Your account has been hacked
Your account has been hacked by Chris Campbell – LFB.org
Your account has been hacked.
Those five words can strike fear into even the most powerful and prestigious. (Especially the most powerful individuals, actually.)
We live in a world where a 14-year-old script kiddie — someone who knows how to copy and paste a few lines of code — could potentially ruin a life. The digital age was supposed to make our lives simpler.
Although our surge in digital innovation has brought benefits, to be sure, there’s always going to be trade-offs. Especially through the growing pains.
8 ways to protect yourself
Methods of encryption and privacy protection are getting better by the day. But we’re not quite there yet. For now, we’re in a weird limbo. All you can do, really, is make sure you’re not the lowest-hanging fruit.
You can do so, first and foremost, by hedging your virtual bets by owning physical assets like gold, silver and land. They won’t go anywhere — even if the grid goes down.
Second step is take simple steps to secure your electronic banking accounts. These include, courtesy of Stefan Gleason of Money Metals Exchange:
- Close any dormant accounts that you no longer use.
- Keep paper records, including statements, from accounts you access online.
- Strengthen your passwords by lengthening them or using a password manager.
- Avoid storing sensitive information directly on cell phones or other commonly stolen/ hacked devices.
- Check your credit report regularly for signs of identity theft.
- Install anti-virus software on your devices and keep it up to date.
But, really, as far as your digital security goes, those steps are the bare bones. If you really want to secure your digital accounts, you’re going to need to go beyond just strong passwords.
2-Factor Authentication made simple.
Beyond passwords, I suggest embracing two-factor authentication. It’s not as complex as it sounds.
There are three main factors of authenticating who you say you are online.
The first one is proof of knowledge — you put in a password, for example, that, ideally, only you know.
The second is proof of possession — you provide something you have, like a device, that, ideally, only you own.
The third is proof of inherence — you provide something you are, like a fingerprint.
Two-factor authentication allows you to authenticate yourself beyond just that first layer — knowledge. So rather than only having a password, you can prove you are who you say you are with a keychain device only you own or a constantly changing code generated on your smartphone.