How to protect all your online accounts against hacker attacks

Attacks on our data are continuously increasing, and this is also confirmed by the data of various research institutes. That's why it is important to take advantage of all the "weapons" of defense at our disposal to armor as much as possible our accounts. All online services now offer numerous security measures and the only problem is knowing where to find them to activate them.

Two-step verification is an option now adopted for most accounts: don't underestimate it. Then there are the rules that have always applied, such as choosing strong, complex, hard-to-guess passwords that are different for each account, and changing them regularly. If it's a strain on your memory to remember them all, get a good password manager, even a free one. And follow the tips and tricks we've prepared especially for you on the world's most used accounts.

Google

Google, in recent years, has simplified the management of all its numerous services and applications through a single page dedicated to the users' account. There's even a helpful wizard - Security Check - that lets you check your recovery information - your phone number and recovery email address - to use to get your account back in your possession in case it's possibly compromised - as well as check on devices and apps linked to your profile to remove anything you don't recognize. We'll never get tired of recommending - even though we know it's a waste of a few extra minutes - two-step verification - which, however, allows access to your account by sending a single-use code to your cell phone. In other words, even if someone managed to steal your password, they wouldn't be able to enter your profile. You activate it from the Login and Security area; Google Login; Login Method and Password; Two-Step Verification. Then follow the instructions that appear on the screen.

Apple

The Cupertino giant has taken a different approach to data security than Google, focusing first on hardware and then on apps. The options, therefore, that you'll be able to get through the browser are not as comprehensive as those proposed by Google. The first step is to access the Apple ID site. The most important change allowed by Apple is to enable two-factor authentication, which works similarly to the technology used by Mountain View. When you sign in via a new device, you'll need your Apple ID, password, and a code sent to your other registered devices, such as a MacBook or iPhone. You can also, from this page, review the rest of your security settings and find out which computers, phones, and tablets have been accessed. If you find a device that you don't recognize, simply select it and choose the Remove command. You can also log out of all other active iCloud sessions by logging into iCloud.com and visiting the Settings page.

Microsoft

Microsoft offers security settings similar to Google and Apple, including options to check for active devices and set up two-step verification. There are several ways to get to the Microsoft online pages you want, but the easiest is to point straight to the one in your Microsoft account. Once you sign in with your credentials - username and password - you'll see all the computers and other devices connected to your Microsoft profile under the Devices item. If, as with Google and Apple, something doesn't seem right, select the intruder and remove it. At this point click on the Security item to access options to check your personal data - update it if necessary so that you can use it to recover your account in case it gets locked and recent activity which gives you a way to find out if there is any suspicious "goings-on" in your account. Follow the link to access more security options and set up two-step authentication so that, from a secure smartphone becomes an extra requirement to get into your account using your credentials.

Facebook

The world's busiest social network offers an impressive number of tools to protect your account that are, in most cases, housed in the Security tab of Facebook's Settings page, leaving you with only one "task": choosing a strong, hard-to-guess password. But back to the Security area in Settings. From here you can check when you logged in and from which devices, and receive alerts if someone has tried to access your account from an unknown device or browser. Facebook also allows you to specify 3 to 5 "trusted contacts" who can guarantee your identity in case you can no longer enter your locked account. Like all the services described so far, Facebook also offers you the option of two-factor authentication. It is essential if you want to connect to Facebook from a new computer or device via a code you receive on your cell phone combined with your usual credentials. Once these devices are marked as trusted, you no longer need to repeat this step.

Twitter

The twitter social doesn't offer all the layers of security like Facebook, but the main safeguards are still available if you go to the Settings and Privacy page in the web version. There is two-step protection - accessible from the Account > Security area - which Twitter calls Access Verification: simply activate it to receive an SMS with a code that will be used to access your account when it is run from a new device with your username and password. If someone tries to enter your profile, this system will protect your privacy and, at the same time, warn you about the unauthorized access attempt. It is also advisable to enable the Password Recovery option, which, in other words means that Twitter will ask for additional details - such as your phone number - if someone tries to initiate the recovery process.

Libero Mail

The email service Libero Mail also offers the possibility to protect your account from hackers with a double level of protection. Thanks to the Secure Password service, in addition to the classic security key, you will need an additional code, which will be sent via SMS to your smartphone, to access your email account.

After logging in for the first time from the computer or device you usually use, you will only need to enter the password to log in, while if you use a different notebook you will need both the security key and the security code that will be sent to your smartphone.

To activate Secure Password, you need to enter the selfcare area, then go to the Security section and select Secure Password. At this point you will need to enter your phone number to receive the verification code via SMS. Once the code has been entered, it will be possible to set the computer as trustworthy so as not to have to request verification via smartphone anymore. Once this step is completed, the Secure Password service will be active.

Yahoo!

The last few years have not been easy for Yahoo! from the security point of view. But for those who have remained loyal to this historic site - despite repeated and very serious breaches - here, then, is how to try to minimize the risk of future hacking by visiting the account page via browser. Log into Yahoo!, go to Account Info and click on Account Security. Yahoo! has also introduced two-step verification feature, as well as a feature called Protect Your Account with Yahoo Account Key, which basically adds extra protection via a Yahoo! app that you install on a trusted phone. Yahoo! also recommends that users, in light of recent data breaches - also disable their security questions because some of this information may now be in the public domain and hackers could potentially use it to pretend to be you.

Other Accounts

Your other online accounts should, usually, offer the same options we've already mentioned. So take a look at the various settings to see what they offer. Two-step verification should be available for most accounts by now. Nothing, unfortunately, can guarantee you 100% protection and security online, so never let your guard down: new vulnerabilities are discovered every day. Watch out for suspicious emails that may contain malware or ransomware that, if installed, can steal valuable data or even blackmail you into paying for an "antidote" to decrypt your information. Watch out for phishing and all other types of social engineering. And don't forget to keep everything up to date on both your computer and mobile devices.