Pages Menu
Categories Menu

Posted by on Dec 22, 2012 in Features, Guides / Tips |

Tips to start 2013 more safely

Tips to start 2013 more safely

We barely have ten days to finish this year 2012 and start the new year 2013, a time that we usually spend on reviewing the most relevant for the year ended and think about ways we can improve to start the new year off right. One aspect in which we tend to place more emphasis is on safety , a subject of great importance and that no one should lose sight to enjoy our devices and our mobile web browsing.

With the idea that we avoid any kind of mishap or incident that threatens the security of our personal data, our email accounts or our social networking profiles, let’s take a moment to review some guidelines and tips to start the year on a safer.

Upgrade your passwords

As happened in 2011, this year we have seen more than one case of theft of passwords, for example, LinkedIn exposed passwords or to LastFM. Our password is the key to access our profile on Facebook, Twiiter, our email account or corporate applications of our company, so it is something to keep in a safe place and to emphasize something that is robust and complex guess.

Passwords are combinations of characters that, theoretically, but we know and we provide access to certain services, a key must adequately safeguard and properly select, preventing it easy to guess. In this sense, renew periodically, preventing it to be the same in all services we use, do not use obvious personal information (dates of birth, names of family, etc.) and also select a character string that requires much computational burden to guess ( strong password ) are the factors to consider for managing your passwords properly.

Among the New Year’s resolutions would not hurt to include better management of our passwords, and avoiding repeated periodically renewing the same in all services we use, tasks for which we can support in any password generator .

Tips to start 2013 more safely image 2

Improving the security of your accounts

In addition to using your username and our password, there are many services that complement its portfolio of services with some additional security measures to protect the best yet our greatest asset: our personal data.

The two-step authentication to Gmail , approvals login Facebook or check in two steps Dropbox are some of the security measures that we can take into account to enhance the strength of our services.

Use trusted services

Our personal data is a valuable asset, both for ourselves and for others who do not have very good intentions. One of the first questions we ask when we are going to give us high on a service if the information you request is acceptable compared to the service offered to us, something we discussed the other day to talk about some extensions that can be found for Chrome that precisely what they want is access to our data (requesting access to information that is not needed for the service or the functionality offered).

In other words, to use a service before we trust it and, for example, that the service we offer secure connections (via SSL ) can be an indicator of trust (which will ensure that the connection between our team and the server destination is encrypted and can not be intercepted by a third party who is listening).

My partner Barbara said the other day what to speak of commerce , before providing personal information or bank to a service it is worth reviewing the reputation of this based on comments to let other users over the network, information value that, together with the reading of the terms of service, can help us have confidence in its use.

Tips to start 2013 more safely image 3

Take time to backup

There are many users who remember the backups too late, ie when they suffer a mishap and can not recover lost data. Establish a backup policy will give us peace of mind and help our data are safe and more immune to any type of disaster, very interesting benefits that are not going to cost a lot of effort.

Among the things we can do this year 2013 is to establish a backup system for our data:

  • Inventorying our records and assess their importance
  • Choose the type of backup that we will perform (incremental, differential or full backups)
  • Establish a periodicity in performing backups
  • Select the destination of our copies (cloud services like Dropbox or SkyDrive, another hard disk, etc.)
  • Review our back occasionally to check that are being performed correctly

Adopt best practices

To protect our data while we enjoy the web browsing is important to adopt good practices that allow us to use services like Twitter, Facebook or Gmail safely.

What things should be considered? In Bitelia we discussed these issues occasionally and, among other things, it is important that:

  • Let’s review the applications and services that have access to our Twitter account (we have validated credentials), applications that have access to our profile on Facebook or activity session our Gmail account.
  • When using equipment sharing (or are in public places) do not forget to log out of the services you access (for session cookies do not remain active) or, better yet, use the anonymous browsing mode in Firefox or Chrome.
  • If you connect to Wi-Fi public review, first of all, that the services to which you are connecting is encrypted and, therefore, have enabled SSL connections in our email (Gmail and many others have activated default), Facebook or Twitter.
  • Do not share your passwords or personal identification numbers (PIN) with anyone nor have recorded in the notebooks or readily accessible by third parties.
  • Encrypt important files or hard disk of your laptop.

Tips to start 2013 more safely image 4

Check conditions before accepting services

This week we made a lot of hype about Instagram and new conditions of service (although in the end it seems to have taken a step back on the changes). When you access a service are accepting conditions of service provision that defines the borrowing company, a statement that indicates what is done with our data or information that we generate in the rig and, rarely, users often read.

It is interesting to look at these terms, despite the legalese to know in detail what happens to our information and, of course, consider whether it’s worth signing up for the service for the price they are paying (our personal information).

Tags: ,