents.

Using insecure public computers could put your account and related data at risk. This is true; because your online account password inputs could be sniffed with the aid of hidden malicious programs which may have been installed on public computers in the absence of your knowledge. It is always a bad idea to use public computers for working on sensitive data, be it personal or corporate-oriented.

While the bad guys are increasingly using modern technology for many dirty games, it is very important to rethink our data privacy and security and then reweave better means to protect ourselves when it comes to the cyber world and its related technologies.

Possibly, the least to think of, (and of course, a bad idea too) is to consider using public computers to access and work on sensitive data. Using public computers is a real threat to our digital accounts and data security.

Many today try to use complex technologies in attempts to protect their electronic data but ignore, or at least, fail to apply the very basic practices that can work best to protect their online accounts or datahow funny!

Build stronger passwords

Passwords? Yes, passwords! I’ve written a complete article on tips for creating stronger passwords.  Interestingly, when considering better ways to build a stronger password, it is best to consider the following customs.

  • A good password should not be a common word or code
  • Do not use anything related to your personal information
  • Use lengthy passwords or codes whenever possible
  • Build a stronger password with multiple characters combined
  • Do not use the same password for multiple accounts

Try two-way authentication

What about that? Two-factor authentication, or 2FA as some may simplify it, is a "two-step" means to verify that an online account is being accessed by the right person. This includes a code entry stage or a physical key input stage that acts as a secondary verification after passwords are successfully authenticated for a specific account.

This digital security enforcement makes sure it is the real person behind the account and not someone with a stolen password. A typical example is the Facebook stage two login approval system which uses an in-built code generator function. How do 2FAs work?

As in similar cases, a Facebook account user who has activated this extra security feature does so with their verified mobile phone number to receive SMS verification codes. In this case, when a password is successfully accepted by the system, a code is generated which is sent to the user through SMS on the verified phone number.

The user is then required to enter the code received for final approval. In other instances, the user may only need to approve from another logged-in device preconfigured to authenticate user logins.

This is very useful these days because password stealing continues to make headlines in the news. Consider an instance where somebody’s password has been stolen. It could be used along with the username or email which is mostly available publicly to gain access to the target account.

Interestingly, in the presence of a two-way (step) authentication, gaining access to another’s account even with a stolen password is very difficult. Where convenient, check your account settings to see if your account provider allows two-step account verification and activate it to add another layer of security to your online accounts.

However, hackers are very skilful at their games. Even in such instances, they may call the phone numbers associated with the account to be stolen, playing to be a technical support person. They may pose as someone who needs to work on technical issues and coerce the user to give them the code or authenticate from the user's end, to be granted the necessary approval to work on the target user's account.

Always be smart; no technical staff will call to demand any information, whatever it is, from any user by voice calls, SMS or even emails. Do not compromise your online security!

Never leave your PC or account logged in when you are off

When leaving your work desk, even for a second with your computer off sight, always lock your computer screen so that nobody gets access to any onscreen information. You never know who is in the background spying on you for the smallest chance to rob you of your valuable data.

People can be very smart at computer technology and can even install malicious software just in seconds when you are off. These can later be used to sniff, track, and steal your valuable account data or other relevant information.

When using corporate accounts try to avoid using external assistance

When you are off-post never seek assistance from people you are not familiar with, outside your working environment. In your quest to seek assistance from them, you may give sensitive information about yourself or your corporate account. When faced with issues, we sometimes become emotionally unstable and making mistakes is very common in such mental states.

You probably want to get things done at the neck of time, but your computer or account faces technical trouble. Frustrated? Yes, that’s it! In a quick attempt to get things up and running, you may need external assistance when workmates are inaccessible. If you encounter the wrong person, you are doomed!

As noted earlier, cyber thieves are smart and when they get you in such instances, you may be lured into revealing certain sensitive information or data. Some of these data and credentials may be directly connected to your corporate identity.

Cybercriminals can use the acquired information to start something fishy―launch attacks on your business or corporate account if they have intentions to do so. In rare cases too, the opposite can happen to technical staff. When hackers know you are off duty as technical staff, they may continuously be calling you, playing as a staff member frustrated with technical issues related to their account.

Acting as a coworker needing your assistance in an emergent situation, you may be lured into giving assistance that requires sensitive information related to the target business account and that’s it.

Avoid browser password-saving where possible

While it is not always a bad idea to allow browsers to save your passwords on secured personal computers for future use, sometimes, this can impose some serious security issues. What if somebody gets the sync details related to the browser such as a password and an email account? That is it!

All synced accounts and connected devices may be accessed. Unless you know what you are doing, never allow password saving for browsers. Not to talk of those related to public computers, of course (I know you may not even think of that, let alone try it). Always be security conscious when working with apps that offer to save passwords and other login credentials, especially on shared devices.

While account breaches are common, to some extent not completely avoidable, taking the right steps will reduce the risk factors for you and your organization. Always be alert and look for other smart ways to stay protected.

Did you find this article helpful? Share your thoughts on this article in the comments section. What do you think?

What's Your Reaction?

like

dislike

love

funny

angry

sad

wow

Philemon Arpelleh An avid bookworm, passionate writer, and enthusiastic technologist. I’m everything you’ll find in a good world; but definitely not an angel!