Khaberni - Malicious cyber attacks have become widespread in modern times, and these attacks have multiple and various objectives, but most often they are aimed at stealing victims' accounts.
These accounts include many different types, whether they are bank accounts or social media platforms accounts or any other type of accounts used.
Fortunately, companies regularly issue a set of tips that users should follow to secure their accounts and their presence online, which have become necessary steps that everyone must take in this era.
A report published by the Internet Security Center "CIS" (CIS) confirms that people in sensitive positions are more susceptible to cyber attacks than others, but this does not mean that other users are not at risk.
There are many steps that users can take to secure their accounts and their online presence and protect them from theft, among the most prominent of these steps are:
Activating Two-Factor Authentication
Activating two-factor authentication has become one of the most important and prominent steps that everyone should take for all their accounts, according to the report.
There are many ways to activate two-factor authentication mechanisms and benefit from them with different accounts, starting from the possibility of installing random code generation applications like "Google Authenticator" or "Microsoft Authenticator".
In addition to the possibility of using two-factor authentication using text messages and phone calls, and even receiving messages in "WhatsApp".
However, the user must verify the source of the message and the code that reaches them, as it may be a phishing message aimed at stealing the account, hence it is always advised to use two-factor authentication through trusted applications.
Installing Antivirus Applications
"PC Magazine" advises installing various and prominent antivirus applications, even though its report confirms that the concept of "viruses" in computers no longer exists as it used to.
However, antivirus applications have evolved to become more capable of facing all risks existing online, starting from phishing attacks to Trojan horse attacks, ransomware, and malware in general.
The report adds that the "Windows Defender" built into the "Windows" system by "Microsoft" is not sufficient for full protection and is not comparable to external applications such as "Bitdefender" or "Norton".
Using Passkeys Instead of Passwords
The concept of passkeys has become popular in recent years, and it is a new mechanism that came to replace traditional passwords.
Instead of relying on traditional passwords that require careful typing, you can leave the task of authentication and login to your smart device equipped with biometric security such as fingerprint or facial recognition.
In this case, whether it is a laptop or a smart phone, the device verifies the user's identity by logging in using facial or fingerprint recognition, and then automatically logs you into the account you desire.
A separate report from "PC Magazine" confirms that using passkeys is the most modern and secure solution compared to using traditional passwords, as they easily work with password management applications.
Rely on Professional Password Management Applications
Although passkeys are the latest and most secure technology than passwords and traditional two-factor authentication methods, their adoption and usage rate by companies is still very limited.
Therefore, there is a need for the presence of password management applications, and while all smartphones, whether from Google or Apple, come with an internal app for managing passwords in addition to built-in apps in all browsers and operating systems, using professional applications is the ideal solution for managing passwords.
There are many free professional options available that can be used for managing passwords, all of which provide much higher levels of protection than built-in applications within operating systems and the usual ones.
Also, switching between these programs is not difficult, and you can easily transfer passwords and two-factor authentication keys between different accounts, and the user can also build their own password hosting server and rely on it instead of relying on paid services.



