BBO Logo

7 things you didn’t see as security risks for your bridge game (until now)

Online bridge platforms like Bridge Base Online are built to be as secure as possible. Malicious are out there, and most of them are bored and looking for something to break into – and we would all prefer that it’s not the game of bridge.

As an online bridge user, there are some things you can do from your end to enhance the security of your device. If your device isn’t safe, then you can almost immediately assume it might impact your bridge game or accounts, too.

Here’s a look at 7 things you didn’t see as security risks for your bridge game (until now).

1. Shared devices

If you share a device with anyone else in the household, guess that they are not taking the exact same security risks that you are (and they are probably visiting different sites).

This is a security risk within itself.

Make sure that anyone who shares your device has their own separate user accounts, and understands how to take proper precautions against online risks.

Don’t click weird links, don’t download weird software, and don’t visit weird sites. That’s a short but important talk for anyone on the internet today.

2. Third-party software

Third party software usually means anything that doesn’t come from its original source. If you were to download the app for Bridge Base Online as an apk-file from somewhere that isn’t BBO or your app store, that’s the risk I mean.

Third-party software can be adapted or modified in any number of illegal ways. It’s not approved software, and might even be hiding malware.

Download only from trusted sources.

3. Link-viruses

If you’ve ever received a message that says, “Click this link” from a friend and the link makes no sense, it’s likely a virus. It spreads from one person to the next by replicating throughout their inbox – and it could hit anywhere, including social media or instant messaging.

What then?

Warn them that it happened, and just don’t follow their link.

4. Keyloggers

Keyloggers are specific types of malware that record your keystrokes. Usually, this goes straight into the wrong hands – and what they are after is passwords.

They’re a huge security risk, and you can do your part to reduce their sting by running antivirus software on your devices often.

And of course, don’t download things (or click links) that might hide malware in the first place.

5. Old browsers

Update your browser, and always make sure you’re using the newest version. Older browsers hide vulnerabilities and back-doors (and generally, older stuff) that hackers can exploit easier.

The same applies to your operating system, and software that you use on a regular basis. When there’s an update, get it. It’s usually meant for your own security.

6. Open bluetooth connections

An open Bluetooth connection is a risk that most people don’t see.

It means that your device is broadcasting, and when it’s broadcasting, it can be seen. When it can be seen, the next step is getting discovered and hacked.

You’d be surprised at what people can manage through a Bluetooth hack you didn’t even know had happened. When not actively connected to anything, make sure your device’s Bluetooth setting is turned to off.

It’s much, much safer.

7. Public Wi-Fi networks

It’s likely that you’ve seen the notifications from some banking institutions that advise you never to access your banking from public wi-fi networks. That’s because it’s good advice.

Follow it even for online bridge.

Public wi-fi networks leave your device connected to the pool, and obviously, this makes it more vulnerable.

On a public network, the administrator (and sometimes, piggy-backing hacker) can see all of the links you’ve clicked and more. Scary thought, isn’t it?