/ cloud

5 steps to online security

“That’s not gonna happen to me!” That's what I said every time I heard about someone getting hacked. But it did! And believe me when I tell you it could very well happen to you. Below are 5 simple steps that will prevent you from allowing your personal information to fall into the wrong hands.

1. Using a strong password is a no-brainer,

or at least it should be, that and using a different password for every account, as well as changing your passwords at least once a month - as conventional wisdom says. Like I don’t have enough to worry about, now I need to worry about unique and complex alphanumeric passwords for all 103 of my web accounts, and every single month at that? You have got to be kidding me! Enter myki, a mobile application that changes your passwords on a scheduled basis and in the background. What I am saying is that you will be able to protect your digital workspace without the hassle of creating, managing, remembering or even manually inputting your passwords ever again. #ShutUpAndTakeMyMoney

2. "Get one, Get one free”

I am the first to admit that it is much more feasible to login using Facebook or Google instead of creating a unique username and password that works in line with the privacy policy of every new web account, (Your password must include 12 letters, a number, three symbols and a hieroglyphic). But linking through an existing account means that you are giving your potential hacker a “Get one; get one free” coupon. Do not link your accounts. Enter myki, the application that will not only create a new unique and complex password for you, but will even manage it, saving you both the time and effort. #GetNoneFree

3.The Cloud does not belong to you.

That being said, I suggest you keep your private information off it, if a server is compromised, so is your information. We all remember the iCloud hack, and while it was cool to get a peak of all those celebrities in the nude, I certainly do not want to be one of them. Instead, save your information locally. Enter myki, the only solution out there that stores your personal information on your smartphone and only your fingerprint gets you in! #CatchAFallingCloud

4. A Nigerian Prince does not need your money and you did not just win the lottery,

and while you probably already knew that, you still fall victim to such attempts. Hackers have become more intelligent and malicious, but one thing we still fall victim to is what we call phishing. You have just received a link to access the photos you were tagged in at the birthday party over the weekend, you are re-directed to a page that looks exactly like Facebook, but one thing you don’t know is that it isn’t, and there you are inputting your username and password and little did you know, you have just given Mrs. Hacker access to your entire social world. Enter myki, the application blocks phishing attempts and prevents you from inputting your personal information in a malicious form online. #GonePhishing

5. Two-Factor Authentication Nightmares.

A password alone is not sufficient to secure an account, an additional layer of security never hurt anyone right? Wrong. Currently, it is an absolute nightmare to set up. Enter myki, were for the first time ever, the second token sent to you by SMS is automatically, and dare I say, magically pushed from your smartphone to your browser without requiring your manual input. #AuthenticationAutomated

5 easy steps getting you 1000 steps closer to online security and all in one place. What are you waiting for? #EnterMyki

Click here to sign up!

Mom these definitions are for you:

authenticate – v. to prove that something is real, true, or genuine; to prove that something is authentic

hacker – n. a person who secretly gets access to a computer system in order to get information, cause damage, etc.; a person who hacks into a computer system

phishing – n. a method by which an e-mail user is tricked into revealing personal or secret information

5 steps to online security
Share this