The Safest Ways to Log In to Your Computer

from Wired

Whether your computer runs Windows, macOS, or Chrome OS, you have options for how you log in. And your choice doesn’t only affect how convenient it is for you to get into your laptop or desktop; it also affects how easily someone else can gain access.

These are the different login options that are available and that you need to be aware of, so make sure you choose wisely. The right one for you will depend on how your computer is set up and just how cautious you’d like to be.

More here.

Posted in Technology and tagged , , , , , , , , .

20 Comments

  1. When it comes to privacy on a device, such as a computer, there are so many different ways to ensure your privacy. On my personal laptop, I have a password set up for it that only I know. Privacy is a very important aspect to me because you just never know who can get a hold of your technology and get into it and expose your privacy. I was doing some research for my business statistics class about data privacy and how data brokers can collect private data from consumers and expose it to the public for profit. This is a perfect example as to why you should lock or password your computer or smart phone. You should also choose your password carefully and make sure it is as complicated as can be, but not too much to the point where you will forget it easily. I have had that problem in the past and it is time consuming to reset it.
    David Nield, the author of the article, explains in detail how to set up passwords on each kind of device. His detail is very precise so that someone who is unfamiliar with technology can easily follow along with his directions. Something interesting that windows and mac have in common is the finger id feature. The laptop will scan your fingerprint as your “password” instead of just typing it out. I personally had this feature for my old phone and it amazed me since nobody could guess your fingerprint. Windows also have face id that unlocks your computer with just a scan of your face. I do not find this way of security as safe as the finger id security. Someone can easily access a picture of you off social media or even a 3D image of you with the technology we have today. It is much harder to get someones fingerprint, which is why I believe this method to be the best way.
    In conclusion, passwords and security on computers and smart devices is very important. Nobody wants unwanted guests entering their computer and seeing their personal things. Many problems could arise without creating a password or some other type of string security. No matter what type of security, make sure it is very strong and hard to decipher.

  2. Especially with the technology advancing so much today it is important the people keep their password safe and unpredictable in order to prevent an unknown user from logging into someone else’s laptop or phone that provides private information that only the user is allowed to know about. Over the years, companies such as Apple have implemented the fingerprint scanning system to unlock the phone which is a great feature for users to have since it is quick and efficient since everyone’s fingerprint is unique. A lot of the time when someone is trying to log in to social media websites, they tend to forget their actual passwords so a lot of the users tend to use passwords that they won’t forget, the problem with this is that they will most likely use that same password for other websites as well. In theory, if someone was able to get into one of someone else’s social media accounts, they might possibly log into the same account of a different social media platform which then the user needs to change their password to something unique for every website. Two factor authentication has become more of a norm today since there have been too many cases where a random user has logged into someone’s account. Two factor authentication is when the login is required to use two or more pieces of evidence to the user in order to authenticate that it is their account. This can require someone to use their cell phone and email in order to make sure that their accounts are safe from anyone logging in. A lot of websites are now notifying users via email if there was an excessive amount of attempts at a certain time and want to make sure if it was the user or someone else. If it wasn’t the user, there is an option to change the password of the account to make sure that nobody gets into the account. What I have seen recently is that some sites that I use require you to get your phone and use the camera in order to scan a QR code in order to authenticate the login which I found was unique because it is making sure that the user has more than one piece of technology in order to login to the account.

  3. Privacy is the number one concern when looking at technology today, and maintaining this privacy as technology advances. For most phones today, there is a facial recognition that unlocks your phone, or the use of your finger print to unlock your phone. This is probably the most secure way to ensure your privacy with your phone so no one else can logon. When it comes to computers, Apple has integrated the finger print recognition on some of their computers now, which is a very safe way to log in to your computer. I have an Apple computer that does not have the finger print recognition, but my computer does unlock automatically if I am wearing my Apple Watch. I think this is a good feature because it makes it more convenient for me, but if someone was to steal my watch and computer they would automatically be able to get into my computer with my watch, without guessing the password. Other options that Apple, or windows computer users have is just a password. Usually the passwords require a certain number of characters, a number, and a special character. This makes it harder for someone to guess your password because it just adds to the number of passwords that could possibly be generated. If the password is complex enough, your privacy should be secured but in todays world you never know. At recent internships I have had, there has been a two factor authentication that was used to sign on the computer or softwares that were used on the computer. The two factor authentication will send a notification to your phone that someone is trying to log in to your account and you have to approve that it is you. I think this could be implemented onto a regular Apple or windows product, because it just makes your privacy more secured. All in all, privacy is the most important thing with technology today, and I believe the ways to log in safely will continue to improve over time.

  4. Within technology, privacy and security are the two major factors in which people take into consideration when purchasing a technology product. With the various bugs and viruses in which many laptops, computers, phones, etc. can develop over a period of time, people have to take the right steps in ensuring that their devices are secure. People also have to worry about the threat of hackers getting into their personal information. However, nowadays, more people are securing their devices with passwords. For example, the iPhone and other Apple products use fingerprint or face recognition of the product owner to allow them within their device. However, if the person who has the device does not have their face or fingerprint stored within the software, they are not able to access any of the information within the device. The article discusses all the different computer models such as Mac, Windows, etc., and the various ways in which one could protect their information through passwords and other functions. The article discussed the idea of having passwords, key fobs, fingerprints, as well as many other functions in order to keep your laptop secure.

    Throughout the past few years, when you hear and see all the new stories and articles on hackers getting people’s personal information through their computers and other technological devices, it made me put more emphasis on keeping my accounts and devices safe and secure. One of the first steps I took was to make a password on my laptop in order to log in and access the data I have stored, which lead to me developing passwords and fingerprint scans on my iPhone to try and keep my information protected. Also, another important step in which I incorporated after a while was making sure that I access accounts within a secure network. For example, if I’m trying to login to my email account, I would access it from my house and not at a restaurant with a network that may be unsecure and lead to people possibly accessing my information. There are a lot of steps and procedures in which people have to take in order to keep their personal information protected on their various forms of technology. The privacy and security of everyone’s accounts and devices are very important, as everyone should take steps in ensuring that their information is protected and secure.

  5. For the most part, this article talks about how to keep your password safe from people trying to get into your computer. This made me think about how far password protection on computers has come. I remember the first laptop my family had had the easiest five letter, one number password, and nowadays computers will not let you use something so simple. We also had unlimited tries at putting in the password, whereas modern devices would lock up and not allow you back in until you put in your email or wait a certain amount of time and try again. However, when technology evolves for the better, it also evolves for the worse. By that I mean, password protection became better, but hackers out in the world can get into your computer with just a couple of clicks. Private information is kept on people’s computers and by finding some bodies Internet Protocol address, all of their information could be leaked. An IP address exposes a person’s internet provider and can ultimately expose the location of you and your computer. That means people can find your house if it has the internet. The article brings up alternatives to passwords and how windows have face recognition and fingerprint recognition. I believe this is the most reliable way to keep your computer or phone safe. I think this because of the obvious fact that only you have your face and fingerprints, so only you should be able to get into the device. Along with the face and fingerprint scan, the article says that the windows computers have the option of a security key. What this is, is an actual physical key that you put into your computer instead of a password. This is probably the most safe option for your computer. I say this because there is no way around the key, because it is the only way to get into the computer. Same thing with the face scan and thumbprint, but the face and thumbprint scan could have some errors while logging in and may lock you out by accident. Where as the physical key, would have little to no errors, and your only concern should be misplacing it. All in all, it is cool to see how far computers’ privacy protection has come, and I can only imagine how much more advanced it gets in the future.

  6. Today, technology is more advanced and efficient than ever, and it is only getting better as time passes. The biggest concern that people have with technology is the safety aspect. When it comes to safety, technology producers try to provide the safest and easiest way for consumers. For consumers, technology is all about how durable and fast the item works. Experiencing bugs, viruses, or having lag spikes are all considerations that consumers have before buying a certain technology item. Getting hacked by another person or source is another concern that many people have. However, with the advancement of technology, safety has been improving drastically. When I was a kid, my parents owned a laptop that did not even have a security system on it. In other words, anyone had access to the computer and could have taken personal information. Nowadays, whether it is an iPhone, laptop, or gaming console, there are security procedures for everything; the iPhone has a face scan that only allows the owner’s face to scan and the consoles have passcodes that the owner sets it to. The website shows the different ways the technology industry provides safety for us, consumers, so that others can not gain access to our personal information. Whenever I purchase a phone or laptop, I always start with making a passcode in order to keep my information protected. Personally, I am very afraid of trusting technology with my private information. I am very worried that my email or other accounts could get hacked, which could hurt me. I am a victim of being hacked and it is the worst feeling in the world; I have personally experienced losing a lot of money because my information was hacked through my phone banking app. There is a reason why companies provide security and safety precautions. I feel like everyone should follow the various security tips so that they are protected at all times. Furthermore, there is nothing people can lose for making a passcode or having a face ID scan; these securities are purely for protection and can only benefit the users. Nowadays, technology is very advanced and many people should follow the security protocols to avoid their information getting leaked or potentially hurting them in the future.

  7. Technology plays a major part in the world we live in, especially since the coronavirus pandemic. Adults continue to work from home while students and children go online for school. Whether you are sending emails, searching the web, or even playing games, it is important to know that you are secure on your computer. Hackers try to take sensitive information online including banking information, social security numbers, and credit card information. Computers must be secure so people do not have to worry about hackers or thieves that try to get on computers. When you look at computer security, it all starts with how one logs on to the computer. The most common ones are passwords and passcodes, but I personally do not like using them. Regardless of how many possibilities there are, there are some people that are very good at figuring out computer passwords or passcodes. I personally like the use of fingerprint scanners and facial recognition that Apple has developed over the past couple of years. This is much more secure than the use of passwords and passcodes because the security is based off someone’s own personal fingerprint and facial features. Not one face or fingerprint is exactly alike, which makes it very hard for someone to break into your laptop. Apple has been credited for their new security methods on their devices. The technology they developed is so good that it can tell the difference between identical twins. It also recognizes the difference between a live person and a picture of someone due to heat signatures. To me, that is very impressive, and it shows that their technology is really effective. I have used Apple products for many years now and will continue to use them for many more. Not only is it because I like the products and designs, but I also like how I know my phone and other devices are secure. My iPhone travels with me everywhere I go. While I have not lost it, I know that if I do, someone will most likely not be able to get in because I have facial recognition and an 8 digit passcode. On top of that, I can also lock the phone from another device until it is found. Companies like Microsoft, Apple. and Google are making technological breakthroughs all the time. It will be very interesting to see what they come up with in the future regarding the security and safety of their devices.

  8. The most exploitable weakness of your private devices and accounts is self-inflicted. According to a study conducted by password management experts at LogMeIn, an American software service provider, 59% of people use the same password for everything. The study also found that 91% of respondents were well versed in password best practices, a glaring statistic.
    Convenience is highly valued, but many do not weigh it against the value of security. Besides using the same password, many people incorporate personal information. I’ve even seen somebody use their physical address as their password.
    The solution is to create a different password for each account and device and be as different and complex as possible. However, memorizing every password you create is unrealistic. Unless you’re a wiz at memory games, writing down passwords is a must.
    I try to keep as many passwords stored outside my computer as possible. While having browsers, or third-party extensions, remember passwords is safer than maintaining a cleverly named excel sheet, it’s even better to have it all written down on a physical copy.
    If the possibility of forgetting this copy at home, or losing it, makes you nervous. You can get away with keeping passwords on a computer by the methods above, make sure to enable two-factor authentication. Or, if you are blessed enough to have recent models, use biometrics as a security feature. Your fingerprints are unique and extremely difficult to replicate.

  9. Studies show that a lot of people use the same password for a lot of login opportunities, this is probably to remember their passwords instead of memorizing them. This can go both ways, this can either be good and bad. For example, this can be bad because if someone finds out one of your passwords, then they can maybe get the password to something else or yours. So, lets say you have whatever password they know for your Facebook, then can also maybe see if you have that password for your Instagram. This isn’t safe because you may have very important things there or its just your business and they have no need to be in it. Its a good way to have one password for occasions as such that you ” forget password” but then remember that its most likely the same one that you always use. I personally have different passwords and have them all written down. Also another way to remember your password or if you have a bad memory, you can ask in the settings for finger print and it’ll reconginice your fingerprint and you would automatically be logged in. Also try to not have many emails because you may register one email and forget about it, using one email is enough due to the fact that if you forget it you may send a reset to that email. It can also be a lot of work if someone figures out your password and you need to memorize all the apps or browsers you used with that password because it may be important such as bank login info. Face ID is also a new way to get into apps or your phone if your forget your password, which only works for your face, there are many ways to get into your information without needing he same passwords and I suppose you do that, because if someone figures out, you may be trouble.

  10. With technology quickly advancing, our personal computers and smart devices are becoming capable of more each day, meaning that more information and data is being stored on these devices each day. With more data and more information comes more that can be accessed if our devices are accessed without our permission. In my own day to day life I often do not even stop to consider the amount of personal information that is accessible on my laptop, phone, and even my Apple watch. My own personal data security is a concept that does not cross my mind in my daily life. However, with privacy becoming more relevant by the day, perhaps it is an aspect of my routine that I should contemplate every now and then. With advancing technology that is meant to assist in our daily lives comes advancing technology that makes it easier for malicious individuals to hack into devices. Security is more important and relevant now than it has ever been.

    To combat this, individuals such as the author of this article, David Nield, are providing solutions and instructions on how to keep our devices safe and secure. Nield providing multiple options for three different operating systems provides a sort of “jack of all trades” article that can assist almost anyone in protecting their personal devices. I give credit to Nield for providing an array of options for the different operating systems; doing so boosts the helpfulness of the article, making it not just another iteration of “make your password hard to guess.” His breakdown also provides methods that I do not believe are common knowledge to everyone. I had a laptop that ran on windows for years and had no idea that I could set up a pin unique to my single device, rather than sharing the password used for my Microsoft account. I now own a Macbook, and the article gave me a sense of relief. It assured me that using the options of always requiring my password on startup, along with using the fingerprint provides a secure form of protection. The section regarding the Chrome operating system is also very helpful within the current time. Many public school districts and universities are providing students with Chromebooks to perform their remote learning on. These Chromebooks contain all of their personal information that is linked to their school accounts, including all documents related to school work. Protecting this information is vital, and the article provides an easy way for students to learn to do so.

    Due to the current pandemic, a large majority of interactions have been performed through a screen. Now more than ever, society relies heavily on interaction through social media, internet sites, and other online platforms. This has led to above average numbers of virtual exchanges of data, such as financial information, social security numbers, home addresses, personal schedules, and more. Device security has quickly become an aspect of life that increases in prominence every day. For these reasons, it is key that society learns how to best protect themselves and those they communicate with. That starts with ensuring that their most used devices remain secure and out of the accessibility of those who can steal their information.

  11. As technology keeps advancing, more and more people are concerned about security and protecting their privacy. Most people nowadays have a password so no one can physically get into their device without their permission however, most people do not think about someone getting into their device through another computer screen. Companies like Apple and Microsoft keep coming out with new models that have some sort of privacy update. The author of this article discusses some of the safest ways to log into your computer depending on which software program you have. If someone uses Windows then they can use a two-factor authentication, they can switch to Windows Face or Windows Hello Fingerprint, they can set up a security key, or they can set up picture word. As the author writes “picture word is easier for someone else to hack into – it’s easier to guess, brute-force a pattern, or simply peek over your shoulder in a coffee shop or an office than it is to replicate your fingerprint, for example” I would argue that it should be a last resort. Out of the options that the author suggests, I would argue that the safest security measure is the physical key. I have to admit, before reading this article I had no idea that physical keys existed however they provide the extra security as there is no password. The downside is that physical keys are typically USB devices, or smart keys, so my concern would be what happens if you lose such a key. For MacOS they have the option to type in a password, use fingerprint, and facial recognition. Considering I have an older Mac and I have an older phone my options are limited. ChromeOS offers a Smart Lock option where your chromebook is unlocked when your phone is nearby ( Nield). I would argue that this is more convenient rather than safe. On my laptop, I have no choice but to physically type in a password and on my cell phone, I can only type a pin or I can use my fingerprint. I prefer to use my fingerprint because I am quite bad at forgetting things.

  12. As technology becomes more prominent in the world, it can be a dangerous when the wrong people come in contact with it. That is why you want to use the safest ways when logging into your computer, phone, etc. Computers are the number one technological advancement where hacking is the most known. There are multiple ways in which a person can log onto their computer depending on their software system and which ever way you chose to log in, will chose how safely you are being with your computer and the private information you have on it. The three most popular software systems are Windows, MacOS and ChromeOS. Of these three, the article further continues the safest possible ways to log in when using these operating systems. For Windows, you open up your settings, go to start menu, accounts, then log in. Always make sure you have a long password as it makes it harder for others to hack in. An important task is setting up a two-factor authentication where you will chose a Hello Pin which is just a pin number. You can then use this pin or your actual log in password. You can also use your fingerprint or face recognition. For MacOS, you use a different password than your Apple Id. This ensures your safety. You want your automatic log-in to be disabled, so if someone has your computer, they cannot get in. Again, you should always have two-factor authentication to help ensure your computers integrity. You can use touch id with your fingerprint or use your apple watch as well. For ChromeOS, your account is used by your same google account password. In your settings, set your computer, so that when it wakes up you always have to put your password in. You can set it up to your android phone as well to get notifications when your computer is logged into. And yet again, always set up two-factor authentication. By doing all these preventative steps, you are securing your private information and making sure no one, but yourself has access to it. If someone hacks into your computer, all your information can be stolen, released or lost forever. That is why it is always impotent to take these steps in protecting your information.

  13. As technology continues to play a more and more prominent role in our daily lives, keeping our secure data and information safe is something everyone should prioritize when operating a device. In this article, the author breaks down the safest ways to login to your computer depending on what device you use. As a longtime mac user, the suggestion to use different passwords for your Apple ID and login is something I personally do for extra security in case one of my passwords is compromised. I just recently purchased a new computer with the Touch ID feature that makes it even easier and safer to login to my computer, as it’s impossible for someone to replicate my fingerprint rather than obtain a written password. I try to use the touch ID feature within my browsers as well to login to site with valuable or important information. Adding extra layers of passwords within your device is the best way to make sure no one can get to your data. The suggestions this article put forward are helpful to making sure you are adapting safely to this ever growing technological world. As technology progresses, the amount of people that will try and steal information and that tactics they use will also progress, so taking the advice given in this article and others alike is a smart idea to anyone who uses a computer for anything of value. One advantage to Apple devices is the importance they place on safety and security, and thinking about such features when making a purchase is a good idea.

  14. Computer security is critical because it safeguards your sensitive and confidential information. A computer enables access to ones financial, medical, and business information. In todays day in age, there are many cyber security threats targeting individuals to steal their identity and exploit the vulnerability of their computer system. If the computer is being used for business purposes, the protection of valuable information will be essential for public trust and potential lawsuits. If a thief gains access to personal information, they could launch attacks on other computers that you are associated with, infecting them with malware viruses causing data corruption and destruction. Computer security measures should require a two-factor authentication process that is incorporates a string of digits and characters. For example, Windows has multiple sign-in options to choose from. Some of these options include Windows Hello Pin, Windows Hello Face, and Windows Hello Fingerprint. Windows Hello Pin is encouraged by Microsoft in place of your password because it is device specific and kept hidden. Windows Hello Face and Hello Fingerprint are similar to a bio-metric authentication and is difficult to crack. Likewise, Windows has a Security Key that is a physical key specifically configured to gain access to a computer. Last is an option called Picture Password. This option allows the user to choose a specific picture of their choice and the user draws a pattern over the picture to gain access to the device. This is a convenient option; however, it is easier to hack compared to a fingerprint or facial recognition software. When using macOS, be sure to disable automatic log-in, and be required to provide a password every time to be granted access to the device. The most convenient and secure option other than using a log-in password would be using your fingerprint. When using a Chromebook, along with your password, set up a PIN. This is not the most secure option, but it is convenient. Connecting your Android phone allows you a smart lock option which unlocks the Chromebook if your phone is nearby. This is extremely convenient because in this day in age, people generally always carry their phone with them. No matter what method one chooses to protect their device, its best to select the most secure option and have peace of mind, rather than convenience.

  15. When it comes to desktops or PCs, I have been a Windows user for my entire life. From playing games on my family computer that ran Windows Vista to my Seton Hall issued laptop that runs Windows 10+, Windows is a software that I am both familiar and comfortable with. An aspect that I never thought to distinguish Windows devices from others is its security measures. I always thought that every computer had the same ways of logging onto a computer – simply entering your password and logging on. After reading this Wired article, however, I am now aware of the various different operating software and their different ways of protecting my data and privacy on my computer. The next time I buy a computer, I will make sure that when I weigh the pros and cons of each device, I take into account the features of the computers that are designed to keep my information and data safe.

    When logging on to my personal computer, I always either use my fingerprint or a short pin because of its convenience. Placing my finger on a 1-centimeter by 1-centimeter square and holding it still for a few seconds is a lot easier than typing a password with its various punctuations, letters, symbols, and numbers. I never would have thought that these two features may actually be more secure than entering my actual password. Additionally, the use of a physical key is something that I never heard before. I knew that certain computers have specific features added to laptops or portable computers where you can place a lock to attach it to a secure, physical object, but the use of a key to log onto the computer is unworldly to me. This is definitely something that I will look into in the future if I ever become worried about the security of my laptop.

    To ensure the best protection for our devices, we should utilize the features that we pay for when purchasing a product. I know that I will implement more of the security features on both my personal and school laptop to decrease the chances of them being hacked into. Both of my laptops have sensitive information that I do not want to get into the hands of a stranger with ill-intent. Whether it is debit/credit card information stores on a laptop for online purchases, pictures of your family and friends, or a document that contains usernames and passwords for the various TV providers you subscribe to, it is important to take advantage of the security built into your device.

  16. Privacy on computers have advanced to great lengths the last ten years. When it comes to computer protection from other users, passwords have been developed to help keep others out. These passwords use to be as simple as your birthday or favorite holiday but now with hackers it is promoted to have a multi- step security protection. I know on my laptop I have a password that is fourteen digits long with characters to help prevent others from getting in but this in my eyes is not advanced enough. When reading the article, I found out Windows also has a two-factor protection which notifies the user when a device has been logged in. I actually went through the steps through the app to get this on my home laptop because that has more value information then my school does. I think security on laptops and computers have advanced because not only did people start to realize that it was easy for other people to access there stuff, but in a way it allowed these companies such as Apple and Microsoft to stand out. If you look, Apple was one of the first companies to create two-factor security on there phones and laptops for the purpose of privacy. I know for me on my Apple device, whenever I log into certain apps or emails it notifies my primary email or sends a text to me. At times this could be annoying but then I realize that it is for my own safety so others cannot get my information. On invention Apple has also created that Microsoft has adopted was the Touch Id on phones and computers. The Touch Id is a wonderful tool for quick access, but I believe it makes it much easier for others to get in. If you think about it, a person can add their thumb into your phone and without you looking has access to everything you own. This is an issue that not many people see because it is a convenience factor. Overall, in my opinion I believe that having a two-way identification along with a password and a pin would be most beneficial to the users. This would allow for a three-step safety wall that not anyone could just get into and even if they got through one the other two are different in nature.
    I saw that these companies are making improvements for the safety of there customers but there is always more that could be done.

  17. I thought this article was really interesting. I feel as though privacy, when it comes to computers and even phones, is of the utmost importance in today’s world. There are so many scams and hackers out there. Computers and phones hold so much information and could be detrimental if the wrong person got a hold of that. I do most my work for school and anything else on my computer, so it has a of personal information. I am always conscious of making sure it is properly protected for safety as well as privacy reasons. I would never want any of the information stored on my computer to be compromised. Computer security keeps any information on it protected and also protects from viruses to keep your computer running smoothy. I use a mac as my personal computer, and it was helpful to read about how to enable even more security on my computer. Being such a technology reliant society, I use my computer for just about everything. It was also good to read that I had almost all the extra security and privacy measures in place already. This is one reason I really like the computer I have because there are so many extra steps, I can take to be sure my computer is protected, and my information is safe. With each update and new model of computer, the privacy and security is even better. From my last computer to current, the new innovations definitely give me a stronger sense of relief that my computer is better protected and safer. Apple has made great strides with its recent technology to make sure their buyers devices stay protected. The fingerprint technology was a great addition as it makes it very difficult for anyone to get around that, being we all have unique fingerprints. It is so important to have a strong password and two-factor authentication on our devices. I think it is also important to use passwords and authentication that differ from all other devices. This way, if one computer or device gets compromised it does not put the others in jeopardy as well.

  18. The privacy of our devices is something that I think gets overlooked every day. First off, there is so much information that we have inside our devices. Many different methods have been used to protect this information for us such as regular number passwords, fingerprint identification, face identification, and many more. I think it quite interesting that we have all these different ways to secure depending on the company. Personally, while reading this article it made me think of all the different devices I have and how the protection varies differently. I have a picture password set up on my Windows computer, and this article explained to me why that might not always be the best option because if its discreteness. This article was very informative because it provided people with many different safe and secure options, no matter the device. Another interesting thing about the topic that sticks out to me is the fact that we have all these different ways to protect our things, yet we hackers are still able to access and get tour information. A good way to protect yourself from being hacked would be to constantly change the password. I think that sometimes people get too comfortable with the password, it allows an opportunity for people to access them. Two-Factor authentication is something else that I think is very good for the protection of our devices and accounts. Although sometimes it can seem annoying to have to do all that to have to access the account that you know the password for, you would want it to be extremely difficult for them. One of the most interesting things about this article to me is the amazing compatibility between Apple’s devices. I have an Apple Watch, but I did not know that it would be used to unlock the mac computers. That in itself kit shows how cool technology is now. We have seen how much Apple values our privacy and protection with their commercials and amends that they keep making. It is very interesting to see how different companies use different methods to ensure privacy.

  19. This article was formatted in a different way than I expected it to be. Nonetheless, I enjoyed reading the article and I was left with some key takeaways. This article was separated into 3 parts consisting of the safest ways to log into your computer with Windows, macOS, and finally Chrome OS. The section that I resonated with the most was macOS, solely because all of the electronics I own are Apple products. This article was similar to a tutorial. It explained step by step how to set proper security protection on your laptop/computer as well as education you on the best methods to use. I learned how to set up two-factor authentication on Mac, which is very important to have. In my previous internships, the companies have always had two step authentications. Usually this meant I had to open an application on my phone to then allow my computer to gain access to certain websites or domains. This is extremely important for any type of business, not just average people. According to WebARX, “there is an attack every 39 seconds on average on the web…” This statistic is extremely frightening for anyone who may own a small online business all the way to CEO’s of multimillion-dollar companies. I interned at an insurance company as well and was exposed to the premium prices of cyber security insurance. While premiums could be extremely expensive, it’s almost always less than the cost of getting hacked with no coverage. Nonetheless, some small businesses just cannot afford this type of security. That is why I think the information in the article is so valuable. It could mean the difference between spending millions of dollars to get your information retrieved and debugged or not.

    Another fact that stood out to me related to the Windows section. While I primarily use my mac for school, I also have a Windows PC at home. They seem to have the widest variety of security options and the most interesting is the Windows Hello Face and the Windows Hello Fingerprint. They stated that, “this sort of biometric authentication is very difficult to crack” (Nield) and it was explained to be one of the safest login options. Currently, my iPhone uses Face ID identification and previously, my iPhone used the fingerprint method. I can attest that these methods are very accurate, and I’m sure others would agree. Sometimes my phone won’t even unlock for me if it’s not at the right angle or has the right lighting. Overall, this article forced me to think about my login credentials and change the method I’m using. It reminded me of the importance of changing your passwords and avoiding guessable passwords. It’s important to keep your information safe because as technology grows, so does the ability to compromise it.

    Talalaev, Agnes. “Website Hacking Statistics In 2020.” WebARX, 14 Sept. 2020, http://www.webarxsecurity.com/website-hacking-statistics-2018-february/.

  20. Technology advances everyday, the new iPhone comes out every fiscal year, computers are advancing faster than we think, but this is the good side of technology. There is also a bad side of technology; people are always thinking of ways to get into your private information, and use it for their own advantage. However, companies like Microsoft, Apple, and Samsung have come up with unique and special ways for their customers to keep their products and their information private. Apple has both developed the TouchID (fingerprint scanner), as well as, FaceID. Everyone has a unique fingerprint so I believe that this measure will be most effective. These companies also develop randomized passwords for people to use when creating accounts for other services. This is generated with random characters, making it harder for anyone to hack or guess the password. Applications are also letting people know when an unknown device is logging into the device. You also have the ability to trust that foreign or not preventing anyone having access to your account. Some apps ask for the password and a pin to get into the device. Apple implemented the device location when unlocking the phone. So if an entity logs into anything you use on your Iphone, a location is sent to your phone to tell you where the login took place. Some websites will automatically log you out if you leave their service open for too long. This can prevent people from accessing your information without even needing a password or username. Despite all of the negatives, it is still good to hear that companies are still finding new ways to keep our information secure.

Leave a Reply

Your email address will not be published. Required fields are marked *