10 Tips: Protecting Your Information & Devices

How to Avoid Juice Jacking, Data Loss, Identity Fraud and Man in The Middle Attacks

Learn 10 methods of protecting your personal information and devices.

Episode #13-25 released on May 7, 2023

Watch on Youtube
Download MP3 Audio

Protecting your personal information and devices is of the most important. I will be providing 10 steps to enable you to continue protecting yourself online.

Method 1 - Starting with your Password, you definitely need to create unique, strong, and complex passwords that employ the use of upper- and lower-case characters, numbers, and special characters. You should change them often and pay attention to data breaches at the same time. When a data breach occurs on any website, take prompt action, and change your password immediately.

Method 2 - The next step is to use two-factor authentication when available. When available consider using time-based authentication codes and failing that you should consider email before text messages. This is because a targeted attack on your sim card can make two-factor authentication more vulnerable than email. However, email and text messaging are both vulnerable to man in the middle attacks, making time-based authentication codes more secure. Options can include Authy, Google and Microsoft authenticator.

Method 3 - Avoid Juice Jacking attempts by not charging your devices using a USB cable plugged into a USB port or only using a power only cable. Many places do have issues with third parties using hacked charging ports that can install software or steal data on your device. Whenever possible, use your own charging block, as this is the safest way to protect your devices.

Method 4 - Avoid unencrypted hotspots. If at all possible or use a VPN to protect and encrypt your traffic. Using an unencrypted connection opens you to local man in the middle attacks, where your information can be stolen by anyone connected to the same Wi-Fi hotspot, including but not limited to session cookies, usernames, passwords, all files transmitted to and from your device, etc.

Method 5 - Do not click links, download files, or open files from suspicious sources. And do not open files from emails from people you know if you are not expecting an email. Always scan all files before opening any attachment, to be on the safe side.

Method 6 - Beware of scammers online. A lot of scams are going on, all the time. Many target individuals such as yourself. Never provide any personal information. In the event that the person claims to work for a company you use or a government entity of any kind, request an extension and reference number. Do not use the phone number they provide and look up the information from known reputable sources, like the business or government website. If the extension and reference number are valid, then it was not a scam, but if they refuse to provide any, then it is most definitely a scam.

Method 7 - Do not forget to keep your software updated. There are many vulnerabilities that can be mitigated by simply doing updates promptly.

Method 8 - While you are updating your software, always make sure you maintain at least 3 forms of backups, of which you use two types of technology and have one in an off-site location. This protects you from being unable to access backups in future and from ecological, governmental, war or terroristic actions that could eliminate access to data.

Method 9 - Always encrypt your data, especially any in the cloud, those that would be portable like drivers, laptops, phones, tablets, etc.

Method 10 - Be mindful on social media. It is definitely possible for others on social media to try to employ techniques that would coerce you unknowingly to give up information, sometimes unknowingly. Examples would be photos; it can be possible to use facial recognition to determine who you are. A photo with a known time and date could allow someone to determine your location. Posting your vacation online would allow others to know you are not home, making you vulnerable to theft or worse. Make sure to use privacy settings properly, too.

If you have any other tips, tricks, or methods, leave them below as a comment, so we can make this world a safer place both online and offline.

Host : Steve Smith | Music : | Editor : Steve Smith | Producer : Zed Axis Dot Net

Community Comments

Share your thoughts, opinions and suggestions

Login or Register to post Your comment.