It’s probably easy for you to identify the people who could gain physical access to your computer, tablets, phones, and other digital devices. It could be family members, roommates, co-workers, members of a cleaning crew, and others.
But identifying the people who could gain remote access to your devices are much more difficult. As long as you have a device that connects to a network, or the Internet, you are vulnerable to someone or something accessing your information. Luckily, you can develop habits that make it more far more difficult.
Here are just a few habits to protect you from remote access:
1. LOCK or LOG-OFF your devices: This means having a STRONG PASSWORD. Developing a strong password is easy. Insure it has 25 characters or more – I know – sounds crazy but here is an example: IHateRadicalTerrorism!!!! Pick random words or phrases that don’t relate to you and exceed 24 characters.
2. DISCONNECT your devices from the Internet when you aren’t using them. Convenience comes with risks. Attackers or viruses scanning networks are always lurking and waiting to exploit your information. Disconnect when you’re not using them.
3. SHIELD your devices when they are sitting idle. Escape the Wolf provides patented shielded pouches for phones and tablets, briefcases, messenger bags and backpacks that prevent remote access all the time. Escape the Wolf are running a special for SOFREP right now on their Grey Laptop Briefcase. Their products provide a “water tight” seal around your devices and prevent all adversaries from gaining remote access to your valuable data. This will also prevent tracking of your devices and shut down cheater apps ; )
4. EVALUATE your security SETTINGS. It is important to examine your devices and apps settings, especially the security/privacy settings, and select options that meet your security requirements.
5. Always REEVALUATE after updates: Always check your settings after OS and application updates and ensure they are set where you want them, not where “they” program them.
It’s probably easy for you to identify the people who could gain physical access to your computer, tablets, phones, and other digital devices. It could be family members, roommates, co-workers, members of a cleaning crew, and others.
But identifying the people who could gain remote access to your devices are much more difficult. As long as you have a device that connects to a network, or the Internet, you are vulnerable to someone or something accessing your information. Luckily, you can develop habits that make it more far more difficult.
Here are just a few habits to protect you from remote access:
1. LOCK or LOG-OFF your devices: This means having a STRONG PASSWORD. Developing a strong password is easy. Insure it has 25 characters or more – I know – sounds crazy but here is an example: IHateRadicalTerrorism!!!! Pick random words or phrases that don’t relate to you and exceed 24 characters.
2. DISCONNECT your devices from the Internet when you aren’t using them. Convenience comes with risks. Attackers or viruses scanning networks are always lurking and waiting to exploit your information. Disconnect when you’re not using them.
3. SHIELD your devices when they are sitting idle. Escape the Wolf provides patented shielded pouches for phones and tablets, briefcases, messenger bags and backpacks that prevent remote access all the time. Escape the Wolf are running a special for SOFREP right now on their Grey Laptop Briefcase. Their products provide a “water tight” seal around your devices and prevent all adversaries from gaining remote access to your valuable data. This will also prevent tracking of your devices and shut down cheater apps ; )
4. EVALUATE your security SETTINGS. It is important to examine your devices and apps settings, especially the security/privacy settings, and select options that meet your security requirements.
5. Always REEVALUATE after updates: Always check your settings after OS and application updates and ensure they are set where you want them, not where “they” program them.
We are a community, so please add your security suggestions for others to benefit from!
Learn more here.
(Featured Image Courtesy: publicradio.org)
COMMENTS
There are on this article.
You must become a subscriber or login to view or post comments on this article.