Cyber Security Awareness
- officialbizyy_

- Feb 19
- 3 min read
In 2026, data security has become more critical than ever. There are tons of ways skilled hackers can grab your information. They may sell it, use it, leaving you vulnerable to damages. During this course you can expect to gain valuable information that should reduce your risk of losing accounts and spending time in chat support! I will show you with media and descriptive tips designed to leave you feeling safer browsing the world wide web.

Allow me to start by introducing the factors of my experience. I have completed an Information Technology Course, spent over a decade messing around with hardware, and software. I've been through many of the ropes. I have hands on experience and have dealt with many scenarios head on. It can be a little tricky, so my goal is to break it down into smaller steps that are manageable for you.
Let's start with the basics first, passwords. Each website has its own specifications; some allow more characters than others. Additionally, it can range from no restriction to 8-64+ characters. You want to include at least 1 symbol and 1 number, if not more always: when plausible. I usually create mine myself to avoid software that collects data. You should grab a pen or pencil and a notebook to ensure you aren't getting lazy and using a software to do it for you.
Next up is the phone number authentication method. This one is convenient, especially to those with unlimited texting. The only way someone could use your number to log in is by using your phone, sim card, or a method called cloning. If they use your phone, the proactive step would be don't let people use it. You still can, but you have an increased risk %. If they swap your sim, go to your local store or use a phone to temporarily cancel the service. When it comes to cloning, this is more advanced and can be a tricky one to solve.
With cloning, they can clone either your sim card or your phone. Even a reset won't solve this problem. You have to go to your carrier and actually cancel the service and number. After this happens, you can reset the phone, and it should resolve the problem. That's why backup's, active measures of defense, and browsing the internet with a VPN is so important. In the worst case, you may have to abandon the old accounts. That is why I'm here to help you take the proactive steps.
A clone can occur because someone wants your info, to mess with you, or even to sell your info. If you notice suspicious activity, check your logs under the security options.

Look for any unusual logins, timing, or info related to notifications you were concerned of.
This can help you identify if you're unsure.
Once cloned, you will have to turn your service off, reset your phone, and get a new sim card with a new number. This can leave your account(s) to a point of no return.
Another way that you can secure your account is by using an authenticator app. I recommend the authenticator over your phone number (you can choose both.) There are tons of apps on the app store... Whichever you choose, make sure you can back it up. You should store 2 backups, one offline and one online. An example would be a USB flash drive, and a secure cloud account (Google cloud, Proton cloud, iCloud.) The authenticator with backups is a great way to keep your account safe. Without the backup's, you risk losing the account forever if an unexpected event occurs.

One of the best ways to secure your account is a physical security key. You must have the key that inserts into the computer, to unlock your account. I highly recommend having 2 of them setup, because if you lose your only key, you're locked out by an unexpected event.

If you bring the key with you in public, leave one key at home. I suggest keeping a close eye on the key, because similar to a sim swap, someone could pickpocket you or you could drop it. This is an offline security that is stronger than authenticator apps, allowing for the highest of security standards.
I've gone over 3 common and powerful techniques for backing up your account. Additionally, there are backup codes and account recovery files, but I won't be going over those in this blog. If you wish to gain more depth on the topics discussed, and to understand the one's I haven't went over; check out my Cybersecurity course. It's only $1.99 and you'll also receive a certification upon completion letting you know, I can do this. I hope to see you there.



Comments