Jun
20
2021
The following are steps you can take to protect yourself as much as possible. However, realize that hackers can access some of the databases where your information resides and get around some of these “fences.” And this assumes you don’t click on anything you shouldn’t!
- Use distinct passwords, different for each place a password is needed. Change passwords from time to time.
- Encrypt passwords using an app such as 1Password. And have 1Password generate the passwords for you given that the configuration will be random and will be saved in 1Password. If you have Firefox or the like generate a password, make sure to get it and the user name saved in 1Password.
- Put a block on credit access on all three credit agencies. This stops people from opening up most charge accounts or bank accounts or credit cards in your name.
- Get an app, such as the one offered by AAA for Experian, that notifies you of any changes in your credit score and/or fishing on the “dark web.”
- For all your credit cards, get their app and set it to show you any and all transactions or just ones when the credit card is not present. I have caught false charges that way even before their fraud division calls.
- If you use Apple Pay, the information sent in is encrypted. Another protection. Same if you tap your card on a WIFI reader at grocery store or gas pump.
- For your checking account, have an app from your bank and set it up to notify you for all checks over as set amount (such as $100).
- If you have regular charges for a credit card (e.g., Amazon, utilities), set up a Word doc that lists all these by credit card. When a card is compromised, you can then go to all these vendors and put in updated information.
- If you do a lot of purchases on the web, you might want to get a card like Capital One where you can create virtual card numbers for each vendor. Thus, if that vendor’s database is hacked, all you have to do is to delete the virtual card number without having to replace the credit card itself.
- Where you can, activate two-step verification.