How to Protect Your Online Accounts

NB Technology, LLC.

December 20, 2022

Image of a virtual padlock screen

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For example, hacked social media accounts will go for between $30 to $80 each.

The rise in reliance on cloud services has caused a big increase in breached cloud accounts. Compromised login credentials are now the #1 cause of data breaches globally, according to IBM Security’s latest Cost of a Data Breach Report.


Having either a personal or business cloud account compromised can be very costly. It can lead to a ransomware infection, compliance breach, identity theft, and more.


To make matters more challenging, users are still adopting bad password habits that make it all too easy for criminals.


For example:

  • 34% of people admit to sharing passwords with colleagues
  • 44% of people reuse passwords across work and personal accounts
  • 49% of people store passwords in unprotected plain text documents


Cloud accounts are more at risk of a breach than ever, but there are several things you can do to reduce the chance of having your online accounts compromised.



USE MULTI-FACTOR AUTHENTICATION (MFA)

Image of a computer network pathway

Multi-factor authentication (MFA) is the best method there is to protect cloud accounts. While not a failsafe, it is proven to prevent approximately 99.9% of fraudulent sign-in attempts, according to a study cited by Microsoft.


When you add the second requirement to a login, which is generally to input a code that is sent to your phone, you significantly increase account security. In most cases, a hacker is not going to have access to your phone or another device that receives the MFA code, thus they won’t be able to get past this step.


The brief inconvenience of using that additional step when you log into your accounts is more than worth it for the bump in security.


USE A PASSWORD MANAGER FOR SECURE STORAGE

One way that criminals get their hands on user passwords easily is when users store them in unsecured ways. Such as in an unprotected Word or Excel document or the contact application on their PC or phone.


Using a password manager provides you with a convenient place to store all your passwords that is also encrypted and secured. Plus, you only need to remember one strong master password to access all the others. 


Password managers can also autofill all your passwords in many different types of browsers, making it a convenient way to access your passwords securely across devices.


REVIEW/ADJUST PRIVACY & SECURITY SETTINGS

Have you taken time to look at the security settings in your cloud tools? One of the common causes of cloud account breaches is misconfiguration. This is when security settings are not properly set to protect an account.


You don’t want to just leave SaaS security settings at defaults, as these may not be protective enough. Review and adjust cloud application security settings to ensure your account is properly safeguarded.


USE LEAKED PASSWORD ALERTS IN YOUR BROWSER

You can have impeccable password security on your end, yet still have your passwords compromised. This can happen when a retailer or cloud service you use has their master database of usernames and passwords exposed and the data stolen.


When this happens, those leaked passwords can quickly end up for sale on the Dark Web without you even knowing it.


Due to this being such a prevalent problem, browsers like Chrome and Edge have had leaked password alert capabilities added. Any passwords that you save in the browser will be monitored, and if found to be leaked, you’ll see an alert when you use it.


Look for this in the password area of your browser, as you may have to enable it. This can help you know as soon as possible about a leaked password, so you can change it.


DON’T ENTER PASSWORDS WHEN ON A PUBLIC WI-FI

Whenever you’re on public Wi-Fi, you should assume that your traffic is being monitored. Hackers like to hang out on public hot spots in airports, restaurants, coffee shops, and other places so they can gather sensitive data, such as login passwords.


You should never enter a password, credit card number, or other sensitive information when you are connected to public Wi-Fi. You should either switch off Wi-Fi and use your phone’s wireless carrier connection or use a virtual private network (VPN) app, which encrypts the connection.


USE GOOD DEVICE SECURITY

If an attacker manages to breach your device using malware, they can often breach your accounts without a password needed. Just think about how many apps on your devices you can open and already be logged in to. 


To prevent an online account breach that happens through one of your devices, make sure you have strong device security.


Best practices include:

  • Antivirus/anti-malware
  • Up-to-date software and OS
  • Phishing protection (like email filtering and DNS filtering)


LOOKING FOR PASSWORD & CLOUD ACCOUNT SECURITY SOLUTIONS?

Don’t leave your online accounts at risk.


We can help your business (whether it's based in Gastonia, Belmont, Mount Holly, Dallas, Charlotte, or anywhere in NC) to review your current cloud account security and provide helpful recommendations.


Contact us at (704) 644-1220 for a no obligation consultation to discuss your managed cloud services and cybersecurity needs and any inquiries you may have.

Article used with permission from The Technology Press.

zero-click malware code on a screen
By Blogger Admin December 31, 2024
Stay vigilant against zero-click malware! Discover what it is, how it works, and arm yourself with effective strategies to combat this silent digital threat.
app fatigue
By Blogger Admin December 17, 2024
If you have app fatigue, that could put the security of your devices at risk. Find out how to deal with app fatigue across your organization.
Microsoft Teams Virtual Appointments
By Blogger Admin December 3, 2024
Learn how to use Microsoft Team's Virtual Appointments to schedule meetings, collaborate and stay organized.
Windows 8.1 support
By Blogger Admin November 19, 2024
Windows 8.1 has lost all support, so here's what to do if you're still running this OS on your computer.
mobile malware code
By Blogger Admin November 5, 2024
Learn how to deal with and respond to the rise in mobile malware attacks.
Image of a technology infrastructure review
By Blogger Admin October 22, 2024
Learn what you should include in a year-end IT technology infrastructure review.
phishing scam
By Blogger Admin October 8, 2024
Find out more about how to detect whether that message you got from your CEO is actually from them, or just a phishing scam.
cyber insurance letter
By Blogger Admin September 24, 2024
Here are 4 of the latest trends in cybersecurity insurance that you should know about.
data breach
By Blogger Admin September 10, 2024
These are some of the most famous data breaches in history - check to see if your data has been breached here.
Image of someone using Google to perform a search online
August 27, 2024
Find out about these Google search tips that can help save you time and enhance your productivity.
Show More
Share by: