Of course, everybody has become aware of the recent case of FBI vs Apple, after the San Bernardino case. The government has asked for a backdoor on the Apple iOS software, alarming people everywhere and not just terrorists.

However innocent each of us might be, this does not mean that we ought to settle for less privacy online! On the contrary, online privacy is the indisputable right of everyone. So, let’s find out what the FBI vs Apple case has shown us, in terms of security:

  • Encryption Is Crucial: Sophisticated encryption is of paramount importance to online security. Especially when it comes to sending or receiving data or even when you wish to store classified information, encryption will come in handy. Without encryption, hackers and other snoopers will not have a hard time getting to the information required. Instead, when using encryption, there is an added layer of coding that might appall hackers and such due to the extra time and effort needed.
  • Be Careful of Passwords: Contrary to what many people might think, passwords are still a powerful means of protecting one’s data. In order to safeguard your privacy online, you need to pick a solid password. Do not use the same password and do not reveal the password you use to anyone – not even your best buddies or your better half! In avoidance of easy-to-guess passwords, do not use clues related to your address, your pet’s name, your work or your favorite team.
  • Engage in Two-Factor Authentication: It is really prudent to engage in two-factor authentication. This adds an extra layer of online security, to say the least. A notification sent to your mobile phone upon logging in or anything similar to that will be an extra means of protection. Google Authenticator is one such example of two-factor authentication that will enhance your feeling of online security.
  • Learn More about Devices You Use: In order to make the most out of the devices you use for connecting online, you need to be vigilant and thoughtful. Learn more pieces of information about the hardware and software you use, identifying its weaknesses and strengths. Then, make sure that your device is up-to-date, with the latest versions supported. Find out who can access your device at all times and act accordingly.
  • Check, Check, Check: Do not remain inactive and then be left wondering how you have been hacked. On the contrary, you should make sure to check regularly the banking account of yours, as well as other accounts you have for suspicious moves. The same goes for your health records. If you run a business, you need to have a crisis management outlined and apparently you ought to educate your staff accordingly. Both individuals and business, though, have to take all the proactive safety measures that will enhance online security!

Feel free to improve your online security record and may the recent case of FBI vs Apple be the beginning of better protected Internet connection for all of us!

Leave a comment

Your email address will not be published. Required fields are marked *