Protecting Your Valuables From Hackers

Reading Time: < 1 minute

A few weeks ago, I dealt with a breach in one my email accounts.

The issue was resolved quickly, but not before a tidal wave of spam was sent from my account.

Mega-corporations aren’t immune to digital attacks, either.

After changing login information for a few of my other accounts, I installed a few new safeguards.

Here are a few tips for thwarting hackers and other ill-intents:

Install 2-step verification if available.

Some websites (ex: Gmail) can insert an additional step into the login process. In addition to entering your login info, you’ll need to provide a separate code that will be sent to a phone number or email address linked to your compromised account.

Save for the most careless of individuals, you should be good to go.

It’s a bit of a hassle, but if your account contains priceless or highly-confidential information, it’s worth it.

Don’t be a passive victim: turn the tables on the hacker.

If you’ve already suffered an attack, you might be able to find the location of the offending server.

Get the hacker’s IP (domain hosts, websites, and applications can assist you with this) and plug it into this website: http://www.ip-address.org/lookup/ip-locator.php

That’ll give you the approximate origin of the attack.

Although hackers may utilize countermeasures to mask their true location, you may still be able to report the offenders and prevent future security breaches.

Paired with intelligent use of your computer and web-connected devices, you’ve now got several new layers of protection from unwanted access.

Need help with a problem or goal?  Click here to learn more.

Leave a Comment

Your email address will not be published. Required fields are marked *