{"id":26589,"date":"2019-01-10T06:00:48","date_gmt":"2019-01-10T13:00:48","guid":{"rendered":"https://www.webroot.com/blog/?p=26589"},"modified":"2019-03-20T17:21:15","modified_gmt":"2019-03-20T23:21:15","slug":"the-must-have-tech-accessory-for-students","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/01\/10\/the-must-have-tech-accessory-for-students\/","title":{"rendered":"The Must-Have Tech Accessory for Students"},"content":{"rendered":"\n<p>We live in a digital age where internet-connected devices are the norm. Our phones, our televisions, even our light bulbs are tied together in today\u2019s tech ecosystem. For high school and college students, this degree of digital connection is the standard, and when school is in session, tech accessories are a popular way to customize the various connected devices that are now an essential part of students\u2019 lives.<\/p>\n\n\n\n<p>With their focus on specialized accessories, it\u2019s easy for\nstudents to overlook the importance of securing their connected devices. What\u2019s\nthe point of an expensive phone case or the perfect PopSocket if you\u2019re leaving\nyourself, and your data, vulnerable? Hacks, security breaches, and stolen\nidentities are often seen as things that don\u2019t happen to digital natives. But\nsecurity breaches can happen to anyone\u2014no matter how sophisticated a user may\nbe\u2014and are almost always preventable by practicing safe\ncyber habits and having the right security is in place. But where do you start?<\/p>\n\n\n\n<h2>Back to basics<\/h2>\n\n\n\n<p>For students at any level, these best practices may seem eye-rollingly intuitive, but they are the basic tools for staying safe and secure online. Flaws with basic cybersecurity often prove to be the catalyst for a chain reaction of breaches, so by making sure these essential fail-safes are in place, you go a long way toward protecting yourself from cybercrime.<\/p>\n\n\n\n<h3>Awareness<\/h3>\n\n\n\n<p>Being aware of your surroundings and the connectivity of\nyour devices is the first step towards a digitally secure life. But what does\nawareness mean from a cybersecurity standpoint? It means turning airdrop, file\nsharing, and open Bluetooth connectivity off, <em>before <\/em>you use your device in a public area. It means not leaving\nyour laptop unattended, even if you\u2019re just running to the bathroom at the\ncoffee shop. It means using a free tool, such as <a href=\"http:\/\/haveibeenpwned\">haveibeenpwned.com<\/a>,\nto see if your data has been breached in the past and taking corrective\nmeasures if it has been. Most importantly, it means treating public networks\nlike they are public, and not accessing sensitive information through them\nunless you take the proper precautions (more on that below).<\/p>\n\n\n\n<h3>Two-Factor authentication<\/h3>\n\n\n\n<p>Two-factor authentication, where a validation message is\nsent upon login, is a security feature that verifies that <em>you<\/em> are the one who is actually attempting to access your account,\nparticularly if the access request is coming from an unrecognized device or\nlocation. Two-factor authentication is the best way <a href=\"https:\/\/www.webroot.com\/blog\/2017\/11\/07\/two-factor-authentication\/\">to\nstop unauthorized users<\/a> from logging into your accounts. Most social\nmedia services offer two-factor authentication, but if you don\u2019t trust them to\nbe up to the task, use a third party service such as Authy or Google\nAuthenticator. SMS and email two-factor authentication measures are <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/09\/18\/ss7-google-coinbase-bitcoin-hack\/#6927a9fd41a4\">demonstrably weaker<\/a> than other\navailable two-factor measures, and should be avoided if possible (although it\u2019s\nbetter than using only a password alone). <\/p>\n\n\n\n<h3>Multiple passwords<\/h3>\n\n\n\n<p>No one likes to remember multiple passwords, let alone\nmultiple secure passwords. But never reusing passwords is the best way to\nprevent third-party breaches from affecting multiple accounts. A good tip for\nvaried passwords you can remember? Choose a phrase (or favorite song lyric) and\nbreak it down into sections. For example, <em>the\nquick brown fox jumps over the lazy dog<\/em>, becomes three separate passphrases.<\/p>\n\n\n\n<ul><li>the quick brown<\/li><li>fox jumps over<\/li><li>the lazy dog<\/li><\/ul>\n\n\n\n<p>This is a handy trick to wean yourself off the same two\npasswords you\u2019ve been using since middle school, and is better than password\nredundancy. Make sure you include spaces in your passphrases. In the rare case\nspaces are not allowed, then a phrase without spaces will suffice.<\/p>\n\n\n\n<h2>Digging deeper<\/h2>\n\n\n\n<p>If the tips above are the metaphorical security sign in the\nwindow of your digital life, the measures outlined below are the actual\nsecurity system. A small amount of additional effort on your part will help\nkeep you safe during your educational career.&nbsp;\n<\/p>\n\n\n\n<h3>Antivirus software<\/h3>\n\n\n\n<p>Making sure you have trusted antivirus software running on\nall devices is one of the most effective ways to stay safe from online threats.\nA cross-device service, such as <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/complete\">Webroot\nSecureAnywhere<\/a>\u00ae solutions, will keep you safe from potentially malicious\nemails, files, or apps. An important step to never skip? Keeping your antivirus\nsoftware up to date. This will help prevent newly surfaced viruses and malware\nfrom penetrating your systems. Or, chose cloud-based antivirus solutions, like Webroot\u2019s,\nthat do not require updates. <\/p>\n\n\n\n<h3>Password managers<\/h3>\n\n\n\n<p>Don\u2019t want to bother with remembering passwords at all?\nPassword managers with <a href=\"https:\/\/www.webroot.com\/blog\/2017\/09\/01\/password-manager\/\">secure\nencryption<\/a> make generating and storing passwords safe and easy. Many\npassword managers are compatible with common browsers such as Chrome and\nFirefox, <a href=\"https:\/\/www.webroot.com\/blog\/2017\/09\/01\/password-manager\/\">making it easy<\/a>\nto securely auto-fill passwords and other forms online. <\/p>\n\n\n\n<h3>Message encryption<\/h3>\n\n\n\n<p>Encryption services use ciphers to convert messages into\nrandom symbols, which are only able to be converted back when accessed by the\nintended recipient, with a special key. Common encryption options are Apple\nMessages and Signal, as well as WhatsApp, which is owned by Facebook. If you\nprefer an encryption option that isn\u2019t owned by a large corporation, Signal is\na part of Open Whisper Systems.<\/p>\n\n\n\n<h3>Virtual private networks<\/h3>\n\n\n\n<p>If you must access sensitive information through a public\nnetwork, setting up a virtual private network (VPN) will <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/vpn-wifi-security\">block and\nredirect your IP address<\/a>, preventing outside parties from tracking\nand storing your information. Your VPN setup will largely depend on both your\nspecific devices and price point, but with a little research and energy you can\nprevent anyone and anything from accessing your digital vault.<\/p>\n\n\n\n<h4>Vigilance is key<\/h4>\n\n\n\n<p>These tools are the true must-have tech accessories to\nsupport young people today and their digitally enhanced life. It\u2019s easy to be\noverwhelmed as a student with school, work, and social life, but don\u2019t let your\ncybersecurity defenses lag. Stay informed and stay updated.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We live in a digital age where internet-connected devices are the norm. Our phones, our televisions, even our light bulbs are tied together in today\u2019s tech ecosystem. For high school and college students, this degree of digital connection is the standard, and when school is in session, tech accessories are a popular way to customize [&hellip;]<\/p>\n","protected":false},"author":137,"featured_media":27309,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2985],"tags":[22505,23439],"yst_prominent_words":[22487,5337,18893,3517,16963,23777,23779,23783,4933,23771,5323,23775,4011,3479,20075,5101,23773,18745,5319,23781],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26589"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/137"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=26589"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26589\/revisions"}],"predecessor-version":[{"id":26599,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26589\/revisions\/26599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/27309"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=26589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=26589"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=26589"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=26589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}