11 Signs Your Computer Is at Risk of Being Hacked

No. 3 takes no time but is SO important.

how to protect yourself against hackers.
Cory Steig

You lock your house. You keep your wallet out of plain view. You're responsible with credit cards. You should treat your computer with the same caution, but even the most accountable people can make mistakes that make them susceptible to cybercriminals. We talked to top cybersecurity experts to learn the small ways your computer is an invitation for hackers, and easy ways you can protect yourself.

1 of 11
image
Getty Images
You use the same password for everything.

It's obvious, but 'fess up: Are you guilty? You absolutely must have varying passwords for all your accounts. Otherwise, if a hacker figures out one of your passwords, they know them allTo keep it easy, rely on software — like , , or  — to store them and just unlock accounts with one master password.  

Advertisement - Continue Reading Below
2 of 11
image
Getty Images
Your passwords are obvious — and weak.

No, your cat's name is not a fool-proof pick (and neither is "password123," your name and birthday, or anything else that's super easy to guess). Here's how to make and remember a strong password: Pick four common words in the dictionary and make up a story about them. So, if your words are "correct," "horse," "battery," "staple," your story could be, A horse looks at a battery with a staple in it and says, "Correct." Your characters can be nonsensical, but the story should make sense to you in your head. There's your password, and because of the story, you'll have no trouble remembering it, says  , professor of security, operating systems and networks at NYU Tandon School of Engineering. 

Advertisement - Continue Reading Below
3 of 11
image
Getty Images
Your webcam isn't blocked.

Even Mark Zuckerburg, Facebook's CEO, covers up his microphone jack and laptop camera, but it's not just famous people who should be worried, warns Cappos. The director of the FBI recently said masking your webcam when you're not using it should be as commonplace as locking your car. To do it: Place a piece of solid tape or a Post It note over the little camera above your screen. Easy! 

Advertisement - Continue Reading Below
4 of 11
image
Getty Images
You give applications way too much info.

When you install an app on your computer or tablet, it often asks for access to various tools, like the camera or microphone — but they're not always necessary, Cappos says. "Look at the permissions that you're granting them, and ask yourself, Is this something they need to have to provide me with the fun I crave?" he says. Giving an app free rein of your device means more people get more information that you can't control. Set boundaries to the bare minimum and upgrade, as needed, from there.

Advertisement - Continue Reading Below
5 of 11
image
Getty Images
You allow in-app purchases.

If your kid knows how to operate your tablet even better than you do, parental controls are a blessing, says , program coordinator of at the Family Online Safety Institute. One big one: . "Set it so that in-app purchases have to be approved with a code, or give your child an iTunes gift card to manage their money over a period of time," she suggests. This way, they're not giving hackers a one-way ticket to your bank account, and you're not spending a ton on apps and games. 

Advertisement - Continue Reading Below
Advertisement - Continue Reading Below
6 of 11
image
Cory Steig
You put off software updates.

The notifications that it's time to update your software aren't just there to annoy you, we promise. "People should think of those as your computer saying, Hey, a bunch of hackers now know how to get into your system. Please restart, and when you're back up and running, we'll make sure they won't know how to have access to it," Cappos says. Whether it's on your smartphone, laptop or desktop computer, always opt for the update — and do it ASAP! 

Advertisement - Continue Reading Below
7 of 11
image
Getty Images
You do work at a coffee shop — or the airport.

Using public WiFi when you're working on sensitive matters is not a great idea because you can't protect the files you're sending or receiving. "It's like leaving mail on someone's doorstep and hoping the right person picks it up," Cappos says. Stick to WiFi networks that have "WPA" or "WPA2" after the name, which means they're secure (Macs indicate secure networks with a lock icon, too). Secure networks automatically encrypt sites you visit, which means it jumbles up your files so a third-party can't look at your stuff. 

Advertisement - Continue Reading Below
8 of 11
image
Cory Steig
Your home WiFi network is public.

Even if you live on a secluded street, your WiFi network should be set to encrypted, not public, because anyone could still come nearby and connect to it. "Unencrypted WiFi is like sending all of your bank statements on postcards," explains , senior security evangelist with . Having a password on your WiFi might be inconvenient to visiting guests, but typing a few characters to log on never killed anyone.

Advertisement - Continue Reading Below
9 of 11
image
Getty Images
You make an account everywhere you shop.

If you tend to do all your online shopping on Amazon, it's totally fine to store your credit card info with them, says Ascombe. But you shouldn't be doing that for every place you buy an item. "Go through checkout as a guest," he suggest. This way you aren't just leaving your personal data all over the Internet.

Advertisement - Continue Reading Below
10 of 11
image
Getty Images
You click on e-mails that look legit.

Email providers have gotten better at weeding out suspicious messages before they hit your inbox, but hackers can still slip you a manipulative email and steal your information, says , executive director of the National Cyber Security Alliance. These messages usually look legitimate, and use your bank's logo or language, but ask you to do something that your bank never would, like call and provide your account information. They also almost always have a sense of urgency, and use alarming language. "If you think something looks suspicious, don't click it," he says. "Log in to your bank account's website and see if there's a problem there, too."  

Advertisement - Continue Reading Below
Advertisement - Continue Reading Below
11 of 11
image
Getty Images
You lend your computer to a friend.

It's okay to have one home computer that everyone uses, but set up separate logins so that everyone's materials are separate. And if you use a mobile device, like a laptop or tablet, be super careful of who gets their hands on the device. Someone you know could make any one of the mistakes above and open you to risk without your knowledge. Fun.

Advertisement - Continue Reading Below
Advertisement - Continue Reading Below
More From Electronics
www.velotime.com.ua

https://gefest-sv.kiev.ua

www.ac-sodan.info