Page 65 - Cyber Defense eMagazine April 2021 Edition
P. 65

Encrypt hotspots from being used by other devices

          Patrick Keehan- CTO & Co-Founder

          Hotspots make your life simpler, giving you Wi-Fi, everywhere you go, at your fingertips. But if they are not
          secured, they can attack every device you have connected.

          That’s because hotspots will allow strangers without your knowledge to access data and files on your phone,
          tablet, and laptop. Protect against this by choosing a strong encryption for your hotspot, or the process of
          encoding a message. The default encryption may sometimes be outdated or not the most reliable.

          Choose the most reliable hotspot encryption for hotspots, Wireless Safe Access 2, or WPA2, to prevent this.
          Originating in 2006, according to LifeWire, WPA2 has the best data encryption option. Although internet
          users may be able to see the traffic on a WPA2 network within range, the new encryption key will secure it.



          Two Factor Authentication

          John Bailie- Head of Marketing and Business Development


          Extra steps may seem tedious but this isn’t the case for two factor authentication. This will ensure that your
          identity is checked twice and is legitimate before gaining access into your device, besides passwords it will
          give you an additional layer of security.

          A common type of two-factor authentication is one that produces a time-sensitive code that is sent via text
          message to your phone. The code is suitable for one-time use and you can access your account once you
          reach it. It’s a little more work for you, but it makes compromising your account much harder for an attacker.


          Updating your mobiles software regularly

          Nicole Allen- Marketing Executive
          You might find these updates coming up quite regularly but by keeping your mobile updated with the latest
          software updates it can reduce the chances of your phone being hacked. However, the longer you go without
          updating your phone and software the longer your data is at risk for any malware malfunction.

          In reality, in popular applications, including operating systems and browsers, many of the more malicious
          malware attacks we see take advantage of software vulnerabilities. These are massive programmes that
          need periodic upgrades in order to stay secure and stable. So rather than procrastinating over software up-
          grades, see such updates as one of the most crucial steps to secure your information you may take.

          Software upgrades may also provide new or upgraded functionality in addition to security improvements, or
          improved compatibility with various devices or applications. They can also enhance the software’s reliability,
          and uninstall obsolete features.


















             65    Cyber Defense eMagazine – April 2021 Edition
                   Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   60   61   62   63   64   65   66   67   68   69   70