Previous All Posts Next

5 Tips to Keep Hackers Out of Your Home Network

Posted: October 1, 2015 to Tips & Tricks.

Tags: Data Breach, Malware, Ransomware

[fullwidth background_color="" background_image="" background_parallax="none" enable_mobile="no" parallax_speed="0.3" background_repeat="no-repeat" background_position="left top" video_url="" video_aspect_ratio="16:9" video_webm="" video_mp4="" video_ogv="" video_preview_image="" overlay_color="" overlay_opacity="0.5" video_mute="yes" video_loop="yes" fade="no" border_size="0px" border_color="" border_style="" padding_top="20" padding_bottom="20" padding_left="0" padding_right="0" hundred_percent="no" equal_height_columns="no" hide_on_mobile="no" menu_anchor="" class="" id=""][fusion_text] As much as we hear about the major cyberattacks against large corporations and even governments, the majority of cyberattacks are carried out against individuals. Here are five tips to help protect your home against hacking.

Passwords

Use strong passwords. While substituting a dollar sign for an S, a ! for I or a # for H, these have become very common tricks. For example, "p@$$w0rd" is better than using "password" for your password, but that doesn't make it strong. Try using a mixture of letters, numbers and other characters and try to make it at least eight characters long. One good idea is to use an actual sentence with punctuation. For example: "Mywife'sbirthdayis1December4,1983!" You get capital and lowercase letters, numbers and non-alphanumeric characters and it scores 100% on Password Meter. As an added bonus, it helps you remember your wife's birthday, if you're prone to forgetting things like that. Having a good, strong password isn't enough though. You should make sure you have different passwords for different services. If you use the same password for everything, if it's compromised in one place it'll be compromised everywhere. Hackers know people tend to use the same password everywhere, so if your username or email address and password are stolen from one source, you can bet they'll try it in other places as well. That means if your Twitter account gets hacked, for example, your bank account might be compromised.

Authentication

Many websites and services now offer two-factor authentication. A popular method for utilizing this is to send a text message with a passcode on it that you have to enter before being able to access an account. I've seen it on Google+, Facebook, LinkedIn and in my online banking. Yes, it can be a pain to have to wait for a text to come in if I'm setting up a new recipient for my online bill pay, but it only takes a few seconds and it keeps thieves from sending checks to themselves. The great advantage to this is that it's somewhere between very difficult and impossible (for now anyway) for a criminal to intercept text messages going to your phone. Taking a minute to enable maximum security options now can save you a ton of time and money.

Updates

Most software companies issue updates regularly. While some updates add features or options to the software, they usually include security updates. Many people don't realize this, but software companies employ teams of people to try to find vulnerabilities in their product that could be exploited by hackers so they can close them up before they can be utilized. In fact, patches often fix problems that are already being used by hackers. So keep your software up to date!

Backups

And before you update it, back it up. Back your files up regularly. One of the most insidious type of malware available now is called ransomware. A hacker gains access to your computer and locks up your files, demanding that you pay a certain amount of money before they'll release the files back to you. If you have a recent backup, you can just restore it. If you don't, you're either losing your files or paying a few hundred bucks to a criminal. Really though, backups are the best way to undo any damage done by other kinds of malware and viruses. As an added bonus, they also help in case non-security things happen to your computer.

Be careful with your email

The number one rule is this: Do not download and/or open attachments from strangers. If you see any email talking to you like they know you, but you have no idea who it is, send it to the junk folder. In that same vein, if you receive an email from a company you recognize, such as Amazon or PayPal, they are very likely not going to send you attachments, so don't open them. Don't click their links either. If you think the email might be legit, check the "from" address. Not the name, but the actual address. If it doesn't end in that company's domain name, send it to the junk folder. Emails like the ones described above are designed to get you to open attachments or take you to websites to infect your computer with some sort of virus or malware. Sending fraudulent email is one of the most popular and effective methods hackers employ to access your computer. Just make sure you're very aware of what you're doing with your email. The tips above are good for helping keep you safe form a cyberattack. There is more you can do, and of course hackers are getting ever more wily, but you can do your best to not make it easy for hackers to victimize you.[/fusion_text][/fullwidth]

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Keep Your Business Secure

Our cybersecurity experts can help you implement these best practices across your organization.

Get a Free Security Assessment
Previous All Posts Next
Free cybersecurity consultation available Schedule Now