- August, 9th
Never use public, airport or hotel WiFi
While it is usually free, convenient and easy to access, connecting to public WiFI is usually not recommend. Hackers may be connected to the network monitoring your activity, allowing them to easily access your device, capture login details and take over sessions. Avoid using public Wifi and stick to 4G where possible.
Disable Bluetooth when not in use
Many high profile celebrities have become a victim of Bluetooth snipping, where a device such as a mobile phone, tablet or laptop with Bluetooth enabled can become vulnerable to attack. A compromised phone can allow hackers to access text messages, photos and videos. So when not in use its best to turn your Bluetooth off.
Choose secure passwords
While we are told time and time again to have secure passwords many continue to fall back on easy memorable passwords. Our recommendation is to decided on 3 or 4 passwords and use them for different tiers of security, Tier 1, maybe banking, Tier 2 maybe social media, Tier 3 maybe online shopping and Tier 4 maybe news/random websites you might sign up for.
Many people use the same “secure” password across all platforms should one get compromised and store your password in plain text your other accounts maybe at risk. For Tier 1 platforms that allow it, maybe implement 2Form Factor authentication for that added level of protection.
Review your privacy settings on social media
As we have seen recently with Facebook in court, the privacy settings are constantly evolving on Social Media and ensuring your settings are appropriate are essential. Sharing location, information and photos with friends is one thing. But should your settings not be set correctly these may share with friends of friends or the public. This may lead to identify theft or compromise your reputation.
Review photos and comments before sharing online
We see this time and time again in the news, celebrities and high-net worth influencers posting pictures or comment on social media without thinking about the consequences. Before posting photos online consider all elements of the photo? Other than looking great, is there anything in the background that may compromise your reputation? Does the comment however innocent potentially compromise your reputation.
Set pins on your phone and voice mail
Many of us with iPhones are used to visual voicemail and don’t even know our voicemail pin. However these are usually set as default numbers by the network provider and can be easily guessed. As a high profile target your voicemails can be a huge source of information, we highly recommend resetting any voicemail pass code to a more complex code.
Never open suspicious attachments, emails or links
Why is this important, people are teased to open attachments or click on links which installs malware. This malware can allow hackers to take over your PC or access your data. This might result in personal information, pictures or videos being used in black mail or released to the public.
Avoid saving pictures and videos you would not want to be public on your phone
While phones should be secure, inevitably we have seen numerous cases there photos and videos have been taken from the phone. Either directly or via a synced device or cloud storage. Our recommendation is assume any photo/video you capture on your phone or tablet has the possibility of becoming public. So avoid capturing anything you feel might compromise you now or in future if it was to be released to the public. OR use an isolated device and keep the photos/videos in a controlled environment.
Avoid syncing you mobile to different cars
When travelling and hiring a car, everyone all to quickly will jump in the car and sync their phone. One thing you might not know is the head unit of a car have NO delete function coded. So your address book, messages etc will always remain synced into that car.
If calls do need to be discreet purchase a separate pay as you go phone
When making a call or sending a text, you must assume this information could be made public. Your phone provider will always keep a record of who/when you called, and a copy of the message you send. Should you have specific calls or messages you want to send that might compromise you should it be made public, purchase a pay as you go phone. A burner keeps these communication anonymous and can be disposed.