Hacking started a semi-romantic feel back in the 80’s. It’s like a form of fascination with the ability to crack the most secure server on your home system which comes with a green text on a black background, pizza boxes being discarded and countless mugs with unfinished coffee in it. Nowadays, let us face the reality that not only the government can track our department and personal information in the Internet, but with the use of vpn service, we can avoid it. Most hackers are just normal people like us. In the recent years, there was high profile hacking cases that we heard and saw the news in Television.
There was a recorded 12.6 million victims of hacking as well as identity theft in a 12 month period between 2012 and 2013 according to Trustwave 2013 Global Security Report. It also says that there is one person being hacked after every three seconds. 98% of hacking attacks were credit cards and online transactions with over $21 billion was estimated lost to identity theft from hackers with an average of $4,900 per household. Most of the information that hackers tend to get are username, passwords, PINS, phone and utility account numbers, credit card details, employee numbers, passport numbers and other financial documentations. They get this data from having a remote access to your computer, physical theft and with the use of social media. Now let us talk about social media. There are 16% of people below 19 years old who were the victims of phishing scams, 72 % on following the links that their friends have posted, 68% for sharing their birthdate on social media networking site, and 63% of them who shared schools that they attended. Users who shared their phone numbers online got 18% and users who shared the names of their pets got 12%.
What you need to do
To avoid yourself to be the next victim, we have listed some of the things that you need to do. Be curious about what you post online and keep on reading to learn more from this article.
Protect your home network
You should start doing simple things to stop hackers from having entry to your systems. Start with your home network
Change your router’s password
The common way of getting an access to your home network is by connecting to your connection. Change your router’s password regularly so that hackers will never get any access from it. Choose passwords which are difficult to guess. Combine letters, numbers and special characters in uppercase and lowercase.
Check wireless encryption
Most routers have a level of encryption officially dynamic, yet there are a few cases where the default condition of encryption might be to a great degree feeble, or more terrible still, totally open. On the off chance that there’s a lock alongside your remote system, as seen from examining for remote systems on a PC, then you in any event have some encryption dynamic. In the event that you then get to the organization layer of your switch and it lets you know that the encryption technique is something besides WPA2, then you’ll have to change it pretty sharpish. WEP is the more established standard of remote encryption and accordingly can be broken in less than fifteen minutes through various smart devices, all of which are openly accessible. WPA and WPA2 aren’t immaculate either, yet the encryption is for the most part sufficiently intense to prevent any road level programmer.
Choose MAC Address Filter
Each system interface has a remarkable identifier known as a MAC (Media Access Code) address, paying little respect to whether it’s a PC, tablet, telephone, or recreations console. The thought behind MAC address sifting is sufficiently basic. You acquire the MAC locations of your gadgets at home and enter them into the switch so that just those remarkable identifiers can interface with your system. Clearly, in the event that you have a critical number of systems able gadgets this could take some time. Be that as it may, in principle you ought to be significantly more secure against a programmer in an auto outside your home with a portable workstation roosted on their knees. Tragically MAC locations can be hacked and ridiculed, so while the lesser programmer may surrender the more decided one will basically sidestep it. Consider MAC address sifting as putting a prickly flower bramble up against the greenhouse entryway; it might prevent most pioneers from entering your greenery enclosure, yet the individuals who truly need to get in there will discover a way.
Use Static IP Address
Naturally your switch will consequently dole out an IP Address to any gadget that interfaces with it, so the pair, and whatever is left of the system, can convey effectively. DHCP (Dynamic Host Configuration Protocol) is the name for this component, and it bodes well. All things considered, who needs to need to add new IP Address to new gadgets each time they associate with your system? Then again, any individual who accesses your switch will now have a legitimate IP address which permits it to speak with your system. So to some degree it merits considering quitting DHCP controlled IP addresses and rather designing your gadgets and PCs to utilize something like 10.10.0.0 as their scope of IP Address. Like most great hostile to hacking endeavours however, this will just back the interloper off.
Reposition your Router
You are limiting your router’s range of broadcast signal if you put it in the center of the house. We all place the router in the corner of the house near the socket and can reach the every corner of your house. If someone near your house checked for a connection then they will easily see your wireless network. If you put the router away from the window then they will get a weak signal of it and don’t even bother try connecting to it.
Switch off router if not in use
Don’t waste electricity and turn off your router if you’re not using it. You should also do this if you’re away from home.
Create strong passwords
This can apply from your social media accounts to your phone passwords and pin codes. Creating strong passwords and changing it regularly can lessen the chance of getting hacked compared to those people with weak type of passwords.
Stop sharing too much information
Learn to stop sharing personal information especially on social media networking sites. You never know that one of your friends is a hacker just waiting to get a good timing to hack your account and steal something from you.
Use a VPN
You can surf anonymously using vpn. Your vpn service will provide you a temporary IP address depending on the server location that you chose and it will mask your real IP address so that no one can trace your online activities and keeping yourself protected. VPNs have many uses and aside from providing internet security and online privacy, it can help you get the best flight deals, stream geo-restricted sites and protect yourself from hackers and scammers.