5+1 golden rules for protecting our digital devices
The use of digital devices unquestionably makes our lives, online orientation and administration easier. However, the protection of sensitive data stored on devices requires increased precautions from all owners.
Laptops, tablets, smartphones – they have become a part of our lives, they have almost grown with us. Of course, only almost, because we might lose them or even get them stolen. In addition to financial loss, it carries a serious risk if unauthorized persons gain access to our sensitive data, primarily our usernames and passwords. Of course, you don’t even have to physically acquire these machines, you can sneak into the devices by installing malicious applications and software in order to make unauthorized bank transfers or otherwise harm the owner of the device. K&H bank recommends 7 golden rules to protect our assets:
1. Use an appropriately complex password, PIN code, biometric identification or a combination of these!
The PIN code must be at least 5 characters long, but biometric identifiers (fingerprint, face ID) or even the entry pattern can provide greater security.
The password must be at least 12 characters long, in no case should it be a meaningful word or a concept linked to the owner; include both uppercase and lowercase letters, numbers, and special characters. You should definitely consider using a reliable password safe service.
In the case of a biometric identifier, record only your own identifier.
Some antiviruses have a service that ensures that the data stored on the device can be deleted remotely in case of loss/theft. In this case, a data backup can protect you from more serious damage.
2. Update your software!
Our digital devices often recommend updating the operating system or an application or software. In many cases, these updates not only include new functions, but also improve the device’s vulnerabilities. However, the way for hackers to access sensitive data is through security holes! As a general rule, updates must be installed in all cases – even automatically – and only legitimate software and apps purchased from official stores may be run on our devices. After installation, but at least once a month, the device must be restarted.
3. Only allow justified access!
When installing applications, it is worth paying attention to what data the software requests access to. In the case of a tour app, for example, it is justified that it has access to your location data, but the same is unnecessary in the case of a music sharing service. If the application’s access requirements seem unreasonable, do not allow them, rather find another application with the same functionality.
4. Delete unused and unnecessary apps!
By exploiting the vulnerabilities of a long-forgotten and outdated application, hackers can attack the device. In addition, the deletion eliminates unjustified access rights and frees up storage space in the device’s memory.
5. Be careful with remote access!
One of the popular methods of phishers is to scare their victim into installing a remote access application. These applications are typically legitimate software that share our device with an external user. Of course, they are basically designed to support legitimate activities (for example, to support the remote assistance of the system administrator), but fraudsters also like to use them. In practice, this means that fraudsters can see the device’s desktop, folders and their contents, activities, and even perform various activities (even money transfers) on behalf of the device owner.
Therefore, if during an unsolicited phone call the caller tries to get you to download and install software on behalf of the bank, you can be sure that fraudsters are trying to scam you. Always keep in mind that financial institutions will never ask you to install an application or software on your digital device over the phone.
Related news
The security of smartphone payment is equal to that of a bank card
The majority of people in their twenties consider smartphone or…
Read more >K&H SME confidence index: The SME sector is divided – the bigger ones already see the future positively
Based on the second-quarter results of the K&H SME confidence…
Read more >K&H: Hungarian tourists have started, the mobile solution is becoming more and more popular
A significant, double-digit increase can be seen in travel insurance…
Read more >Related news
A Hungarian specialist became Danone’s Eastern and Central European sales manager
From this July, Enikő Bolyós organizes and manages the company’s…
Read more >Recent research: almost half of Hungarians do not use sun protection cream, and moreover, they do not avoid the sun in the midday hours either
According to a recent, representative research, only 8 percent of…
Read more >The GVH fined Booking almost HUF 400 million with a record fine
Booking did not fully fulfill its obligations requiring the termination…
Read more >