Cyber Attack

Lessons Learned From The Yahoo Breach - 5 Ways You Can Protect Yourself From A Cyberattack

Yahoo’s database was breached quite recently and this had an impact on almost a billion people around the world. Millions of people are still being negatively affected while millions more are still going to be.

And the news gets worse. If you have not been affected yet, that does not automatically translate to you crossing the danger threshold. You can still be at the risk of an attack.

This is because the breached information is being sold to a lot of cyber pirates and the more this circulates, the more important personal information will be compromised worldwide. This can result in credit card numbers being stolen and checking accounts getting emptied.

Yahoo is not the first major corporation to be affected by such a large-scale breach. Other major companies like Sony, Target, and Home Depot have also be affected. This means that any company can suffer a major breach at any given time.

Although there is no system that is a hundred percent safe, people who have not been proactive in protecting their important personal, business, and financial data will be the biggest sufferers in such a situation.

This article will provide you with five steps of action that you should take now. These actions will vastly improve the chances of you surviving or even avoiding an online attack.

  • Constantly change and clear your login details and passwords. If you do this periodically, hackers or cyber pirates will not be able to use older login information or passwords to access your accounts.

It will be advisable for you to clear and change your data at least once in a month. If this would not be convenient for you, refreshing your details once in every quarter can also afford you some form of protection.

  • Do not use the same password for all your accounts. Rather than using something as mundane as ‘Zadey 301” for all your online platforms, you should rather employ a variety of passwords for each individual account.

Although remembering and keeping track of all these passwords is an arduous task on its own, the whole process is worth it.

Also, there are applications and software that you can use to remember all your passwords. Also, these SME applications and software can be used to access and store the information.

  • When making purchases and financial transactions only, only use your credit cards. Try not to use debit cards or online payment services for all your internet transactions.

This is because credit cards are given a higher degree of protection under federal laws.

Therefore, you can easily remedy and trace transactions made via credit card number than with any of the other available alternatives.

  • It is germane for you to avoid clicking on links that are from unknown or unverified sources.
  • At times, cyber criminals employ the names of friends or contacts to get you to click on a link that can end up being dangerous.

The name of the friend that will be used will be familiar and recognizable but the email address attached will be very unusual. Also, the message will include a URL address.

These cyber criminals will work on the basis that you will click on the embedded URL if you believe it is just a typical form of social interaction.

However, it will likely connect to Malware or another dangerous source which can lead to the freezing of your computer, the seizing of your sensitive information, or damage to your computer.

Sometimes, you may even have to pay a ransom to recover access to your own computer.

  • You should ensure that your antivirus programs and firewalls are up to date and active. If your computer is given some form of online protection, it will prevent against cyber attacks.

You should know that you are not to assume that your antivirus system is fully optimized from the very latest cyber threats.

This is because new threats come up daily and as such, you should ensure that your antivirus system is fully updated.

It is also very advisable for you to employ an hacking professional or n IT firm to protect your business against these threats.

This is because your best defence against online criminal activities is an effective proactive offense.