top of page

25 items found

  • How to Use Encryption to Protect Your Data

    Updated by: Junella & Stella Encryption is basically protecting your important data from people. This process hides your information into a code that can only be read by someone with the right key - simply put, it’s putting passwords in your files. In this guide we’ll show you how to use encryption to protect your data. Initiating Data Encryption Step 1: Understand Encryption. Learn about the different types of encryption, such as symmetric and asymmetric encryption , and when to use each. For more information about this, you can refer to this website . Step 2: Evaluate Your Data Security Needs. Assess which data needs protection . This might include files on your computer, emails, or data you store in the cloud. Step 3: Choose the Right Encryption Tools. Select an encryption software that fits your needs. Popular options include BitLocker for Windows , FileVault for macOS , and VeraCrypt for cross-platform use . In this guide we will be using AxCrypt , a free encryption software for Windows and Mac as an example. Step 4: Implement Device Encryption. (Optional) Turn on encryption settings on your devices. Most modern smartphones and computers have built-in encryption features that can be activated through their settings. Step 5: Encrypt Your Files. Use your software and follow its instructions to encrypt individual files or entire drives. Ensure that backups are also encrypted . Step 6: Use Encrypted Services. Opt for services that use encryption for data transmission and storage. This includes cloud services , messaging apps , and email providers . Step 7: Secure Your Encryption Keys. Keep your encryption keys secure. Use a password manager to store them, or write them down and keep them in a secure place. Step 8: Regularly Update Your Software. Ensure that all your software, especially your encryption tools, are up-to-date to protect against vulnerabilities. Waiting for Data Encryption to Take Effect Step 9: Educate Others. If you’re in a workplace or manage a team, ensure that everyone understands the importance of encryption and how to use it correctly. To know more about encryption you can go to this cloudflare   site. Completing Your Data Encryption Setup Step 10: Review and Improve Your Encryption Practices. Continually review and improve your encryption practices . Stay informed about new encryption technologies and best practices. Step 11: Verify the Effectiveness of Your Encryption. Regularly test your encryption by attempting to access your data without the proper decryption keys to ensure that it remains secure.

  • How to Secure Cloud Storage and Services: Tips for choosing secure cloud providers and protecting data stored in the cloud

    Updated by: Junella & Stella Here is a guide on how to properly secure your cloud storage and services on a popular software called OneDrive . Ensuring the security of your data is still of utmost importance despite the convenience that comes with it. Explore essential tips for the best practices on protecting data stored in the cloud. The use of two-step verification and multiple factor authentication in maintaining a safe space for your data to store in. Necessary security measures are of utmost importance to secure a safeguard for our sensitive information from unauthorized access , data breaches , and cyber threats . Using Two-step Verification with Your Microsoft Account Step 1: Login to Your Microsoft Account . Navigate to the center screen of the homepage and click on Sign Up . Access your Microsoft account by logging in with your username and password. Step 2: Go to the Advanced Security Options . Navigate to the top right corner of the Microsoft security page and click on Manage under the two-step verification textlink. Note: You can also find the Two-step verification under Additional security when you scroll down . Step 3: Set Up Two-step Verification . Read and follow the instructions shown on the screen. After reviewing the given instruction, click Next to continue on to the next step. Step 4: Select Method of Verification . Click the dropdown box to display other given options. Select which option you prefer in verifying your identity. After selecting the desired option, click Get it now or Next . Step 5: Solve the Puzzle. Identify which direction the object on the right should be looking at, depending on which direction the hand on the left image is pointing at. After carefully identifying the correct answer, click Submit and wait for the system’s verification. Step 6: Enter the Verification Code. (Alternative Email/Phone Number). If the chosen method is an alternative email address or a phone numbe r, wait until the Microsoft account security code has been sent to your given credentials. After receiving the code, kindly enter it in the space provided. Click on Next to proceed to the next step. Step 7: Download the Microsoft Authenticator App. (Application). If the chosen method is an app , go to the browser on your phone and type in aka.ms/authapp then proceed to download the app. An alternative way is to go to the App Store or Play store on your phone and simply type on the search bar, Microsoft Authenticator and click on Install . After installing the application on your mobile phone, go back to your browser and click on Next to proceed to the next step. Step 8: Set-up a Passwordless Sign-in. Using the app on your mobile phone, scan the QR code presented on your browser. If finished, click on Done .   Step 9: Finish Setting-up the Authenticator. Read and confirm the following to properly finish setting up the two-step verification with the use of email , phone number , and a phone application . [Email/Phone number] Step 10: Setting-up Multifactor Authentication on Microsoft Entra admin center . In the Microsoft Entra admin center , navigate to the far left of your screen where you can see a navigation list. Click on Identity and it will drop down a list of categories where you can find the Overview, click on it and it will present an overview of the identity settings. After that, click on Properties then scroll down at the bottom of your screen and click on Manage security defaults . Navigate at the right side of your screen and click on the dropdown box, make sure that it is set to Enabled (recommended) then Save .

  • How to Protect Yourself Against Identity Theft

    Updated by: Junella & Stella Identity theft happens when someone illegally uses your personal information to commit fraud or other crimes , which can severely impact both your financial stability and personal well-being. Before you take any steps, it's crucial to grasp just how important it is to guard your personal data and to understand the tricks thieves typically use to snatch it. If you frequently enter your personal details on online platforms or services, it's essential to boost your security settings and stay alert about where and how you're sharing your information . This guide will help you navigate the protective measures you can take to shield yourself from identity theft. Protecting Your Identity Step 1: Secure Your Personal Information From Identity Theft. Take note of where your personal information is stored and ensure it is secure. This includes physical documents and digital data. Ensure that there are both digital and written backup copies of these hidden. Step 2: Strengthen Your Passwords. Update your passwords to make them strong , unique , and difficult to guess . Use a combination of letters , numbers , and symbols .  You can use this  website if you want to check how secure your password is. Step 3: Enable Two-Factor Authentication. For added security, enable two-factor authentication (2FA) on all your accounts . This provides a second layer of security over your password.  It basically asks a code from your device for confirmation before initiating any processes. Step 4: Review Your Privacy Settings. Check the privacy settings on your social media and other online accounts. Limit the amount of personal information that is publicly accessible. Step 5: Monitor Your Financial Statements. Regularly review your bank statements , credit card statements , and any other financial documents for unauthorized transactions. Step 6: Set Up Alerts. Consider setting up alerts with your financial institutions to be notified of any suspicious activity immediately. Step 7: Be Wary of Phishing Attacks. Learn to recognize phishing attempts. Do not click on links or download attachments from unknown or suspicious emails and always check for the original/official emails and links of the senders. Source from norton.com . Step 8: Install Antivirus Software. Install reliable antivirus software on all your devices to protect against malware , viruses , and other online threats . Some popular options include: Norton 360 : Known for its comprehensive protection that extends beyond just antivirus, including VPN, password management, and more. McAfee Total Protection: Offers a range of features from antivirus to identity theft protection and secure VPN. Bitdefender Antivirus Plus : Praised for its advanced protection features and minimal impact on system performance. Regularly update your chosen antivirus software to ensure it can protect against the latest threats. Step 9: Secure Your Devices. Make sure all of your electronic devices are secure. Keep your operating system up to date and use a firewall . Waiting for Verification Step 10: Regularly Check Your Bank Report. You are entitled to a free credit/debit report from your bank . Take advantage of this to check for any suspicious activity when you use it online. You can view this via physical mail delivery or even your online bank access. Step 11: Avoid Oversharing Online. Be cautious about how much personal information you share on social media and online platforms. Even little details such as your name , number , and ID ; sharing can be used to steal an identity . Completion of Protection Measures Step 12: Educate Yourself Continuously. Stay informed about the latest security threats and protection measures. Education is a powerful tool in preventing identity theft. This site  will help you understand the risks and essence of this. Step 13: Verify and Maintain Your Security Practices. Regularly update and reassess your security practices to ensure they remain effective. Adapt and research new threats and continue to guard your personal information.

  • How to Use Virtual Private Networks (VPNs) for Privacy: An explanation of VPNs, how they work, and why they are essential for online privacy.

    Updated by: Junella & Stella Our digital footprints have never been more extensive, and with that trend, online privacy has become one of our top priorities. That is where Virtual Private Networks come in — a VPN encrypts your internet connection and ensures that every digital action you take cannot be wide for all eyes to see. This comprehensive guide will explain how a VPN works and offer useful recommendations on how you can protect your privacy using one. Understanding VPNs Step 1: Understand VPNs. A Virtual Private Network or VPN is a technology that creates a private, encrypted connection over a less private network, similar to the Internet. It enables you to browse the web anonymously by hiding your IP address and encrypting your online traffic. This encryption ensures that the online activities , such as browsing history , downloads , and communication that you conduct are safe from hackers, Internet Service Providers , and governments. The device establishes a secure tunnel to your VPN server when you connect to it. When your computer sends data to the VPN server, it encrypts it, ensuring that it is impossible to intercept intermediaries and understand the data’s contents. Furthermore, if the VPN server is in a different geographic location, it is possible to connect to it by supplying a different IP address. In this scenario, your endpoint’s IP address will likewise not be revealed. A provider uses the intermediary’s IP permit education or another. VPNs ensure that your data is not intercepted by distracting parties. It helps you remain anonymous, and it makes it difficult for websites and online services to track your activities online. Furthermore, VPN enables you to access geo-restricted content, such as websites or streaming services not available in your country. In conclusion, VPN is a crucial tool that enables you to maintain your online activity private and secure. Choosing VPN Services Step 2: Choose a VPN Service. Before choosing a VPN service, it’s important to research and compare different options to find one that best suits your needs. Here’s how you can do it: Search for Available VPNs. Open a web browser and search for VPN services on a search engine like Google. You will find a list of VPN providers along with their websites. Compare Features and Pricing. Visit the websites of different VPN providers and compare their features, pricing plans, and server locations. Look for VPNs that offer strong encryption (e.g., AES-256 bit), a no-logs policy (which means they do not store your browsing history), and a large number of servers in locations that you need (to ensure fast and reliable connections). Read Reviews and Ratings. Look for reviews and ratings of VPN services from reputable sources, such as tech websites and forums . This can give you an idea of the reliability and performance of each VPN service. Consider Your  Privacy Needs. Consider your privacy needs and whether you require additional features such as a kill switc h (which automatically disconnects you from the internet if the VPN connection drops) or split tunneling (which allows you to route some of your internet traffic through the VPN while letting the rest bypass it). Check Compatibility. Ensure that the VPN service is compatible with your devices and operating systems ( e.g.Windows , macOS, Android, iOS). Look for Free Trials or Money-Back Guarantees. Some VPN providers offer free trials or money-back guarantees , allowing you to try out their service risk-free before committing to a subscription. Make Your Decision. Based on your research and comparison, choose a VPN service that best meets your needs and offers the features you require. Sign up for an account and proceed to download and install the VPN client software on your device. By following these steps, you can choose a VPN service that enhances your online privacy and security while providing reliable and fast connections. VPN Services Activation Step 3: Sign Up and Install the VPN Client. After selecting a VPN service, sign up for an account and download the VPN client software for your device (e.g., computer, smartphone, tablet). Follow the installation instructions provided by the VPN service. Step 4: Launch the VPN Client. Once the VPN client is installed, launch the application on your device. You will be prompted to log in using the credentials you created during the sign-up process. Step 5: Connect to a VPN Server. After logging in, you will see a list of available VPN servers. Select a server location (ideally, choose one that is geographically close to you for better performance) and click Connect to establish a secure connection. Step 6: Verify Your Connection. Once connected, verify that your internet connection is now protected by the VPN. You can do this by visiting a website that displays your IP address and confirming that it shows the IP address of the VPN server you're connected to. You can go to this website  to check if your connection is now VPN secure d. Step 7: Browse the Internet Securely. With your VPN connection established, you can now browse the internet securely, knowing that your online activities are encrypted and your IP address is hidden. Step 8: Disconnect from the VPN When Not in Use. When you're done using the VPN, remember to disconnect from the VPN server to resume normal, unencrypted internet browsing. Step 9: Enjoy Enhanced Privacy and Security. By using a VPN, you can enjoy enhanced privacy and security while browsing the internet, protecting your personal information from potential threats. Step 10: Stay Informed and Update Your VPN. Stay informed about VPN security best practices and update your VPN client regularly to ensure you have the latest security features and protections.

  • How to Create a Data Privacy Policy for Your Website

    Updated by: Junella & Stella A data privacy policy is important for any website as it details how you collect, use, store, and protect your visitors' and customers' personal information. Implementing this will build trust with your users. This guide will walk you through the step-by-step process of creating an effective data privacy policy for your website. Initiating the Creation of Your Data Privacy Policy Step 1: Understand the Legal Requirements. Research and understand the legal requirements relevant to your website, depending on your geographic location and where your users are based . According to Philippine law, a Website Privacy Policy should include details about the types of personal data collected, the purpose of data collection, how the data is used, data retention practices, user rights, and how users can contact the website for inquiries or complaints. Themis Partner's Privacy Policy template has been carefully drafted to incorporate all the necessary information required by the Data Privacy Act of 2012, providing a transparent and comprehensive framework for website operators to communicate their data practices to users. Step 2: Define What Personal Data You Collect. Identify and list all types of personal data your website collects. This can include names , email addresses , IP addresses , and any other user-specific data . Step 3: Explain How You Collect Data. Detail the methods used to collect data, such as cookies , registration forms , and user interactions . Take Medium's collection of information as an example. Step 4: Describe the Purpose of Data Collection. Clearly specify why you collect personal data , such as improving user experience , marketing purposes , or customer service enhancements . Take Medium's privacy policy as an example. Step 5: Detail Data Storage and Protection Measures. Explain how you store and protect the collected data . Mention any encryption , security protocols , and compliance standards you adhere to. General Motors '   website does this. Step 6: Outline the Users’ Rights. Inform users of their rights regarding their personal data, such as the right to access , correct , or request the deletion of their data . Here is an example of General Motors’ website. Step 7: Describe Data Sharing Policies. State if and how you share personal data with third parties . Be clear about the circumstances under which data might be shared. We will use the Shopify   website as an example as well. Step 8: Update and Review Procedures. Include information on how often you will review and update the policy . Explain how users will be informed of these updates. Here is an example of how Meta  informs their site user through article s. Waiting for Policy Activation Step 9: Implement the Policy on Your Site. Ensure your privacy policy is easy to access , preferably from every page of your website, typically in the footer . Step 10: Promote Transparency. Encourage transparency by informing users when the policy is updated and providing a summary of the changes in your website. Meta’s   website is a good example of this. Finalizing Your Data Privacy Policy Step 11: Keep the Policy Active and Enforced. Regularly review and update the policy to reflect new business practices or changes in privacy legislation. Implementing articles or pop-ups on your website are good ideas. Step 12: Verify Compliance. Regularly check to ensure that your website remains compliant with your privacy policy and any applicable laws.

  • How to Password Protect an Excel File

    Updated by: Junella & Stella Protecting our sensitive data is more important than ever. One way to ensure the security of our information is by password-protecting Excel files. This simple yet effective method adds an extra layer of security, preventing unauthorized access to our valuable data.  In this guide, we'll explore the step-by-step process of password protecting Excel files, empowering you to keep your information safe and confidential. For Excel 2010, 2013, 2016, 2019, and Office 3650 Step 1: Open your Excel file. Launch Excel and open the file you want to password protect. Step 2: Navigate to the File Tab . Click on the File tab in the top left corner of the window. Step 3: Click on Info . In the menu that appears, click on Info . Step 4: Choose Protect Workbook . Click on Protect Workbook . This will show a dropdown menu with several options. Step 5: Choose Encrypt with Password . Choose Encrypt with Password from the dropdown menu. A dialog box will appear, prompting you to enter a password. Step 6: Enter Password. Enter a password in the Password field provided, and then click OK . Step 7: Confirm Password. Re-enter the password in the Re-enter Password box and click OK . Step 8: Save the File. Your Excel File is now password protected. Save the file by clicking File > Save or pressing Ctrl + S . Step 9: Confirm the Protection Close the Excel file and then reopen it. When prompted, enter the password you set earlier. If the password is entered correctly, the file will open as usual, confirming that it is now protected. If an incorrect password is entered, Excel will not allow access to the file. Important Tips Step 9: Use Strong Passwords. Use a strong password that includes a combination of letters , numbers , and special characters . Step 10: Remember Your Password. If you forget the password, Excel does not provide any means to access the file , and the data becomes inaccessible. Step 11: Backup. Always keep a backup of your unprotected file in a secure location in case you forget the password. Video Tutorial: Facebook: https://web.facebook.com/share/r/m8D4n8kKQxBJwAn1/

  • How to Password Protect a PDF

    Updated by: Junella & Stella Protecting sensitive PDF documents with a password ensures their confidentiality and guards against unauthorized access or manipulation. Adobe Acrobat offers an easy method to implement this security measure.  Once protected, the PDF can only be accessed by those with the correct password, providing peace of mind regarding the safety of your valuable information. Password Protecting a PDF Step 1: Open Adobe Acrobat. Launch Adobe Acrobat on your computer. If you don't have it installed, you can download and install it from the Adobe website . Step 2: Open the PDF File. Click on the menu bar and select Open to locate and open the PDF file you want to password protect. Step 3: Access Protection Tools. Click on the Tools tab located at the top left of the window then choose Protect a PDF . Step 4: Choose Protect with Password . Click on Protect with Password . A dialog box will appear prompting you to set a password. Step 5: Set the Password. First, decide if you want to require the user to enter a password for Viewing or Editing then enter your desired password in the Type Password field and confirm it in the Re-type Password field. Step 6: File is now Successfully Protected. After clicking on the Apply button, your PDF file is now successfully protected from viewing or editing with password. Step 7: Verify the Password Protection. Close the PDF file and reopen it to verify that the password protection is working. You should be prompted to enter the password to view or edit the PDF. Important Tips Step 11: Plan or Premium Features Required. Sometimes, adding protection with a password in Adobe Acrobat requires plan or premium features . If the option is not available in your version of Adobe Acrobat Reader, consider using third-party PDF protection tools or upgrading to Adobe Acrobat Pro . Step 12: Keep Software Updated. Ensure that the software you use to create, edit, and view PDF files, such as Adobe Acrobat, is kept up to date with the latest security patches and updates . Regularly check for updates and install them promptly to mitigate potential security vulnerabilities.

  • How to Conduct a Personal Data Privacy Audit on Facebook

    Updated by: Junella & Stella In today's digital world, we rapidly share our data online, often without a second thought. Platforms like Facebook collect everything from names and emails to shopping habits; creating a detailed digital footprint . While this data-driven convenience can be beneficial, it also raises critical questions about data privacy. Data privacy acts as a shield , preventing unauthorized access to your vital information and ensuring it is processed transparently and according to your preferences . Understanding and managing your data privacy is crucial to protecting your online presence. This guide will show you how to conduct a data privacy audit on Facebook, helping you take control of your information. Access the Privacy Checkup in a Web Browser Step 1: Navigate to Settings & Privacy Log in to your Facebook account. Click your profile picture to open a menu, then select Settings & Privacy and click Privacy Checkup. Step 2: Choose a Privacy Checkup Topic The Privacy Checkup covers various aspects of data use and protection on Facebook. Choose a topic to begin auditing your data settings. Control Who Can See Your Information Step 3: Adjust the Profile Information Visibility Click on Who can see what you share? and review the settings for your profile information, posts, and stories. In this section, you can control the visibility of your personal information, such as your email, birthday, address, and workplace. For each piece of information, you have the option to set it to Public , Friends , Friends of friends , or Only me . To maximize privacy, select Only me for sensitive information. Here, you can determine who can see your future posts and stories. You can choose from Public , Friends , Friends of friends , or Only me . This section also allows you to limit the audience for your past posts by changing them from Public or Friends to Only me or another restricted audience. Review your blocked users list. If you want to unblock someone, you can do it here. Blocking helps prevent specific individuals from interacting with you or seeing your content. Once done, click Review Another Topic . Manage your Friend Requests and Profile Visibility Step 4: Navigate to How People Can Find You on Facebook After completing the previous checkup, navigate to How people can find you on Facebook?  to manage how your profile is discoverable. Another reason we need to audit this is that Facebook will use your related information about you , like your friends, your name, and your phone number, to be able to be searched on, for example, Google, a random bot, or a scammer trying to make a friend request. More so, we can protect our data privacy. Adjust settings to control who can send you friend requests, limiting it to Friends of friends or other preferences. Review any pending friend requests you have . Decide whether to accept or delete these requests based on your comfort level with the individuals. Choose whether Everyone , Friends of friends , or Friends can look you up using your email address and phone number. For increased privacy, select Friends or Only me . Decide whether you want search engines like Google to index your Facebook profile . Turning this off means only Facebook users can find your profile through Facebook search. And that's it! You're ready for the next topic, which is Account Security . Enhance Account Security Step 5: How to keep your account secure This topic discusses how to check if your password is secure and if it needs additional security and login alerts.  Ensure your password is strong, unique, and updated regularly . A strong password includes a mix of uppercase and lowercase letters, numbers, and special characters. Enable two-factor authentication (2FA) to add an extra layer of security. Facebook offers authentication apps, SMS codes, and security keys. Set up login alerts to notify you of any unrecognized login attempts . You can choose to receive these alerts via email, SMS, or through Facebook notifications. And you're all set, next topic. Data Settings and Ad Preferences Step 6: Manage Your Data Settings Manage which apps and websites have access to your Facebook data. Review the list of apps and websites connected to your Facebook account . Remove any that you no longer use or trust to prevent them from accessing your data. Check the permissions each app has and revoke any unnecessary access. This helps ensure that only trusted apps can use your data. Step 7: Configure the Ad Preferences Control how Facebook uses your data to personalize ads. While you cannot remove ads entirely, you can limit how Facebook uses your data to show personalized ads . Review and edit the interests Facebook uses to target ads to you. Decide whether to allow your friends to see your interactions with ads . You can set this to Only me if you prefer to keep your ad interactions private. That's the last part of the privacy checkup . We’ll next discuss how to download the information to take a more thorough look at the data that Facebook has gathered from you. Download Your Personal Information Step 8: Navigate to Settings Go to Settings & Privacy , then  Settings , and scroll to Your Information . Click Download your information and then the continue button. Step 9: Finalize Download You will see Current Activity or Scheduled , but for now, click Download or transfer information . Select the account or profile that you want to get information on, and then click Next . Select the types of data you want to download, such as posts , messages , photos , and more . You can choose to download all your data or specific categories. Click Download to device , but you can also transfer your data. Remember, if you are going to download your information, make sure you have enough storage to accommodate it. It will give you an overview before they compile your information . You have the choice to change the data range , notification , and the format and quality of the data you want to get; the higher the years, the bigger the storage you need. Once done, simply click Create Files . Step 10: Download Your Data After selecting the desired data and settings, click Create File . Facebook will compile your information and notify you when it’s ready to download. Click the Download  button. You will be prompted to enter your password to verify your identity. Once verified, Facebook will generate and download a file containing detailed information about your activities on the platform, as well as data they have collected about you. Check your Activity Log Step 11: Audit the Activity Log Navigate to Settings & Privacy  and access the Activity Log  to review what data Facebook has collected from your activities. Check various categories to ensure no unexpected data usage. This is another method to review the data Facebook has collected from you, providing a different aspect of a data privacy audit. You can click on any category of data you are concerned about regarding your privacy. For instance, if you select Search History , Facebook will display a list of your searches made through their search bar. Due to privacy concerns, I can't share specific examples, but I encourage you to explore these categories to understand how Facebook collects and uses your data. Video Tutorial: Facebook: https://www.facebook.com/share/r/waCpvjGyb5poDZLy/

  • How to Change Password on Facebook

    Updated by: Junella & Stella Changing your password is a step in securing your Facebook account. It should be updated occasionally to protect your personal information and prevent unauthorized access. In this guide, we will walk you through the steps to change your Facebook password using different methods.  Change the Password in the Accounts Center Step 1: Navigate to Settings Log in to Facebook, click your profile picture, and from the drop-down menu, click Settings & Privacy , then Settings . Step 2: Find the Account Center You can find the Account Center at the top by clicking it. You can also search for it if you can't find it easily. Step 3: Password and Security Navigate to Password and Security  under the Account Settings . Step 4: Click on Change Password In the Password and Security  section, click Change Password at the top. Step 5: Select a Profile You will see a list of Meta accounts. Click the account for which you want to change the password. Step 6: Input the Details Needed To change your password, enter your current password and then your new password . If you don’t remember your current password, click Forgot password . Facebook will provide verification options before resetting your password. Change the password in Privacy Checkup Step 1: Navigate to Settings & Privacy Click on your profile picture again, then select Settings & Privacy,  followed by Privacy Checkup . Step 2: Account Settings Find and click on How to keep your account secure  under Account Settings. Step 3: How to Keep Your Account Secure Review the topic and click  Continue . You will see a window titled  Is your password private?  With tips on creating a more secure password. Click  Change Password. Step 4: Input the New Password Enter your current password, then type your new password. Once done, click Save Changes . Video Tutorial: Facebook: https://www.facebook.com/share/r/EqDXxk3GnQBCi6Tg/

  • How to Manage and Secure Passwords Effectively

    Updated by: Junella & Stella Here is a guide on everything you need to know about the importance and necessity of properly managing your passwords in every account. You will learn some tips and practices to create your password effectively. We will take you to a step-by-step tutorial to better understand the benefits of using a password manager and securing your login information. Enjoy the wonderful ways to organize and store your data while having a fortified defence against cyber-attacks. Creating a Strong Password Step 1: Create a Bulletproof Password. In creating a password, there are several things you need to keep in mind. The longer your password, the better . Use a mix of characters, including special characters and use upper- and lower-case letters. Also, avoid adding actual words , make it hard for anyone to guess it, and don’t include any personal information on your password. It is also important to be mindful of who sees your password, and never tell anyone about it. Step 2: Avoid Having a Default Password. Ensure you’re not using a single password for every account you have . It can lead to a scenario where when a hacker finds out the password of one of your accounts, it would be easy for them to hack into your other accounts. Step 3: Use Multi-Factor Authentication. Using multi-factor authentication can help secure your password . Even if you have a not-so-strong password, the multi-factor authentication will serve as another layer of protection to help ensure the security of your account.  Using a Password Manager Step 4: Manage your Account Using a Password Manager Using a password manager tool can be a huge help in organizing your passwords . It lets you store your passwords and provides several ways to back up your passwords and will help you easily access them across different systems. There are tools like: 1Password Dashlane LastPass Keeper Keeping Login Information Secure Step 5: Secure your Login Information Securing your login information also includes updating your credentials . It’s better to update your passwords monthly to ensure their privacy. Avoid storing your username and password on operating systems, and other unauthorized applications, websites, and browsers.

bottom of page