Weinstein, now a vice president of threat research at Claroty, an industrial cyber security company. At least two different identity theft protection subscriptions, such as Experian, Equifax or Lifelock, to ensure that information is not compromised or sold online.
These services monitor financial data, such as credit card information, loan applications, and bank accounts, to ensure that information security is not compromised or sold online.
Weinstein's security practices are rarely far from it. Wendy Nather, director of information security authorities in Duo Security, has a clever number to block hackers.
"I'm using a different credit card to make it automatic [bill] payments online He said, "It's better than shopping on the street."
Nather keeps everything separate; if its If the daily credit card is violated, you do not have to change the card for each of the automatic payments. It also minimizes the potential damage that a hacker can do because it is not connected to any important online accounts.
Others focus on dividing into sections such as using different physical computers for their lives. create personal use or separate digital working, shopping and banking accounts.
Nather said he knew people on paper who would only perform certain tasks and keep him locked up in a safe.
Kevin Kosh, a partner of CHEN PR, which represents technology companies, uses a Google voice number and not a mobile phone number to get two-factor authentication texts. Two-factor authentication requires the use of a one-time code to access accounts in addition to the password.
Its logic is that if you change your SIM card – when you receive a new phone or change carriers – you don't connect to your sensitive information.
Nather and Weinstein are also great defenders. Keeping the mobile software up to date for bug fixes and security patches.
Weinstein said he knew some people who completely eliminated email because of high risk of e-mail and malware.
Although this is not a reasonable solution for most people, he said that an area where people can take a more cautious approach is with home routers.
"Most people get them through the internet service provider and they don't prioritize security," Weinstein said. Said. "Consider buying a home router like any other technology you care about. It's more than just giving you wireless access. Security should be part of the equation."
These routers can be easily attacked and have access to sensitive information, because most people feel safe using computers in a protected network.
However, Weinstein warned us not to take any security measures, such as e-mailing personal servers.
Sonra It's what people do to be safe, and then the kickback ends, “he said. "If you don't have a state-of-the-art facility and a 24/7 study center that supports it, you won't be able to compare the security level with something that's commodified as Gmail."
Nather agrees, "If you're paranoid enough, you'll never prove you don't trust yourself."
He said there were some things that need to be done from the bat., 2-factor authentication and password manager installation passwords, such as. But "unless you know you are at high risk, be a government official or a senior executive, you probably won't."