• Skip to primary navigation
  • Skip to main content

Aging Well for Life

Your Guide to Living Healthier & Happier for Longer

  • Start Here
  • About
    • About Jim
      • Legal
        • Important Disclaimers
          • Fitness and Exercise Disclaimer
          • Disclaimer
          • Medical Disclaimer
          • Opinion Disclaimer
        • Imprint
        • My Affiliate Policy
        • Terms and Conditions
  • Book
    • Buy-My-Book
    • Chapter Resources
    • Leave Your Review!
  • Resources
    • Chapter Resources
      • Why We Age
      • Habit #1- Quality Sleep
      • Habit #2 – Time Restricted Eating
      • Habit #3 – EZ CARDIO Protocols
      • Habit #4 – The Dry Sauna
      • Habit #5 – Limit Your Alcohol
      • Habit #6 – Dump Refined Sugar
      • Habit #7 – Prolonged Fasting With FMD
      • Habit #8 – The Anti-Aging Sprout
      • Habit #9 – The Anti-Aging Diet
      • Habit #10 – Meditation
    • Tools For Success
    • The 10 Health Habits Success Plan Resources
    • Free PDFs
  • Blog
    • The Aging Well for Life Podcast
      • Health Span Podcasts
    • Videos
    • Just 4 Fun!
  • Help
  • Contact
    • Free Book Weekend

10: Eight VITAL Steps to Protect Yourself From Social Engineer Hackers

June 16, 2015 By jimwjensen 1 Comment

http://traffic.libsyn.com/essentialboomer/Social_Engineering_Hackers.mp3

Podcast: Play in new window | Download

Subscribe: Google Podcasts | More

These are the 8 vital steps that you must do NOW to protect yourself against social engineer hackers

UPDATE ALL SOFTWARE – First of all, update the software on ALL of your devices including your phones, kindle, pads, and computers. Updates contain the latest in security patches which are required for security software to work properly. Once done, automate any updates to ensure that these devices always have the latest updates.

DOWNLOAD A PASSWORD MANAGER that will keep your passwords and other information in an encrypted vault.  A password manager will enable you to logon to your websites securely and easily. Most enable you to use 2 factor authentication which is the process of logging into an account using first a password, and then some other process of authentication such as a security question, an email, text message or code generated from software.  A password manager will also be able to generate secure encrypted passwords. You will want to have your password manager on all of your smartphones, pads and computers where you’ll be logging into apps, websites and services on the internet.

CLICK HERE to view the top rated Password managers

SECURE YOUR EMAIL. I recommend gmail, because of it’s secure 2 factor authentication. Change your password to a generated encrypted password using your password manager. You can even create a new gmail account that is only used for notifications so you’ll know that it hasn’t been compromised.

CHANGE ALL OF YOUR PASSWORDS to encrypted ones generated by your trusty password manager. Make the passwords as long as the account will allow. That’s your first line of defense.

SET UP NOTIFICATIONS on all of your accounts and services to secure email, or text message.

CHANGE ALL OF YOUR SECURITY ANSWERS.  Security questions are often the means that these social engineers obtain access to your accounts. They first take over your email, than they try to login to your accounts and then they hack the accounts by answering your security questions from the information they gleaned from you via public records or information shared on your social media. The very best way to change your security answers is by providing the answer as an encrypted generated password via your trusted password manager.

SECURE ALL OF YOUR DEVICES with logins and encrypted passwords. Utilize the fingerprint log-in on your iPhone if it has it.

SECURE ALL OF YOUR SOCIAL MEDIA SERVICES. Facebook is often used by hackers to access your information. Go to facebook and update all of your security information. Be sure remove ALL logins by other apps. These are all potential holes for hackers. Set up these accounts using your secure email address and a encrypted generated password. Be sure to also change your FB password to a secure, encrypted generated password from your password manager.

Heads up on Instagram. It doesn’t have 2 – factor authentication and is a very susceptible to being hacked.

Also be sure to check that your twitter account has the proper email and phone numbers for verification.

Safe computing tips

Make sure that you have good up-to-date anti-virus AND anti-malware programs on your computers. Many of them will remove questionable scripts and links from suspicious emails before you can click on them.

CLICK HERE for a review and links of the best antivirus software.

CLICK HERE for a review and links of the best malware software.

Do not click on any link or image in an email or website that you are not 100% sure of.

Use search engines to find links…avoid those provided by other people on web sites or emails.

Refrain from sharing personal information on social media.

If you are hacked act quickly. Seek help as soon as fraud is detected – The more immediate a financial institution, credit card issuer, wireless carrier or other service provider is notified that fraud has occurred on an account, the sooner these organizations can act to limit the damage. Early notification can also help limit the liability of a victim in some cases, as well as allow more time for law enforcement to catch the bastards.

Chalene Johnson’s podcast – Build Your Tribe

PASSWORDS WONT PROTECT YOU
June 12, 2015
Passwords won’t protect you! | How to NOT be Hacked – Chalene Johnson’s story of being hacked by social engineers.

How to Subscribe and leave a review for The Essential Boomer podcast

Jim JensenI really appreciate your interest and support. Subscribing and leaving a review for my podcast is by far the best way to get it seen by more people. CLICK HERE to subscribe and/or to leave a review to THE ESSENTIAL BOOMER podcast on iTunes.

Thank you so much!
Jim Jensen

Listen to Stitcher

Comments

  1. Mike says

    December 28, 2016 at 5:56 pm

    Excellent advice. The essence of what you need to know. Now do it.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Login
  • Logout
  • My Profile
  • Legal Documents

Copyright © 2023 · The Essential Boomer LLC - All Rights Reserved - All Wrongs Reversed

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}