=-= [摘要] -=-
Every year or so, it’s worthwhile doing an audit of your online security. The most
important accounts to protect are your bank accounts and your email accounts. Here
are some things to consider doing: – Choose strong passwords. Just as important:
don’t re-use the same password across web services. Consider using a password manager
like […]
=-=-{内容} =-=-=-=-=-=-=-=-=-=-=-=-=-=-
Every year or so, it’s worthwhile doing an audit of your online security. The most
important accounts to protect are your bank accounts and your email accounts. Here
are some things to consider doing:
– Choose strongstrongpasswordspasswords. Just as important: don’t re-use the same
password across web services. Consider using a password manager like LastPass or
1Password to generate strong, secure passwords and keep them safe.
– Add two-factor authenticationtwo-factor authentication to your important accounts.
Certainly your Gmail account, but also your Twitter account, domain registrar, etc.
– Put a PIN or unlock code on whichever phone has Google Authenticator or would
receive two-factor SMS texts. Consider enrolling your phone in Find my iPhoneFind
my iPhone or Android Device ManagerAndroid Device Manager.
– Let’s get specific on your Gmail/Google account now. Click into your account
’s security settingssecurity settings. For Google, print out backup codes for your
2-step verification and put them somewhere safe. Add a recovery email account and
phone number to your account. Check to make sure that everything looks locked down
tight, e.g. no app passwords that you don’t remember.
– Make sure you put a PIN on your phone number or cell phone voicemail. Why? If
Google or another service leaves a recovery code in your voicemail, you don’t want
hackers to access your voicemail easily by spoofing caller ID.
– In Gmail, check for any unexplained filters or forwarding rules where a hacker
could be forwarding your email to a different email address.
*Advanced techniques*
If you’re a CEO, high-profile individual, or at much greater risk of being hacked,
consider these additional steps:
– If you already enabled two-factor authentication, consider getting a Security
KeySecurity Key. Why? Because a Security Key should stop almost all phishing, even
extremely targeted “spearfishing.” Security Keys are still new, but the protection
they provide against phishing is extremely good.
– You might actually want to *remove* your phone number from Google or other account
recovery systems. Why? Humans and customer service are usually the weakest link
in a security system. Hackers may use social engineering to convince your cell phone
providerconvince your cell phone provider to add a forwarding number, then attempt
to hack your account by sending a recovery code to your phone number and listening
on new/additional number.
To be clear, the vast majority of users will be *more* protected by adding a recovery
phone number to their account. I would only remove the recovery phone number if
1) you are tech-savvy and 2) you believe that someone is likely to attempt to hack
or stalk you.
Those are my major tips. What am I forgetting, or what advice would you give to
protect your online accounts?
-=--=-=-=-=-=-=-=-=-=-=-=-=-=-===---===-=--====-=
-=-{ =-= }-=-
组:cn.edu.lang.english
标签: Personal
=-={ -=- }=-=
**链接**:
strong
https://www.grc.com/passwords.htm
----
passwords
http://xkcd.com/936/
----
two-factor authentication
https://www.mattcutts.com/blog/google-two-step-authentication/
----
Find my iPhone
https://www.apple.com/icloud/find-my-iphone.html
----
Android Device Manager
https://www.google.com/android/devicemanager
----
security settings
https://www.google.com/settings/security
----
Security Key
http://googleonlinesecurity.blogspot.com/2014/10/strengthening-2-step-verification-with.html
----
convince your cell phone provider
http://arstechnica.com/security/2014/11/cell-carrier-was-weakest-link-in-hack-of-google-instagram-accounts/
--
Feed2News:从RSS、ATOM上面转载内容到新闻组里面
作者: NewBlue < beyooo (at) GMail (dot) COM >
管理员:流星99 < liuxing99 (at) GMail (dot) COM >