There is nothing, hardware or software, that is unhackable.
Let’s get that out of the way right off the bat. If a hacker — a real
hacker, not someone with a set of easily available hacking tools —
really wants your information, they will get it. The same can be said
for the NSA or any other state-sponsored organization.
This is a guide to help you deter the type of
people degenerates that recently forced their way into
celebrity iCloud accounts to pull down private photos. Whether they used
brute force to guess the password or an
off the shelf piece of software,
a combination of these precautions could mean the difference between a
mild inconvenience (like having to change a password) and having your
personal information (including photos) plastered all over the Internet.
And the Internet never forgets.
And it’s not going to get any better. While news of the celebrity hack is still fresh in our minds,
Home Depot
is investigating its own hacking related issues. The hackers are
winning right now. Even Apple has informed developers that they
can’t store
HealthKit data in iCloud.
So defend yourself against the jerks and sociopaths.
Passwords and Password Managers
A strong password is a good first step to securing your data. But you
need to do more than just use a combination of letters and symbols. To
reduce the chances of having your password guessed or brute forced, use a
password manager and use a randomly generated alpha-numeric password that’s at least 20 characters long.
LastPass,
Dashlane,
RoboForm,
mSecure and
1Password are cross platform services that work via the mobile Web in addition to native apps.
Not only will it generate random passwords, it will warn you when
you’re using the same password on multiple sites, a huge security error
that many of us are guilty of committing. If you would rather manage
your own passwords, make sure they are all different. When you use the
same password everywhere, when one site or service is compromised,
suddenly the hackers have access to your entire digital life.
Two-Factor Authentication
Two-factor authentication acts as stop-gap when a new device tries to
log into a service or site. For example, with Twitter’s two-factor
authentication feature enabled, when you try to log into your account
with a new device, it sends you a text message with a temporary
password. In other words, you can’t log into an account without your
phone and the temporary password sent to that phone.
You’ll be alerted when someone is trying to get into your account even if they have your password.
Apple,
Twitter,
Dropbox,
Microsoft and
Google all use two-factor authentication. Set these up for extra security.
Don’t Back Up Sensitive Data or Your Phone Online
The cloud is
supposed to be secure. This weekend we learned,
not so much. If you’re dealing with sensitive images, documents, or
videos, its best to keep them off all external servers. That means not
allowing services like iCloud, Dropbox, Flickr, Google Drive, an
d others
to auto-upload data to their cloud storage. Instead, keep that
sensitive data on an external drive that’s only accessed when you’re
offline.
Wickr CEO
and co-founder Nico Sell warns that there are all kind of dangerous
websites out there with malware that could compromise your computer and
give a hacker access to your data.
This also means not backing up your smartphone to the cloud. Those
backups are a treasure trove of data. Everything about you is in that
backup. Keep it password protected and local.
Don’t Link Accounts
When Wired’s Mat Honan
suffered a hack
of his entire digital life in 2012, one of the side victims of his
hacking was Gizmodo’s Twitter account. Honan had linked his personal
account to Gizmodo’s when he had worked for the publication. When his
account was compromised, by proxy so was Gizmodo’s and both accounts
began tweeting the nonsense usually associated with hacked Twitter
accounts.
In a world where Facebook Login is commonplace and some apps and
services only work if you use your Facebook Login credentials, it’s
difficult to keep accounts separated.
Facebook does offer two-factor authentication so
there’s at least a stopgap for the entry into all those linked
accounts. But if it’s possible, use a separate account for everything
each with its own unique login and password information. It’s also a
good idea to see which apps you have linked to your
Facebook and
Twitter accounts and remove ones that you no longer use.
Security Questions
At some point these made sense. Probably before social networks had
us sharing all our personal information with friends, family and then
eventually the world. Now security questions like “What’s your mom’s
maiden name?” and “What’s the name of your favorite movie?” are easy to
answer by anyone that knows how to use Google, since we’ve shared most
of that information online. Instead of answering truthfully, come up
with unique answers that make zero sense in context. For example:
“What’s your favorite food?” could be answered with Buster Table.
Make sure it’s something memorable that has nothing to do with the actual question.
Misinformation
Since you’re already going to start answering questions with lies,
you might as well make your online persona a den of fabrications in the
name of security. “A lot of times people are disillusioned and feel
resistance is impossible and they just give up,” Sell said while talking
about people already in the thick of social networking, “the most
powerful tool going forward is misinformation.” She recommends changing
all the key things that are used by companies as security questions.
This includes your birthday, billing address, birth location, and family
ties.
Birthdates can prove to be a huge security risk. Just move your
birthday on Facebook a few days forward or back and maybe even change
the year or you can hide it. Most people won’t even notice and for those
that do, just tell them why and suggest they do the same.
Also, if you’re already friends on Facebook with family members,
there’s really no need to advertise that you’re also family. A smart
hacker can determine your mother’s maiden name via aunts, uncles,
cousins, and grandparents. Your mom doesn’t even need to be on Facebook
for her maiden name to be known.
Password Protect All Devices
This should be the first thing you do with a smartphone, tablet, or
computer. Your computing devices are just giant bags of personal
information. If any of them get stolen, why make it easier for the
culprits to steal your identity? Plus, you’re not just saving yourself
grief, but all of your contacts. Gathering email addresses is the first
step in hacking into a person’s accounts.
Site Specific Credit Card Numbers
Many
banks and credit cards offer single use
and temporary credit card numbers. Use these to your advantage. A
credit card number can be used to verify identification. In fact, when
Mat Honan was hacked all the hackers needed was the last four digits of
his credit card to establish identity. If you are using multiple cards
(all tied to the same account so you get one bill) when one account is
compromised, it doesn’t lead to a series of accounts being taken over by
hackers.
Privatize Your Website
If you own a domain name, chances are your name, address and phone number are freely available to anyone that does a
whois query.
Fortunately, you can privatize your domain registration. Go to the
domain registration site you use (the place where you purchased your
domain name). Sign in and look for the option to privatize your
information. If you can’t find the option, call the site and have them
walk you through the procedure. It’ll probably cost you a few dollars a
year, but it’s worth it.
Once again, nothing is hacker-proof if you’re targeted by a very
talented individual or state. And some of these precautions may seem
like overkill and the ravings of a someone that’s paranoid. But, if you
do everything right and it thwarts hackers before they even start, it’s
worth it.