Prof. Dr. Burhan Pektaş, drawing attention to the basic measures that can be taken to ensure computer and smartphone security, said, “Create unique, strong, and complex passwords for each account. If possible, store your passwords in a secure place using a password manager.” Pointing out that easily guessable expressions such as date of birth, name, username, or "12345", "password" should be avoided, Prof. Dr. Burhan Pektaş stated, “Random characters and word combinations should be used.”
Content
Create strong and unique passwords for digital security!
Prof. Dr. Burhan Pektaş, Head of the Computer Engineering Department at Üsküdar Üniversitesi Faculty of Engineering and Natural Sciences (MDBF), evaluated the topic of computer and smartphone security on the occasion of November 30 World Computer Security Day.
Keep your antivirus software updated!
Prof. Dr. Burhan Pektaş, drawing attention to the basic measures that can be taken to ensure computer and smartphone security, said, “Create unique, strong, and complex passwords for each account. If possible, store your passwords in a secure place using a password manager. Enable two-factor authentication on your accounts to create an additional layer of security. This makes it difficult to access accounts even if a password is stolen. Protect against security vulnerabilities by keeping the operating system and applications updated. Updates often contain patches that close security vulnerabilities. For this reason, updates should never be postponed. Protect your devices against malicious software with a reliable antivirus program. Keep your antivirus software updated and perform regular scans.”
“Character diversity like P@r0lam!2024 makes the password harder to guess”
Emphasizing the importance of creating strong passwords and managing them securely to enhance digital security, Prof. Dr. Burhan Pektaş stated, “The following rules should be observed when creating a strong password; A strong password should consist of at least 12 characters. The longer the password, the harder it is to crack. The password to be created should include a combination of letters (uppercase and lowercase), numbers, and special characters (such as @, #, $). For example, character diversity like P@r0lam!2024 makes the password harder to guess.”
Date of birth should not be used as a password
Prof. Dr. Burhan Pektaş, pointing out that easily guessable expressions such as date of birth, name, username, or "12345", "password" should be avoided, warned, “Random characters and word combinations should be used. For example; B!z4rD$@07#. A strong password can be created by replacing letters of words with numbers or by making abbreviations. For example, "G3@S!f7".”
“Set your account to ‘Private,’ not ‘Public’”
Noting that protecting digital identity begins with being careful, especially with social media accounts, Prof. Dr. Burhan Pektaş continued:
“Since social media has the potential to share personal information and online behavior with many people, taking some security measures is important to ensure the security of your digital identity. Some of these are: Review privacy settings on every social media platform and ensure that only people you want can see your posts. Set your account to ‘Private,’ not ‘Public.’ Keep personal information (date of birth, email address, phone number) confidential, allowing access only to trusted individuals. Use strong, long, and complex passwords for your social media accounts. Do not reuse your passwords on other platforms. If possible, store these passwords securely using a password manager. Two-factor authentication is an additional layer of security to protect your social media accounts. When logging into your account, a password alone is not enough; an additional code or trusted device verification is required.”
Be careful not to share private information such as location data
Prof. Dr. Burhan Pektaş, warning against messages sent via fake emails or links, said, “Phishing attacks are a common method used to take over your social media accounts. Avoid clicking on links from unknown individuals or suspicious messages received via social media. Be careful not to share private information such as location data, where you live, or your daily routine. This information can make it easier for malicious individuals to target you. Think twice about the content of every post you share and ensure it does not contain too much personal information.”
“Immediately change the passwords of compromised accounts”
Stating that taking quick and correct steps in the event of a security breach is critical to minimize damage and protect data, Prof. Dr. Burhan Pektaş said, “The most important basic steps to take in such a situation are: When you notice the breach, quickly identify the affected devices or accounts. Isolate the malware-infected or attacked device from the network. This is important to prevent the attack from spreading to other devices. Immediately change the passwords of compromised accounts. Update the passwords of other accounts linked to the breached accounts and enable two-factor authentication (2FA) if possible.”
Perform regular backups…
Prof. Dr. Burhan Pektaş, also warning that passwords should be complex and unique, concluded his words by saying, “Perform a full system scan using up-to-date antivirus or antimalware software. This helps you detect and clean malicious software or viruses. Record the details of the incident. Note which accounts, devices, or data were affected, when you noticed it, and the steps taken. If your bank accounts or payment information are stored on a compromised system, check these accounts. Monitor for any suspicious activity. You can inform your bank or credit card company to ensure extra security measures are taken on your accounts. If your email, social media, or other online accounts have been compromised, report the breach to the support teams of these platforms. Most platforms help restore account security in such situations. If there is a legal requirement or a large-scale breach, you can seek support by reporting the situation to the authorities (e.g., Information and Communication Technologies Authority (BTK)). If you have backed up your data, you might consider restoring the compromised data from a reliable backup. However, first ensure the device is completely secure. Performing regular backups speeds up the recovery process in case of data breaches.”




