Video Player is loading.
Advertisement
Current Time 0:00
Duration -:-
Loaded: 0%
Stream Type LIVE
Remaining Time -:-
1x

    Up next


    7 Cybersecurity Tips - Protect Yourself Online

    Scott Cunningham
    Scott Cunningham - 174 Views
    32
    174 Views
    Published on 04 May 2022 / In Technology

    Most people do not take very good care of their online security. Here are 7 things you can do to protect yourself better online. Take it from someone who studied IT Security, cybersecurity matters.

    This is my 519th episode/article. I put a great deal of work into this content so if you find it valuable, please do like, share, comment and subscribe!

    For passwords and emails, you want to have the fewest connections possible between them, no re-used passwords, and only one recovery email completely separate from everything. The worst thing you can do is have one email that connects to everything and gives a bad actor access to everything.

    โ€ข Passwords
    o Itโ€™s easiest to use a password manager to manage all your passwords which shouldnโ€™t be re-used if possible.
    ๏‚ง I like to use LastPass - https://www.lastpass.com/
    o Have different passwords at the very least for your more important accounts. If you donโ€™t want to have 100 passwords, you can use one for your bank, one for crypto, one for bank email, one for your crypto email, one for social media, and one for your recovery email.
    o Since there are hacks, leaks, etc. You should try to change your passwords once a year.
    o Use http://www.passwordmeter.com/ to create a good password and https://www.security.org/how-secure-is-my-password/ to see how long it would take to crack it
    o The best type of password that you can remember is 3 words with at least one capital, 3 numbers, and 1 special character.
    ๏‚ง Example โ€“ 471!girlrainbowbridgE โ€“ This would take 3 sextillion years to crack.
    โ€ข Emails
    o Use a public facing email for things that are unimportant.
    o Use multiple emails with no identifiable words that connect to you in some way for important accounts. For example, if your name is Scott Cunningham, donโ€™t use an email like scottcunningham@email.com for your bank account.
    o A good example of an email could be similar to the password style like Hillbrushpropellor@protonmail.com
    o Use an email provider that wonโ€™t penalize you like Google might. I recommend Protonmail.com
    o Donโ€™t use your bank, crypto, or recovery email for anything in public. Use your unimportant email to sign up for things.
    o You can check if your email was in a database leak or if any passwords you have connected to them were leaked: https://www.avast.com/hackcheck/#pc and https://haveibeenpwned.com/.
    โ€ข Use security and privacy services
    o Use something like a VPN for privacy and security as well as a secure browser. I like to use Brave browser because it also blocks ads and things could potentially contain something malicious and save data.
    o Limit as many permissions where possible like on social media accounts and use as many privacy options as possible. Brave browser also has privacy options you can enable.
    o Use an anti-virus software. I like Avast, but I also McAfee since it comes with Bellโ€™s internet service.
    o Also always keep your firewall on and your system up to date with the latest updates and patches for security flaws.
    โ€ข Understand social engineering
    o The most important thing you need to keep in mind is that 90%+ of โ€œhacksโ€ are just social engineering. You are most likely to run into trouble online because you were simply tricked. Whether itโ€™s by a phishing website, fake email, or anything similar.
    โ€ข Privacy & sharing personal information
    o You should share as little personally identifiable information as possible. If you are not public facing with your professional career, youโ€™re better off hiding as much private information as possible from the public. This is most important for crypto-related accounts.
    โ€ข New accounts
    o Always create brand new accounts instead of using social account logins like Google or Facebook.
    o Use platforms that donโ€™t require much information from you. (No KYC)
    โ€ข Internet usage
    o Always connect via an Ethernet cable and avoid using Wi-Fi where possible.
    ๏‚ง You can be much more easily tracked and hacked via Wi-Fi

    Do you follow any of these practices? Am I missing any or wrong about any? Let me know what you think about this in the comments below and donโ€™t forget to subscribe!
    ๐Ÿ‘‰ https://www.youtube.com/channel/UCDBycVghUbnimnzqirsU1Jg?sub_confirmation=1 ๐Ÿ‘ˆ

    *Disclaimer: This is not financial advice and is purely for entertainment purposes. What you see, hear, or read is my personal opinion, and any statements made are based on my views and should not be misconstrued as fact. My crypto portfolio may or may not be simulated*

    ๐Ÿ‘ฅ Support Me & Follow Me Elsewhere ๐Ÿ‘ฅ
    ๐Ÿ‘‰ http://www.scottcbusiness.com
    Ask questions in my Telegram: https://t.me/cryptoandthings
    You can find all of my referral links here: https://linktr.ee/scottcbusiness

    ~ Sponsors
    - My top $SCB donors are Publish0x, Ralak, & JustyDoan on Memo.cash
    - This video was sponsored by CakeWallet
    - Also if you want to trade cryptocurrency futures, then check out my other video sponsor MyCoinStory: https://mycoinstory.com/register/f33bee63
    #cybersecurity #tech #technology #antivirus #passwords #security

    Show more
    1 Comments sort Sort by

    Stephan Kreutzer
    Stephan Kreutzer 3 years ago

    6:48 I think quantum computers perform bad with brute-force attacks to find the password for a hash (as it's irreversible and a lossy conversion), but they are said to be much better with asymmetric encryption (as this is a math problem, and public/private keys being reversible, which hashes are not).

    Reply   thumb_up 0   thumb_down 0
    Show more

    Up next