Cybersecurity attack: 5 things you can do right now to protect yourself

Cybersecurity attack: 5 things you can do right now to protect yourself

Individual Americans don’t need to worry – at least not immediately – that their personal information was rifled through or stolen in the recently discovered intrusion into U.S. computer systems that officials suspect was the work of Russian hackers, cybersecurity experts say.

But it’s unclear what the hackers could do in the future. So the cyber attacks are an important reminder that all systems – including those we use daily – are vulnerable. And, says Craig Danuloff, CEO of The Privacy Co., there is more we can do to protect ourselves.

“At a high level, I would say that this isn’t a direct concern for ‘regular folks’ except in what it demonstrates about the potential for even the most secure and protected digital assets to be successfully attacked by those with enough resources and determination,” said Danuloff, whose company makes an app to help people secure their information.

All of the cyber attacks appear aimed at gaining access to information from governments or potentially corporations.

“I’ve seen no indication that the aim or impact was on personal data,” Danuloff said.

“The fact that the root of this incident includes the compromise of some core security tools themselves, however, does open the potential for future uses of this exploit,” he said.

A "Cyber Security " sign is displayed in the window of a computer store in Arlington, Virginia.  A devastating cyberattack on U.S. government agencies has also hit targets worldwide, with the list of victims still growing, according to researchers, heightening fears over computer security and espionage.

The good news: There are immediate steps that you can take to make your personal information more secure.

Danuloff offered five tips on how to make your information less vulnerable to hackers.

  • Do not re-use passwords on any important accounts. “That way if the password list from Company A is stolen, hackers cannot use that list to get into your account at Company B,” he said.
  • Use two-factor authentication wherever possible, especially on important accounts.
  • Choose platforms that use end-to-end encryption for your data. “Files or photos sitting in cloud storage can be stolen,” he said. “If they’re in a database that has no keys or just one master key, all of your personal data has a much higher likelihood of being stolen, accessed, and maybe even shared publicly.”
  • Don’t give up your data to every site that asks for it. “Data that isn’t there can’t be stolen,” Danuloff said. All kinds of services ask for your address, phone number, even your Social Security number. “The vast majority of them don’t need it,” he said. So give them “alternative facts.” Use burner email accounts…Read more>>
  • Source:- usatoday
Share: