Contact Info Contact Info
Tel:
(+632) 654 0001
Office:
WEB OUTSOURCING GATEWAY
Unit 3101 One Corporate Center, Julia
Vargas Avenue, Corner Meralco Avenue,
Ortigas Center, Pasig City, Philippines

Our Blog

15
Feb

Five Tips to Secure your Files

Ordinateur, Sécurité, Cadenas, Pirate, Piratage, Vol

Image by TheDigitalWay at Pixabay

The internet and cloud technology (an ability to access files or software in any computer) is both a boon and bane. A boon for efficient communication and collaboration; a bane since your identity and files are at risks of being exposed to hackers. Here we covered how to secure your files whether you’re surfing the internet, using a project management tool or chatting in a VOIP.

Use unique passwords

Passwords are your frontline defence against possible hacking and malicious software. Craft a combo of hard to guess passwords. Avoid using sentences, words and names. Even if you’re unaware of making the best passwords, most websites, software and apps will require you to create a good one before you can sign-up.

No: Admin123

Yes: M0Nt2@$

Use two-factor checks

Two-factor checks or authentications comprise the second defence of password security. Hackers are getting sophisticated and it’s possible they can guess or access your codes. Google, for example, offers two-factor security that asks users to provide codes sent to their mobile phones. Recently, Google changed their way, instead of sending codes to smartphones, they are sending menu prompts asking if you’re accessing your account/email or not. While two-factor authentication can be cumbersome, it helps you avoid the headache of losing your precious account.

When to use two-factor.

  • You’re using a public computer (internet cafes, borrowed laptops and desktop).

  • You’re using a shared computer.

  • You’re using public wifi.

Two-factor is optional if  you’re the owner and sole user.

Use different email addresses for various accounts.

While using the same email address across social media and emails seems a great idea or even a convenient method, using one email address can make you more vulnerable to phishing and hacking. You may designate an email address to social media and another for emails. You might categorise websites and link them to different emails.

Social media – Email 1

Emails accounts – Backup-email

Web Hosting accounts – Email 3

Use back-up emails and phone number

Most email services will ask you to provide a backup email and number. Providing them is essential to avoid lost accounts due to forgotten passwords, phone numbers and birthdays. This is common if you’re using multiple emails.

Always transact with secured websites

A secure website has this padlock icon on the left side of the URL bar. Clicking it will reveal the validity of the security certificate and the issuer. Bank and other money transfer websites have these SSL certificates to ensure you’re dealing with the legit site and not the phishing site – which mimics genuine websites and is after your email, password and personal info.