So just what am I referring to? Perhaps you've already followed a range of good advice provided on this website and others, so naturally you think your website is secure. You can rest easy. Or can you?
Yet even though your website (front door) may be bolted shut from casual hackers, if your your personal computer or Internet access device (back door) is not equally as secure, a hacker can gain access to your PC or tablet computer files.
Web, Computer, and Tablet Computer Security Tips
Since IoS has evolved from, and is closely related to, the Apple's OSX operating system, perhaps that's our clue. In time, Apple Macs, Apple iPads, Apple iPhones may all use the same operating system.
Five Remarkably Powerful Web Security And Computer Security Protection Tips
Most likely, somewhere within that computer device, you may store your website access details. If yes, that means, your average unfriendly hacker can find the keys to your website front door faster than you could boil a kettle. Therefore:
- Web security tip 1: treat your PC and / or tablet computer, and / or smartphone security as equally important as your website security. An idea: consider your web business as a kind of circle: one half is your website (including web hosting); the other half: your PC, and / or tablet, and / or smartphone. Only when you have all devices secured is the circle complete.
- Web security tip 2: understand that no matter how good your website security, your protection is only as strong as its weakest link. For example, if you have really powerful website security, but you store access details to your website on a PC that has insufficient security, weak antivirus, etc., if malware infects this computer, hackers can gain the keys to your website in seconds, undoing all strong security strategies you may have set up elsewhere. One proven remedy: use strong password manager software to record highly complex passwords and usernames, then store the master password to that device only in your mind.
- Web security tip 3: whenever possible, set up and get familiar with 2-step authentication for email services like Google Gmail, Yahoo, etc. Once these are set up and once you are familiar with how to use them, log in and log out is quick and simple.
- Web security tip 4: Today, amazing, powerful software security solutions are available - but not always where you might at first expect. For example, we have implemented 2-step authentication protections that essentially change the log in details to a Joomla admin control panel every 30 seconds. This system uses something you have (your username and password) with something you know (a 6-digit random code), within a 30-second time frame. To break into a website, a thief would need to know the 10-digit username, plus the 20-digit complex password (upper case and lower case letters, numbers, special characters), and the 6-digit random code, that changes 30 seconds later. A solution like this provides billions of possible combinations, and breaking in within 30 seconds is hard, very hard for would-be web thieves. And 30-seconds later, the log in key changes again, so the previous "key" no longer works.
- Web security tip 5: using a system outlined in Web security tip 3 above, is surprisingly easy to set up and work with on a regular basis. The secret is: use automatic tools to perform most of the work for you. How: use a powerful password manager like 1Password or KeePass, in combination with the free Google Authenticator - another stroke of genius from Google, and currently, the Google Authenticator app is free to download. These tools can enter most of the information for you, therefore allowing you to log in within about 30 seconds after 2 or 3 practice sessions.