Life Hacker

How to Protect Your Student Laptop and Accounts From Hackers

Cyberattacks are a colossal danger, and they’re on the ascent. Understudies—particularly the people who are away from home, carrying their gadgets to class, or every now and again interfacing with public wifi—might be especially powerless against hacks and cybercrime. This is the way they can try not to turn into a survivor of a cyberattack.


Image for article titled How to Protect Your Student Laptop and Accounts From Hackers



Photo: Monkey Business Images (Shutterstock)



Utilize solid passwords

The easiest online protection practices can be the best. Solid passwords use length and intricacy to turn out to be incredibly difficult to figure. You can do this by joining lowercase and capitalized letters, numbers, and unique characters.

This xkcd comic offers an extraordinary beginning stage for making exceptional, solid passwords that are effectively (or at least more effectively) recalled. Expanding on that, we have an aide for making noteworthy passwords that aren’t an issue to compose. Regardless of whether your passwords aren’t essential, that is OK; you can—and ought to—use a password chief to assist you with monitoring them.

Exploit two-factor verification

Indeed, even with a solid secret key, you’re currently in danger since programmers may procure your secret word and username assuming you have a record with an organization that experiences a break. Passwords can likewise be uncovered when you sign into a record utilizing an uncertain organization, similar to the wifi at a nearby coffeehouse. Since schools don’t generally put resources into getting their organizations, you might be in danger regardless of whether you interface with the web utilizing the school’s wifi or a college VPN. What’s more numerous records might be at serious risk assuming programmers can take a secret word you’ve utilized at least a few times.

Two-factor confirmation furnishes you with some additional insurance by requiring one more figure of data option to your secret phrase. As a rule, this is a code shipped off your telephone, an application, or one more believed gadget when you endeavor to sign in. Simply ensure you never give this code to another person; tricksters claim to be a confided in source, similar to your bank, and request your 2FA code to “affirm your personality,” when in fact they can now break into your record.

Be keeping watch for phishing tricks

In phishing assaults, programmers send false messages that seem to come from reliable sources, as large name retailers, banks, and guarantors. They can urge beneficiaries to download malignant programming or reveal touchy data. Numerous programmers explicitly target undergrads with phishing tricks, utilizing messages that seem to come from sources like monetary guide divisions, consultants, and educators.

The FTC discloses how to recognize a trick and what to do when you get one. As a guideline, be cautious when opening any connections from messages: Read the email intently, searching for spelling or sentence structure botches that a genuine organization wouldn’t almost certainly make, and snap or tap on the shipper’s name to uncover their real email address (frequently, the genuine location is obviously fake).

Keep devices updated

Software patches regularly come with security updates that help protect your devices from newly discovered exploits and vulnerabilities—waiting to update your phone, computer or smart devices could leave them open to malware and viruses. There’s some evidence that hackers attack college networks because student tech tends to run on outdated software, making them easier targets.

Regularly update your devices to keep them safe. Most offer auto-update or update scheduling tools that make it easy to plan ahead and keep everything running on the latest version of their security software. If you’re concerned about unstable or buggy updates, you can often choose to only download the security update instead. Android does this by default, and now Apple offers the option, as well.

Encrypt your device files

Your computer probably comes with a tool that allows you to fully encrypt all the data on your hard drive to protect the information, files, and programs against unauthorized access. Companies often use this technique to protect the files on a business laptop if it’s lost or stolen. As a college student, you may be on the move constantly, carrying your devices to class, the library, and study areas, so you can use the same strategy to keep your files safe if one of your items is lost or stolen.

Some operating systems, like Windows 10, have an FDE feature active by default. However, for most devices, you’ll need to activate the feature manually. You can check out our guide on encrypting your Mac or Windows machine here.

Consider using a VPN

A virtual private network (VPN) is a digital privacy tool that can keep your information safe when connecting to both public and private wifi networks. The VPN encrypts data you send to the internet, meaning that the person or organization managing the wifi network won’t know what content you’re accessing.

VPNs can also be used to make your connection appear as if it’s coming from somewhere else, allowing you to access content that may typically be restricted to users in certain countries. For example, if Netflix only makes a show or movie available in a specific region, you can trick the service into thinking you live there by using a VPN. Here’s how to find a trustworthy VPN.

Some colleges and universities also provide campus VPNs that allow you to use services that typically require you to be connected to the campus network. This includes remote desktop, off-site printing, and shared file systems.

These VPNs won’t protect your browsing from the university itself—while internet providers won’t be able to tell what you’re looking at, the owner of the VPN service will. However, the university VPN will allow you to use campus services when you’re off-site.

Did you like this article?
Share it on any of the following social media channels below to give us your vote. Your feedback helps us improve.

Other related Life Hacker ideas you might enjoy

Related Articles

Leave a Reply

Your email address will not be published.