How to Protect Your Online Accounts

NB Technology, LLC.

Dec 20, 2022

Image of a virtual padlock screen

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For example, hacked social media accounts will go for between $30 to $80 each.

The rise in reliance on cloud services has caused a big increase in breached cloud accounts. Compromised login credentials are now the #1 cause of data breaches globally, according to IBM Security’s latest Cost of a Data Breach Report.


Having either a personal or business cloud account compromised can be very costly. It can lead to a ransomware infection, compliance breach, identity theft, and more.


To make matters more challenging, users are still adopting bad password habits that make it all too easy for criminals.


For example:

  • 34% of people admit to sharing passwords with colleagues
  • 44% of people reuse passwords across work and personal accounts
  • 49% of people store passwords in unprotected plain text documents


Cloud accounts are more at risk of a breach than ever, but there are several things you can do to reduce the chance of having your online accounts compromised.



USE MULTI-FACTOR AUTHENTICATION (MFA)

Image of a computer network pathway

Multi-factor authentication (MFA) is the best method there is to protect cloud accounts. While not a failsafe, it is proven to prevent approximately 99.9% of fraudulent sign-in attempts, according to a study cited by Microsoft.


When you add the second requirement to a login, which is generally to input a code that is sent to your phone, you significantly increase account security. In most cases, a hacker is not going to have access to your phone or another device that receives the MFA code, thus they won’t be able to get past this step.


The brief inconvenience of using that additional step when you log into your accounts is more than worth it for the bump in security.


USE A PASSWORD MANAGER FOR SECURE STORAGE

One way that criminals get their hands on user passwords easily is when users store them in unsecured ways. Such as in an unprotected Word or Excel document or the contact application on their PC or phone.


Using a password manager provides you with a convenient place to store all your passwords that is also encrypted and secured. Plus, you only need to remember one strong master password to access all the others. 


Password managers can also autofill all your passwords in many different types of browsers, making it a convenient way to access your passwords securely across devices.


REVIEW/ADJUST PRIVACY & SECURITY SETTINGS

Have you taken time to look at the security settings in your cloud tools? One of the common causes of cloud account breaches is misconfiguration. This is when security settings are not properly set to protect an account.


You don’t want to just leave SaaS security settings at defaults, as these may not be protective enough. Review and adjust cloud application security settings to ensure your account is properly safeguarded.


USE LEAKED PASSWORD ALERTS IN YOUR BROWSER

You can have impeccable password security on your end, yet still have your passwords compromised. This can happen when a retailer or cloud service you use has their master database of usernames and passwords exposed and the data stolen.


When this happens, those leaked passwords can quickly end up for sale on the Dark Web without you even knowing it.


Due to this being such a prevalent problem, browsers like Chrome and Edge have had leaked password alert capabilities added. Any passwords that you save in the browser will be monitored, and if found to be leaked, you’ll see an alert when you use it.


Look for this in the password area of your browser, as you may have to enable it. This can help you know as soon as possible about a leaked password, so you can change it.


DON’T ENTER PASSWORDS WHEN ON A PUBLIC WI-FI

Whenever you’re on public Wi-Fi, you should assume that your traffic is being monitored. Hackers like to hang out on public hot spots in airports, restaurants, coffee shops, and other places so they can gather sensitive data, such as login passwords.


You should never enter a password, credit card number, or other sensitive information when you are connected to public Wi-Fi. You should either switch off Wi-Fi and use your phone’s wireless carrier connection or use a virtual private network (VPN) app, which encrypts the connection.


USE GOOD DEVICE SECURITY

If an attacker manages to breach your device using malware, they can often breach your accounts without a password needed. Just think about how many apps on your devices you can open and already be logged in to. 


To prevent an online account breach that happens through one of your devices, make sure you have strong device security.


Best practices include:

  • Antivirus/anti-malware
  • Up-to-date software and OS
  • Phishing protection (like email filtering and DNS filtering)


LOOKING FOR PASSWORD & CLOUD ACCOUNT SECURITY SOLUTIONS?

Don’t leave your online accounts at risk.


We can help your business (whether it's based in Gastonia, Belmont, Mount Holly, Dallas, Charlotte, or anywhere in NC) to review your current cloud account security and provide helpful recommendations.


Contact us at (704) 644-1220 for a no obligation consultation to discuss your managed cloud services and cybersecurity needs and any inquiries you may have.

Article used with permission from The Technology Press.

Image of a checklist
By Blogger Admin 07 May, 2024
This MS Teams setup checklist can help you get started using this 365 productivity and collaboration app.
Switching to a VoIP phone system
By Blogger Admin 30 Apr, 2024
These are 8 business advantages of switching from a traditional to a VoIP phone system.
Image of a bring your own device (BYOD) policy in action
By Blogger Admin 23 Apr, 2024
Find out the top 12 tips to help your business overcome barriers to a successful bring-your-own-device (BYOD) program.
Cybersecurity being implemented for a small business
By Blogger Admin 16 Apr, 2024
There are many benefits of having cybersecurity defenses for your business - here are hidden benefits you may not have considered.
Image of a mobile device with various app icons
09 Apr, 2024
Learn how to make your mobile devices safe from cyberattacks with these 9 best practices.
Image of a padlock with chains, indicating strong security
26 Mar, 2024
Protect your business from cyber threats like malware and learn about the steps to follow for better endpoint protection.
Cybersecurity being implemented
By Blogger Admin 19 Mar, 2024
Find out why cybersecurity is essential for business growth and how to find a cybersecurity expert.
Image of a Keep Out sign on a fence
12 Mar, 2024
Learn about the different types of insider threats and how you can stop them.
VoIP phone system
By Blogger Admin 05 Mar, 2024
Did you know that you can improve your customer service by upgrading to a VoIP phone system? Find out how to start impressing your customers and boosting efficiency.
Image of people conducting a cybersecurity audit in an office
27 Feb, 2024
Find out what a cybersecurity audit entails and 3 tips for running one successfully.
Show More
Share by: