Protect Your Account From Being Hacked While Online Banking on a Public Network

An online account is an account that you register to access or use a website or application. Indeed you have an online account such as Facebook, Instagram, Google, Twitter, and so on.

Along with the increasing popularity of the online services we mentioned above, more and more threats emerge every day. One type of security threat is a hacking possibility.

In this article, we will write down several ways to protect your online account from harm.

How to Protect Online Account (Including Online Banking)

1. Be careful with your password.

Passwords can be the weakest part, which is used mainly by criminals to hack your online accounts.

So when creating an online account, create a password with a character combination that is difficult to guess. Do not use passwords such as “123456” or use dates of birth and other info that are easy to guess.

The second is not to use the same password for all accounts. You should create one password for one online account. Because if your password is the same, the hackers will effortlessly log in to all your accounts using the same password.

If you find it challenging to create a too complex password to remember, you can use the Password Manager application. With Password Manager, you can create passwords for any online account and save them. When you want to log in to an online account, the Password Manager will fill it in for you. You can secure Password Manager with one master password.

If you have continued to create easy-to-guess passwords, it’s time for you to change the passwords for each of your online accounts.

2. Use Two-Factor Authentication

With the Two-Factor Authentications feature, after logging in using a Username and Password, you also need to enter a PIN or Code. This PIN or Code will be sent to your registered email or cellular number. That way, your online account will be more secure.

2FA is widely used to secure online accounts; most banks use tokens for 2FA. Apart from being in the form of 2FA tokens, there are also those who use SMS, email, or telephone connections. If the Website/App you are using offers this feature, you should use it.

Though the 2FA method is a little inconvenient, it is suitable for your account security in the long run.

3. Logout and Clear History When Using Public Computers

Suppose you log into your online account from a public computer such as a computer at an internet cafe, school, campus, or a friend’s computer. After you finished, make sure to log out of your online account. And also, clean your web history thoroughly.

Those are some steps on how to secure your online account. And one other most important thing is never telling anyone your password or PIN. Make sure to remain private and secretive about your passwords.

4. Using VPNs

You can make another shell of protection by using a VPN service. While blocking you from malicious sites, it also grants additional security via masked IP, so your original address won’t be easily tracked. Another benefit you can gain from it is that you can even use it to unlock YouTube from anywhere, in case it’s blocked from your region.

5. Check Account Connections to 3rd Party.

Some websites and applications offer convenience in logging in or registering using social media accounts such as Facebook, Google accounts, etc. This way of logging in using the member system from the 3rd Party is straightforward for users; as for developers, this method can quickly attract new members.

As an account owner, check the connected applications to your online account; you need to check some things to include the website’s familiarity and the connection when you close them.

6. Update Applications & Operating System Periodically.

Application Developers periodically update applications, both to maintain the quality and content of the application as well as to patch security issues. Do updates regularly, especially for updates related to security. If you don’t want to update manually, make sure automatic updates are turned on.

7. Check The Plugins

Same with software, some plugins come with good purposes, while the others also arrive with good intentions while secretly doing evil. Before you install the plugin on the browser, read the reviews. Also, don’t forget to update regularly.

8. Limit Information Shared

Although the purpose of social media and other online accounts is for variety, it’s a good idea to limit the information that is shared. Sometimes we unknowingly share confidential information or relating to how to access our account.

For example, we list the information we actually use in the “Secret Question.” This “Secret Question” is still often used to reset passwords for online accounts. If you write on social media the answer to that particular question, likely, hackers would happily access your account.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...