How to make yourself unhackable

Unhackable imac on desk online securityOk, so maybe “unhackable” is a bit strong. It’s impossible to ever truly be bulletproof online. But don’t let that stop you from protecting yourself; there many easy ways to keep your online accounts, Wi-Fi network, PC, and mobile devices secure – and that’s exactly what you should do. Here are a few key things we should all have off our checklists in order to keep the bad guys (or bad software) from sneaking into our machines and wreaking havoc on our lives.

Usernames and passwords

When crafting a username for online bank accounts or other sensitive services, don’t use the most obvious choices. That means, don’t use your name, any version of your name, your dog’s name, or any version of a family member’s name – all that information is likely readily available on the Web. And don’t use any username that you’ve employed for other accounts. Instead, use something that you’ve never used anywhere else online.

Passwords may be an antiquated way to protect our online accounts. But right now, they are the only option for most online accounts and gadgets. To craft a good password (which most people don’t do) it must be complex – lower-case and capital letters, numbers, and symbols are a must. I would suggest creating an acronym for your favorite phrase, then throwing symbols and your zip code or part of your childhood phone number at the end.

For example, turn the phrase “We mean no harm to your planet” into “WMnHtYP.” Then add in a symbol or two: WMnHtYP*$. And finally, your selected number, to give you the full password: WMnHtYP*$5172. Now, do that for each of your online accounts, including apps and iTunes or other online market places.

Of course, that’s a lot to remember, and writing down passwords can be just as dangerous if there’s a chance your password document falls into the wrong hands. Another option is to use a password manager app, like LastPass or 1Password, which does much of the hard work for you.

Update: Digital Trends’ PC reviewing mastermind Matt Smith adds that turning on two-step authentication whenever possible is a must for protecting your accounts. Gmail, for example, has this; see here for how to turn it on.

Wireless router

If you connect to the Internet over Wi-Fi, you need to make sure you have a secure connection. The first step is to password protect your router. (Each router is different; so if you don’t know how to do this, look up the instructions for doing so online.) And as mentioned above, make sure it’s a good password – the more complicated the better.

The next step is to turn off “broadcasting” of your network. This will make it so your Wi-Fi router doesn’t show up in other people’s lists of available connections. Most routers have this feature, which can be accessed through the router’s management software. (You can probably download this, if you don’t have it installed.) From there, you want to turn off the option that says “Enable SSID Broadcast” (or something like that). And you’re done!

Finally, you can stay extra secure by downloading network monitoring software like Fing, which allows you to check if anyone is on your Wi-Fi connection who’s not supposed to be.

Computer

We’ve all heard of antivirus software by now, so we don’t need to get into the nitty gritty of that. But you do need to install one, if you haven’t already. And then you need to keep it running. Malwarebytes is one of the best options out there, with both a free and paid version available. (Though, at $25, I’d recommend going for the Pro version.) Another good option is Bitdefender Total Security 2013, which will cost you about $52 right now, but has a slew of features that protect everything from your home PC to your social media accounts to your online bank accounts and more.

Note to Mac users: Cybersecurity experts predict that Macs will be increasingly targeted by hackers and malware in 2013, so don’t think you’re safe just because you have an Apple-made machine. You need antivirus software, too.

Smartphone or tablet

While not as vulnerable as a Windows PC, smartphones and tablets are still susceptible to viruses. Luckily for us, there are an increasing number of antivirus products out there for our mobile devices. For Android, check out either Avast! Mobile Security, or Lookout Security & Anti-virus. For iOS, your options are more limited, but VirusBarrier is a good, inexpensive option.

General don’ts

While software is a must-have, there’s a lot you can do to protect yourself just by creating good habits. Here are a few tips:

  • Never use the same password across multiple accounts. It’s hard to do, but failing to do this makes it possible for a hacker to gain access to a multitude of your accounts, and ruin your life more easily.
  • Don’t fill out online questionnaires or quizzes that ask for information like your date of birth, hometown, mother’s maiden name, or other data that is often used for security questions.
  • When filling out a security question (in case of a lost password, for example), don’t give an easy answer. For instance, if the question is “What is the name of your first pet?” Don’t just write “Rover.” Write “Rover451” or some other variant.
  • Don’t click ads on porn sites – they are one of the primary ways malware is spread.

 Correction: An earlier version of this article recommended turning on broadcasting of your Wi-Fi network; it should be turn off broadcasting. The error has been fixed.

Computing

Adobe’s craziest new tools animate photos, convert recordings to music in a click

Adobe shared a glimpse behind the scenes at what's next and the Creative Cloud future is filled with crazy A.I.-powered tools, moving stills, and animation reacting to real-time tweets.
Computing

Protecting your PDF with a password isn't difficult. Just follow these steps

If you need to learn how to password protect a PDF, you have come to the right place. This guide will walk you through the process of protecting your documents step by step, whether you're running a MacOS or Windows machine.
Mobile

Number not recognized? Here's why you're receiving calls from 'Scam Likely'

While it may seem like a bold marketing move to tag your calls "Scam Likely," these alerts are actually your carrier's way of helping you identify scams. Here, we'll walk you through what exactly these markers mean and how you can turn them…
Social Media

Over selfies and an onslaught of ads? Here's how delete your Instagram account

Despite its outstanding popularity and photo-sharing dominance, Instagram isn't for everyone. Thankfully, deleting your account is as easy as logging into the site and clicking a few buttons. Here's what you need to do.
Computing

How to protect your iCloud account

From Chinese hacking to identity theft, it's not surprising if you're a little worried about your iCloud data. Here's how to protect your iCloud account with a few simple security steps. It will only take a few minutes, and we'll walk you…
Computing

Chrome 70 is now available and won’t automatically log you in to the browser

Google has officially launched Chrome version 70 on Windows Mac and Linux. The update introduces some new Progressive Web App integrations on Windows 10 and also tweaks the much controversial auto login with Google Account feature.
Computing

Corsair’s latest SSD boasts extremely fast speeds at a more affordable price

Despite matching and besting the performance of competing solid-state drives from Samsung and WD, the Corsair Force Series MP510 comes in at a much more affordable price. Corsair boasts extremely fast read and write speeds.
Computing

New Windows 10 19H1 preview lets users remove more pre-installed Microsoft apps

With the release of the latest Windows 10 19H1 preview build on October 17, Microsoft is letting some consumers remove more of the pre-installed inbox app bloatware from their machines. 
Computing

Apple’s 2020 MacBooks could ditch Intel processors, arrive with ‘ARM Inside’

If you're buying a MacBook in 2020, be on the lookout for a new "ARM Inside" banner. Apple is reportedly working on transitioning away from Intel processors for its MacOS lineup in favor of new custom A-series ARM-based silicon.
Social Media

Tumblr promises it fixed a bug that left user data exposed

A bug on blogging site Tumblr left user data exposed. The company says that once it learned of the flaw, it acted quickly to fix it, adding that it's confident no data linked to its users' accounts was stolen.
Computing

Microsoft patent highlights a potential VR text input system

A new patent awarded to Microsoft could lead to a new typing method for virtual reality and on Xbox consoles. The virtual radial dial puts letters within easy reach of joystick commands and offers predictive typing, too.
Computing

Ryzen shine! AMD’s next CPUs could beat Intel at gaming in 2019

AMD's upcoming Zen 2-based Ryzen 3000 CPUs could offer as much as a 13-percent increase in instruction per clock. With clock speed or core count increases, that could gave them a huge performance boost.
Computing

Samsung Galaxy Book 2 packs Snapdragon 850 into Always Connected Windows 2-in-1

The Samsung Galaxy Book 2 is set to go on sale at the start of November and should be a solid addition the collection of Always Connected Windows laptops. It packs a Snapdragon 850 and a 20-hour battery.
Computing

A ThinkPad tablet with a foldable screen could be in Lenovo’s future

Lenovo may be working on its own version of Project Andromeda. The company is reportedly working on a 13-inch tablet that can fold down to just nine inches for travel by leveraging LG Display's foldable screen technology.