Cybersecurity: I Don't Want to Be the Weak Link

Posted on 1/21/2016 by Sue Mayo Smith

In 2016, protecting your online accounts as well as your employer's accounts is vital, and I have written out a couple of key points I learned when I attended RIT's "Two Steps Ahead" event sponsored by National Cybersecurity Alliance and Logical Operations this past December.

Cyber Security Weak LinksIn December I attended RIT's "Two Steps Ahead" event sponsored by National Cybersecurity Alliance and Logical Operations. I walked in with few expectations and walked out ready to get started and share with others the steps I plan to take. I came to a new awakening that if I don't make the effort to protect my accounts on the Internet, I am opening myself and all my connections to attacks. I don't want to help the hackers. I want to do my part to stop them.

I am starting with my email account. It is the main core of my vulnerability. I always thought my bank account should get the most attention, but now I understand that my email is far more important to protect. If hackers get control of my email, they have a door to all my accounts and a huge number of my friends. From there, I will work on financial accounts, social media accounts, dormant accounts, and store accounts. Here is my plan:

  1. Update my passwords in my personal & work accounts
    Ugh. I dread this because I tend to forget them or forget where I have written them down. For my own sake and for others, I am going to bite the bullet and create NEW passwords that are more secure. At work, my company's cybersecurity is only as good as the weakest link, and I don't want that to be ME! Check out How Secure is My Password to see how quickly your passwords can be cracked.
  2. Implement 2 Step Authentication
    Starting with my email accounts, I will set up 2 step authentication. If you are not sure how, just Google it for the account where you want to implement it. A hacker who is determined to break into my account by finding out my password can probably do it. 2 step authentication makes it almost impossible and it is simple.
  3. Search and find my dormant accounts and cancel them
    Dormant account that I haven’t used in years are prime real estate for hackers. They give hackers a place to take over without being noticed – potential stealing my information or my friends information.

I’m not sure what step 4 is for me. I will let you know when I figure it out.

RECENT ARTICLES

Posted on 11/14/2017 by Equatek Interactive
Posted on 11/14/2017 by Equatek Interactive
Posted on 10/26/2017 by Equatek Interactive in Tips for Your Business
Posted on 10/26/2017 by Equatek Interactive
Posted on 10/4/2017 by Equatek Interactive