5 Tips To Protect You From Hackers

How to protect yourself from cyber threats? The five essential and easy-to-implement measures revealed.

What Are New Cyber Threats
Systems are vulnerable and suffer from bugs, which have the advantage of being able to be corrected with updates. On the other hand, people are constantly making mistakes, such as opening unknown attachments or using passwords that are too simple. While informing people about good computer security practices, there will always be a number who will make these mistakes “for which there is no patch”.

Men are also creative. Hackers regularly provide proof of this. The last case in point is that of the stratagem deployed by the creators of the ransomware “Popcorn Time”. It initially targeted professionals, by encrypting their files that it was possible to recover only in return for the payment. Sometimes, individuals were infected and could not afford to pay such a sum. With each problem, a solution. The hackers, therefore, offered to recover their files for free … provided they infect 2 other people! The perfect recipe to ensure the exponential growth of this malware.

“Smart” is synonymous with vulnerable. Your smart TV or your connected washing machine can allow you to extort money from you. Indeed, if these devices are infected, you will have to pay a ransom to make them work again. This has already happened for connected TVs. Some examples are amusing: a crematorium oven control software was accessible online without any protection, and a young man had forgotten to secure access to the cameras that monitored the growth of his cannabis plants.

1 – Nothing is worth the backups!
The first advice is the most important: you need backups from your computer, your phone, and your tablet. You have to do it in a way that allows you to always recover your files even if your home is burning.


It’s the backups on encrypted hard drives that are at home, at the office or at his parents’ home. In this way, if one gets attacked by a ransomware, one can recover its data without having to pay a ransom.

2 – Updates are essential

When security flaws are detected in a software, its developers correct them through updates. They must always be installed: not only the updates of operating systems but also those of all applications on smartphones and tablets…

3 – A password manager to avoid always using the same password
A good password is long and contains several types of characters. It is therefore difficult to remember. Always using the same password is clearly not recommended but many of us commit this odd one.

Yet there is a very simple solution to this problem: password managers. F-Secure offers a solution called Key. It allows you to store your passwords securely, by encrypting them on your devices, without giving access to F-Secure (Key is free, only the synchronization option between several devices is chargeable).There are other password managers.

Do you have to change your passwords regularly? This is not necessary, especially as the password change procedure is not without risk. On the other hand, it is imperative to change them when you learn that a service has been hacked (eg from LinkedIn, with the passwords of 120 million people put on sale by the pirate on the Dark Web).

4 – VPN to encrypt its connection


When surfing via Wi-Fi, with unencrypted traffic, the VPN is used to protect you and there are easy-to-use solutions. It is an accepted idea: “Navigation is not slowed down, but it can be accelerated. As it compresses traffic and blocks sites that want to track you, navigation is a bit faster. ”

5 – Security software to block malware
A solution must be adopted to block malware (antivirus, firewall). As far as connected objects are concerned, solutions are emerging.

F-Secure is in the testing phase of its Sense solution, which will be released in the coming months. This is a kind of router that will secure all your connected objects to prevent hackers from taking control of alarms, baby cams, lights, or cars connected…