Security

Secure Your Home Wi-Fi Network

Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their operating system.
Categories: Security

Privacy

Privacy is more than just settings in your social media account or using the Tor Browser. Your data and actions are collected in a variety of ways. The more aware you are of just how much of your data is collected, the better you can protect it.
Categories: Security

Recording Conference Calls

When hosting or attending conference calls, only record the call if you have prior permission, a work related need to record the call, and you make sure everyone on the call knows it will be recorded.
Categories: Security

Messaging / Smishing Attacks

Cyber attackers can just as easily trick or fool you in messaging apps as they can in email. Be on the look-out for scams or attacks via apps such as Slack, Skype, WhatsApp or event simple text messaging. The most common clues are tremendous sense of urgency or curiosity.
Categories: Security

Two Home Computers

If possible, have two computers at home -- one for parents and one for kids. This way they can't accidently infect your computer. If you are sharing a computer, make sure you have separate accounts for everyone and that kids do not have privileged access.
Categories: Security

Two Home Computers

If possible, have two computers at home -- one for parents and one for kids. This way they can't accidently infect your computer. If you are sharing a computer, make sure you have separate accounts for everyone and that kids do not have privileged access.
Categories: Security

Never Respond to Emails Asking for Personal Information

Companies you do business with should never ask for your account information, credit card numbers or password in an email. If you have any questions about an email you receive that supposedly came from your financial institution or service provider, find their number on their website and call them.
Categories: Security

Social Media Privacy Settings

Privacy settings on social networks can be confusing to configure and change often. Ultimately, if you do not want your parents or boss reading one of your posts, do not post the message or photo.
Categories: Security

Social Media Privacy Settings

Privacy settings on social networks can be confusing to configure and change often. Ultimately, if you do not want your parents or boss reading one of your posts, do not post the message or photo.
Categories: Security

Finding a USB Drive

Be very careful of any lost USB drives you may find (such as in the parking lot or local coffee shop) or USB drives you are given at public events, like conferences. It is very easy for these devices to be infected with malware. Never use such devices for work, use only authorized devices issued to you by work.
Categories: Security

Bluetooth

Turn off Bluetooth if you are not using it on your computer or mobile device. Not only does this make it more secure, but it also saves battery life.
Categories: Security

Messaging / Smishing Attacks

Cyber attackers can just as easily trick or fool you in messaging apps as they can in email. Be on the look-out for scams or attacks via apps such as Slack, Skype, WhatsApp or event simple text messaging. The most common clues are tremendous sense of urgency or curiosity.
Categories: Security

Email and Emotions

Never send an email when you are angry or emotional; you will most likely regret it later. Instead, open up an email and write everything you feel, but do not send the email. (Be sure there is no name in the TO field so that you do not accidently send it.) After you have vented, go have a coffee or tea and come back an hour later. Only reply to any type of emotional situation after you have had time to cool down.
Categories: Security

Older Generation

Using technology securely can be overwhelming or confusing, especially for those who did not grow up with it. When helping secure those who are uncomfortable with technology focus on just the basics - 1) be aware of social engineering attacks 2) secure your home network 3) keep your systems updated 4) use strong, unique passwords 5) backup your key personal data
Categories: Security

Got Backups?

Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information at home (such as family photos) on a regular basis.
Categories: Security

Scamming You Through Social Media

You may be aware that cyber attacks will try to trick you over the phone or through email using phishing attacks, but do you realize they may try to attack you also over social media channels, such as Snapchat, Twitter, Facebook, or LinkedIn? Just like in email, if you get any social media messages that are highly urgent or too good to be true, it may be an attack.
Categories: Security

Go with Passphrases

Passphrases are one of the strongest type of passwords you can use and often the easiest to remember and type. Simply use random words or an entire sentence for your password, such as "Honey rain beach lost" The longer your passphrase, the stronger it is.
Categories: Security

Protecting Your Social Media Account

Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.
Categories: Security

Never Give Your Password Over the Phone

Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account.
Categories: Security

Search Yourself Online

Ever wonder just how much information is publicly available about you? Ever wonder how cyber criminals harvest information and customize attacks for their victims? The technique is called Open Source Intelligence (OSINT) and it is far simpler and more powerful than you think.
Categories: Security
Syndicate content

eXTReMe Tracker