Go back

What to consider when using online services

18 December 2016
What to consider when using online services

Hacker’s access to the server of one of the giant companies in the world reminded us of the risks associated with the use of online services. According to the reports, the hackers have hacked over a billion Yahoo Accounts, got the phone numbers, birth dates and passwords. As Yahoo gives us the hope, credit cards’ information has not been stolen. This isn’t the first cyber attack on Yahoo. Generally, cyber attacks like those are quite frequent in our everyday life and criminals’ interests are not limited to large companies only. Thus, it’s necessary for any costumer to know the safety rules. IDIT offers several recommendations on how to make your accounts more secure:

Create a complex password

First of all, it is necessary to use a complex password. It is better to consider the following recommendations in creating a password. Use a combination consisting of:

  • Lower letters;
  • Capital letters;
  • Numbers;
  • Punctuation marks;
  • Special characters (eg: @ # $% ^ & * () _ + | ~ - = \ `{} []:"; '<> /).
  • A password should not consist of the words such as:
  • Family members, pets, names of colleagues;
  • Names of devices and its companies, websites and software;
  • Birthdays or other important dates;
  • Progressive sequence of  alphabetical characters (eg: asdfg, qwerty, 123321)
  • All of the above words, followed or preceded by a digit (eg: secret1, 1secret)

If the user finds it difficult to remember such passwords, one might use the online password storage facilities, such as 1password.com/ ,  www.lastpass.com , which have the facilities to generate and securely storage complex passwords.

It you get the information about cyber attack on the online service you use, you must change the password as soon as possible.

Activate 2-factor authentication

Popular online services, like Gmail, Facebook, Linkedin, and others use various methods of two-factor ( 2FA )  authentication for Account Security, which means either sending randomly generated code as an sms or an additional application in case of username and password matching. Only after entering the correct code can one sign into the account successfully. Using this service makes your account safer and in case of hacking, they still cannot have access to it.

Look through the HTTPS Green Line, Padlock symbol

If you pay or shop online, it is necessary to consider reputation of the site you are trying to buy products. Look at the web site address whether it has HTTPS-'s green lock symbol in the left corner or not. The method provides for the protection of the safe transfer between the Bank and the Website. It’s better not to use the websites with no HTTPS support.

Check the e-mail address Authenticity

Phishing is one of the means of obtaining personal information, i.e. creating a fake web-site, the name of which resembles a well-known web page. For example, a villain creates a visually authentic site and places on the address Facebook.asd.com, opening and entering your information (user name and password) enables the creator (criminal) to use it.  Such link is often spread through the social networks, as well as via e-mail. Thus, it is necessary to closely examine the web site addresses.

 Although there is no 100 % secure Internet Space, but by using this piece of advice you will give the hackers additional concerns, and most importantly, you will protect your own personal data.

Our team will try its best to inform you regarding the challenges and threats on the Internet.