fbpx
On Change,  On Rhythms

5 Ways to Strengthen Your Online Security

It’s no secret: I got hacked on Instagram.

A couple of weeks ago I learned the hard and fast truth about online security, which is not everyone is trustworthy. Aside from being a major embarrassment and hassle to get my Instagram account back under my control, it opened my eyes to the truth, I wasn’t taking my online security as seriously as I should. It’s sort of how teenagers hold the mistaken belief that nothing bad will ever happen to them because nothing bad has ever happened to them before.

Simply never experiencing something before now doesn’t mean it can’t happen at all. Before I could even wrap my brain around it, someone had gained access to my Instagram account and changed the login information. They somehow managed to gain access to my email associated with the account, as well, and changed that password too. It was an absolute nightmare to wade through darkness of not knowing what to do or who to contact or where to even begin in the process of getting my Instagram account back.

It’s a bit scary to contemplate how vulnerable we are online without the proper precautions, but there are steps we can take to shore up our online security. I hope these tips will help to never go through the experience of being hacked or even losing your Instagram account altogether. Here are 5 ways you can strengthen your online security today:

1. Use a Two Points of Contact System for Requests

    This simply means when you receive a message over social media or via email, you reach out to that person using another method, like sending a text message or giving them a call. Especially use this method when you receive messages that don’t sound like the person they’re coming from.

    I want you to feel comfortable helping people when they need it or ask for it, but don’t be taken as a fool for predators lying in wait to take advantage of your kindness. Don’t let your kindness be a weakness. Talk to them about it over the phone or meet up for a coffee chat to discuss it, but be sure to confirm with the real person what they’re requesting. This serves to protect you, as well as alert others to the possibility that they might have been hacked.

2. Use 2-Factor Authentication For ALL Online Accounts

    I recommend using a third party app, such as Google Authenticator, or highly specific security questions as your 2-Factor Authentication. Use questions and answers which cannot be gleaned from your social media profiles, i.e. birthdays, hometowns, pet names, etc. Keep these answers somewhere safe, like the notes app on your phone or computer, and never share them with anyone.

    I know you’re wondering about turning on texted codes, and while these are effective for most websites, this is not the most secure option. For example, if your Instagram account is hacked and your phone number is also compromised, those text codes to get you back into your account can be intercepted. For this reason, I use Google Authenticator for all my 2-Factor authentication needs. This is not an ad for the app. It’s what I really use for online security.

3. Change and Update Your Passwords

    I know this sounds like a silly tip, but bare with me for a moment. Updating old passwords increases security simply by their recentness. It’s less likely the password is known by people you don’t want in your account if it’s been recently updated.

    Some of my first online accounts were opened in middle school when password generators weren’t yet a tool used for online security, or if they were, I knew nothing about them. Let’s just say the passwords I managed to come up with wouldn’t cut it in today’s world.

    I’m guilty of coming up with a simple password when I first open an account, but forgetting to go back and change it to one with a higher level of security in mind. This is why I use password generators. If you already have a Google account where you save your passwords, you can easily use their password generator when creating a new one. There are other apps that perform the same function, such as Dashlane, where you generate new passwords and keep all your password and login information for multiple accounts safe and secure.

4. Use a Recovery Email or Phone Number

    A recovery email or phone number is a way for an account to alert you to activity on your account. Using recovery emails gives you another avenue to keep tabs on your account activity. For example, if your Gmail account’s password is changed and you use the recovery email function, Google can email you about the change on your recovery email. This also allows you to deny those changes when they aren’t performed by you, i.e. when your account has been compromised.

    I recommend using the email option here. As mentioned in number two, phone numbers just aren’t as secure as we’d like to believe them to be. I’m much more hesitant to respond to text messages with links or random codes when I’m not expecting to receive anything.

5. Don’t Click Unexpected Links

    Again, you’re shaking your head here, wondering why this is included on the list, but the number one way people fall victim to scams or phishing attempts is by clicking on unfamiliar links they did not request to receive. If you receive a direct message from someone including a link and an accompanying plea for help, start by asking the question, did I request to be sent this link?

    It is not mean or rude to not click on a link, even if someone is asking for your help. This tip brings us full-circle back to tip number one. Let’s say a friend randomly sends you a link on Instagram or in an email, even with an explanation, get in touch with them another way (phone call, text message, etc.) to make sure it’s a trustworthy link. It’s best to be overly cautious with suspicious or unexpected links. Best practice: Don’t click it if it’s unconfirmed.

I hope these five tips to strengthen your online security help you evaluate your current settings and get ahead of anyone attempting to gain access to your online accounts. Leave a comment below if you plan on using any of these in the future!

A special thanks goes out to my husband for agreeing to let me use his photo on this article.

2 Comments