#GADGETS
Safeguard Your Digital Life

How to ensure that your info is safe from hacks, leaks and disruptions.

By Kelvin Low      11 December 2020

Facebook: Your easy guide to create a secure environment for yourself and your family against cyber-crimes.

With our lives becoming increasingly connected to the internet, cyber security has never been more important in the 21st century as means to protect data, devices and networks from undesirable users. While data breaches are increasingly appearing on the news, you should take these easy steps to protect yourself and your family.

We have a chat with Check Point Software Technologies, a global cyber security solutions to governments and corporate enterprises, for tips on staying safe online.

Strong Password

“Other than choosing a strong password, it is also important to not re-use the same passwords across different accounts,” says Clement Lee, APAC Solution Architect and Evangelist.

Many people reuse the same usernames and passwords across many different accounts, so stealing the credentials for a single account is likely to give an attacker access to a number of the user’s online accounts.

Avoid Public Exposure

If you find yourself at an airport, a hotel or your local coffee shop, refrain from using their public wi-fi for sensitive transactions. Hackers can intercept what you are looking at on the web. This can include emails, payment details, browsing history or passwords.

Clement Lee adds: “Always be sure that you are using a secure wireless network. You can leverage on an “anonymised” browser and privacy-focused search engine to improve privacy, therefore hampering the accessing of your data without permission and spying on your online activity.”

Update All Devices

Keep all of your devices updated – Any device that connects to the internet should have the latest updates. This way, you know you have the latest security patches on all devices. Updates help to reduce security flaws, also known as software vulnerabilities.

Hackers can take advantage of the weakness by writing code to target the vulnerability. An exploit sometimes can infect your computer with no action on your part other than viewing a rogue website, opening a compromised message, or file.

TOP READS

SAFRA Tampines Upgrades

Fresh from an improvement, this clubhouse celebrates the new milestone with much fanfare.

Never The Twain Shall Meet?

As two disparate food cultures, Spanish tapas and Asian hotpot could not be more different. Or are they?

Master Commander

Ruminations of National Service and fatherhood.