Create strong and unique passwords for digital security!
Drawing attention to the basic precautions that can be taken to ensure computer and smartphone security, Prof. Burhan Pektaş said that "Create unique, strong and complex passwords for each account. If possible, store your passwords in a safe place using a password manager." Pointing out that easy-to-guess expressions such as date of birth, name, username or "12345" and "password" should be avoided, Prof. Burhan Pektaş said that "Random characters and word combinations should be used."
Üsküdar University Faculty of Engineering and Natural Sciences Computer Engineering Department Head Prof. Burhan Pektaş evaluated the issue of computer and smartphone security on the occasion of November 30, World Computer Security Day.
Keep your antivirus software up to date!
Drawing attention to the basic precautions that can be taken to ensure computer and smartphone security, Prof. Burhan Pektaş stated that "Create unique, strong and complex passwords for each account. If possible, store your passwords in a safe place using a password manager. Create an additional layer of security by enabling two-factor authentication on your accounts. This makes it difficult to access accounts, even if a password is stolen. Protect against security vulnerabilities by keeping the operating system and applications up to date. Updates often include patches that close security holes. For this reason, updates should not be postponed to another time. Protect your devices against malware with a reliable antivirus program. Keep your antivirus software up to date and run regular scans."
"Character diversity such as P@ssw0rd!2024 makes the password difficult to guess"
Emphasizing the importance of creating strong passwords and managing these passwords securely to increase digital security, Prof. Burhan Pektaş said that "The following rules should be considered when creating a strong password: a strong password should be at least 12 characters long. The longer the password, the more difficult it is to crack. The password to be created must contain a combination of letters (uppercase and lowercase letters), numbers, and special characters (such as @, #, $). For example, character diversity such as P@ssw0rd!2024 makes it difficult to guess the password."
Date of birth should not be used as a password
Pointing out that easy-to-guess expressions such as date of birth, name, username or "12345", "password" should be avoided, Prof. Burhan Pektaş said that "Random characters and word combinations should be used. For example, B!z4rD$@07#. A strong password can be created by replacing the letters of words with numbers or making abbreviations. For example, "G3@S!f7"."
"Set your account to 'Private,' not 'Public'"
Noting that protecting digital identity starts with being careful, especially in social media accounts, Prof. Burhan Pektaş continued his remarks as follows: "Since social media has the potential to share personal information and online behavior with many people, it is important to take some security measures to ensure the security of digital identity. Some of these include; review the privacy settings on each social media platform and make sure that only the people you want can see your posts. Set your account to 'Private' and not 'Public'. Keep personal information (date of birth, email address, phone number) private and only allow people you trust to access it. Use strong, long, and complex passwords on your social media accounts. Do not reuse your passwords on other platforms either. If possible, store these passwords securely using a password manager. Two-factor authentication is an additional layer of security to protect your social media accounts. Logging into your account doesn't just require a password, you also need a code or trusted device verification."
Be careful not to share private information, such as location information
Warning to be careful against messages sent with fake e-mails or links, Prof. Burhan Pektaş stated that "Phishing attacks are a common method used to take over your social media accounts. Avoid clicking on links from people you do not know or suspicious messages from social media. Be careful not to share private information such as location information, where you live, and your daily routine. This information can make it easier for you to become a target for bad actors. Think twice about the content of every post you share and make sure it doesn't contain too much personal information."
"Urgently change passwords for compromised accounts"
Stating that taking fast and correct steps in the event of a security breach is critical to minimize damage and protect data, Prof. Burhan Pektaş said that "The most important of the basic steps to be taken in such a situation are as follows; When you notice a breach, quickly identify the affected devices or accounts. Isolate the infected or hacked device from the network. This is important to prevent the attack from spreading to other devices. Urgently change the passwords of compromised accounts. Update the passwords of other accounts linked to the breached accounts and enable two-factor authentication (2FA) if possible."
Make regular backups...
Warning that passwords should be made complex and unique, Prof. Burhan Pektaş said, "Perform a full system scan using an up-to-date antivirus or antimalware software. This will help you detect and remove any malware or viruses. Record the details of the event. Make a note of which accounts, devices, or data were affected, when you became aware of it, and the steps taken. If your bank accounts or payment information are stored in a compromised system, check those accounts. Monitor for any suspicious transactions. By notifying your bank or credit card company, you can ensure that extra security measures are taken on your accounts. If the email account, social media, or other online accounts have been breached, report the breach to the support teams of these platforms. Most platforms help to restore the security of the account in such cases. If there is a legal requirement or there is a large-scale violation, you can get support by reporting the situation to the authorities (for example, the Information and Communication Technologies Authority). If you have made a backup of your data, you may want to consider restoring the breached data from a reliable backup. But first, make sure that the device is completely safe. Performing regular backups speeds up the recovery process in the event of a data breach."
Üsküdar News Agency (ÜNA)