None of the network users will be able to guess exactly when they will encounter the hackers. But it’s very real to effectively defend against them. And it’s not as hard as it looks. All you have to do to protect yourself from cybercriminals is follow the basic rules of the network.

Rule one. Use multi-factor authentication…

All serious Internet resources today are implementing multifactor authentication. It can be different. The most common is to enter a code from a text message sent after entering a password to an account. This authentication enhances the security of any account. Even if the fraudster has access to the victim’s email and knows the password to the account, the fraudster won’t be able to access the account without the special code coming from the real owner of the account in the SMS or application.

Rule number two. Use different passwords on sites

Research shows that a huge amount of information accumulates on the network, created from a variety of leaks. Many users do not bother and use one login and one password for many sites. This makes it easier for hackers who try to crack different accounts on the victim, assuming that they are using the same username or password. For security reasons, come up with different logins and passwords for each site. This will make it much harder for hackers to work.

Rule number three. Do not distribute confidential information about yourself on social networks.

Personal information left about a person in social networks is a find for crooks. You should not spread about yourself and your relatives. Do not list birthdays, first names, places of work or study, sports preferences, other hobbies, religious or political views. This information may be used by you or your relatives as a guide to recovering passwords. It is therefore better to refrain from publishing such information.

Rule four. Use different control questions

Any serious resource uses a control question to restore access to the account. For example, Yandex, to restore the password to the account, as a control question may ask for the name of your favorite musician. To protect against hackers, you can cheat and use improbable information. For example, the question «Your favorite bus number?» can be answered by «Maxim Galkin». This makes it harder for hackers to hack into an account, even if they have collected enough information about a person. Secondly, do not use the same question on all sites. This makes it easier for hackers.

Rule five. Use only secure connections

The http protocol is gradually becoming a thing of the past. But many sites still use it. The danger is that this transmission channel is easily tapped. So all the information that is transmitted through it is available to third parties. If you are concerned about the security of your network, then do not use the http protocol at all. When visiting the site, switch to the https protocol. If it is problematic to do so, use VPN when connecting to such resources.