In 2016, protecting your online accounts as well as your employer's accounts is vital, and I have written out a couple of key points I learned when I attended RIT's "Two Steps Ahead" event sponsored by National Cybersecurity Alliance and Logical Operations this past December.
In December I attended RIT's "Two Steps Ahead" event sponsored by National Cybersecurity Alliance and Logical Operations. I walked in with few expectations and walked out ready to get started and share with others the steps I plan to take. I came to a new awakening that if I don't make the effort to protect my accounts on the Internet, I am opening myself and all my connections to attacks. I don't want to help the hackers. I want to do my part to stop them.
I am starting with my email account. It is the main core of my vulnerability. I always thought my bank account should get the most attention, but now I understand that my email is far more important to protect. If hackers get control of my email, they have a door to all my accounts and a huge number of my friends. From there, I will work on financial accounts, social media accounts, dormant accounts, and store accounts. Here is my plan:
- Update my passwords in my personal & work accounts
Ugh. I dread this because I tend to forget them or forget where I have written them down. For my own sake and for others, I am going to bite the bullet and create NEW passwords that are more secure. At work, my company's cybersecurity is only as good as the weakest link, and I don't want that to be ME! Check out How Secure is My Password to see how quickly your passwords can be cracked.
- Implement 2 Step Authentication
Starting with my email accounts, I will set up 2 step authentication. If you are not sure how, just Google it for the account where you want to implement it. A hacker who is determined to break into my account by finding out my password can probably do it. 2 step authentication makes it almost impossible and it is simple.
- Search and find my dormant accounts and cancel them
Dormant account that I haven’t used in years are prime real estate for hackers. They give hackers a place to take over without being noticed – potential stealing my information or my friends information.
I’m not sure what step 4 is for me. I will let you know when I figure it out.