For so many of us, cell phones and computers are embedded in our personal and professional lives. We talk and text, we browse the web, we watch, and we create. Our devices store a lot of personal information, so it’s a good idea to take a few minutes to make sure your computer, phone, and other connected devices are protected.
Update your software
Software developers release updates — to software, operating systems, and internet browsers — to patch vulnerabilities before attackers can exploit them. Some programs are pre-set to update automatically.
Check your settings and turn on automatic updates to keep up with the latest protections against security threats.
If your software is not set to update automatically, you’ll have to update it manually.
The same principles apply for your phone: set it to update automatically. Otherwise, keep an eye out for updates, and don’t delay in running them.
Update your apps, too.
Protect your accounts
Besides securing your devices, protect your accounts. Start with strong passwords and enable multi-factor authentication.
When it comes to passwords, longer is stronger: at least 12 characters. You could use a passphrase of random words to help you remember it — but avoid common words or phrases. If your username and password are leaked in a breach, having multi-factor authentication enabled will make it harder for a scammer to get into your account. For more, check out this password checklist.
Back up important data
As an extra precaution, back up your important data. Save your files to an external storage device, like a USB flash drive or an external hard drive. Also, save your information with an online cloud storage service.
Get more advice about protecting your devices and your accounts.
The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.
- We won’t post off-topic comments, repeated identical comments, or comments that include sales pitches or promotions.
- We won’t post comments that include vulgar messages, personal attacks by name, or offensive terms that target specific people or groups.
- We won’t post threats, defamatory statements, or suggestions or encouragement of illegal activity.
- We won’t post comments that include personal information, like Social Security numbers, account numbers, home addresses, and email addresses. To file a detailed report about a scam, go to ReportFraud.ftc.gov.
We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.
THANK YOU! GREAT INFORMATION
Thank you very much for looking out for me and my absent minded knowledge of my phone, laptop and ;-)pads.
I use Kaspersky, RUSSIA BASED COMPANY, for my system security. Should I move it to another non Russian based system?
Remember - if you didn't request it - don't click it!
Good advice and common sense ideas. Our greatest threat is to do nothing!
Thank you for Info