3.1.20

Simple steps to protect yourself against identity theft



As we enter a new year, be sure to keep up, or adopt, these good data security habits to avoid identity theft

By Tony Anscombe

Are you doing enough to reduce the risk of having your identity stolen? As you start the New Year, this is a good time to reflect on what kinds of measures you should take to prevent thieves from stealing and using your Personally Identifiable Information (PII) for fraudulent activities. As more and more of our personal information is online and cybercriminals target everything from bank accounts to tax refunds, identity theft is a growing concern. With your sensitive information in their hands, crooks can make fraudulent purchases, open new accounts or apply for loans in your name.

Watch the video to see how you can reduce the risk of falling victim to identity theft.  

Among other things, you’ll learn:
·         How to respond to requests for your personal information
·         Why register with credit bureaus as well as monitor your financial accounts
·         How to stop scammers from pulling off a SIM card swap
·         Why using weak passwords is risky and what to do instead
·         Why opt for multi-factor authentication wherever it is available
·         How security software can help
·         Why encrypt your data and devices and shred documents containing sensitive information

31.12.19

20 tips for 2020: Mistakes to avoid – cybersecurity habits to avoid - part 1


By Amer Owaida


As we’re entering 2020, we’re also plotting out our New Year’s resolutions. Instead of suggesting what you should do next year, however, let’s have a look at some cybersecurity mistakes you should avoid for a more secure 2020.

Denying you are a target
You’ve probably already brushed off this possibility with contempt, thinking the chances are slim to none. To quote Dwight from The Office, “False”. When it comes to the internet, you cannot anticipate if a breach will directly affect you. New malware may appear or a service that you use may get hacked and your password can be leaked. All of these are probabilities that you should be aware of, and prevention can go a long way in securing your connected presence.

Clicking on suspicious links
Receiving spam has become a part of everyday life. Sometimes it’s just a harmless ad, but every now and then it can be something more sinister. You might get an email coaxing you to click on a suspicious link to claim a prize you’ve won. Or an offer that sounds too good to pass up might appear in an ad. Whatever the case, if you have even a shred of doubt about it: avoid clicking on it at all costs. The link just may contain malware that may wreak all kinds of havoc on your computer.

Failing to patch
Is your computer nagging you for the umpteenth time to install that pesky update? Perhaps the latest patch for your smartphone’s OS has been released. You’ve probably hit the postpone button more times than you’ve snoozed your alarm. We can’t speak to your sleeping habits, but you should always keep your devices updated to the latest version of software available. It will probably save you from a headache in the long run. The infamous WannaCryptor malware spread due to devices not being patched.

Recycling your passwords
To simplify the arduous task of memorizing scores of passwords, some people resort to recycling. This means that they reuse the same password or passphrase, perhaps varying a character or two or by adding upon it. This practice should be avoided. If the bad actors figure out one of your passwords, password reuse allows them to guess the rest of your passwords.

Not using 2FA
Two-factor authentication (2FA), also known as multifactor authentication (MFA), is a simple way to add an extra layer of security to your accounts. The most common 2FA method used by popular online services is a text message with an authentication code sent to your phone. It is one of the most basic methods but use at least this one if you have no other option. If bad actors are missing one piece of the puzzle, they cannot get in until they overcome that hurdle, which might make them look for an easier challenge elsewhere.

Ignoring your router setup
When it comes to home interconnectivity, the router is the heart of your home. All your devices with an internet connection are linked to it, be it your smart TV, smartphone, personal computer or laptop. For convenience’s sake, a lot of people just go through the bare necessities when installing it or keep the default settings pre-configured by your ISP. You should always take steps to secure your router, so you can browse the internet safely.

Using unsecured public Wi-Fi
Most places like cafes, restaurants, and even shops offer complimentary Wi-Fi connections, which is a welcome alternative to using up your precious data plan. As convenient as such free connections might be, you should be careful what you connect to. An unsecured public Wi-Fi can lead to your private data being stolen or your device being hacked.

Disregarding VPN
Besides using a Virtual Private Network (VPN) to connect to your work’s servers, there are other security reasons to use one in private. You can use VPNs to access your home network remotely or to limit your ISP from seeing what you are doing, or to browse safely on public Wi-Fi. Depending on what you want to do, there are various types of VPNs you can choose from to protect your communication.

Skimping on security software
The internet is a useful tool, no doubt, but to paraphrase G.R.R. Martin, it can be dark and full of terrors. Granted, this leans towards hyperbole, but you should always use reputable security software to protect your data. Clicking on the wrong link might lead to malicious code making its way to your computer. Security software provides multiple layers that can stop these threats in their tracks. Prevention is the mother of security; athletes in contact sports use mouthguards as a preventive measure because fixing their teeth is more expensive than protecting them. The same goes for your data.

Underestimating backup and encryption
If, due to some unforeseen circumstances, your computer kicks the can, having a backup comes in handy. Always back up your sensitive data and things you have been working on recently; thus, if something does happen, you can continue unhindered by the unfortunate loss of your device. The same goes for encryption. Never underestimate the value of having your data encrypted: if you get hacked, the bad actor will have a tough time getting to your data; if your device gets stolen, you have an extra layer of security in place before you remotely wipe it.

If you just counted ten tips and not twenty, you would be right. So stay tuned, as tomorrow we’ll continue with tips that will be geared towards smartphones.

30.12.19

How to get rid of your old devices safely


Disposing of old tech isn’t a one-click solution; there are multiple things you have to consider before moving on to greener pastures.

Black Friday, Cyber Monday and even Christmas are behind us. Which means some of us may have been fortunate enough to unwrap a shiny new laptop, smartphone or tablet. But what about our old devices?

Some of us keep our old devices as back-ups in case something goes amiss. On the other hand, the majority likes either to share the holiday cheer and gift their old devices or sell them. Whatever the case may be, there are some things you should do before you can pass the device along safely.

Mind you, if you’re more of a video person, we’ve got you covered, too. Otherwise just scroll down to read the main part of this article.

General advice

The one rule you should always adhere to is back up your data frequently. Usually, if it involves your smartphone, you can back up your data to the cloud or your computer. If it involves your computer, you can use a combination of cloud and external drive. Whichever suits you better, but just make sure you do it so you will not lose any sensitive data you may need in the future.

Computers

Most computer users think that formatting their hard drive means that they have wiped their data from the drive, which simply put, is untrue. The data is still recoverable from your drive even after you format it. Wiping the drive on your computer differs from operating system to operating system.

If you have a Mac, the process is quite simple and straightforward. You can use the built-in Disk Utility feature to wipe your drive; it even allows you to determine how thoroughly you want to wipe it.

If you are running Windows, there is no built-in disk wiper, but there are a variety of options you can use. You can browse the web for the best reviewed tool to fit your needs, but the free versions of some may only work with mechanical hard drives.

For solid-state drives (SSDs), then we suggest referring to the manufacturers’ websites for their drive utilities. If you want to go above and beyond, then there is the nuclear option of physically destroying your drive. If you’re comfortable and are well versed in how drives work, you can destroy the necessary components yourself.

The other option is visiting a specialist service that has machines, such as shredders or crushers to dispose of your disk. Fair warning though, not all computers have easily removable drives. Macs, for example, have SSDs soldered to their motherboards.

Smartphones

Smartphones have their own utilities that are implemented in the system to make the process as streamlined as possible. If you’re getting rid of your old iPhone, first sign out of all your services such as iTunes, iCloud, App Store, etc. Then go through your Settings, enter the Reset menu, and tap on Erase All Content and Settings.

If you’re planning on passing along your Android device, the process may vary a bit from manufacturer to manufacturer, but the procedure should be roughly the same. Start by removing the security measures like the Lock screen, then move on to removing the accounts you are signed in with. To go the extra mile, encrypt the data on your phone and after that’s done run the Factory Data Reset on your phone. If you’re using an SD card, don’t forget to pop it out.

Recycle

Be environmentally responsible. If you plan to dispose of the device, don’t just throw it away. Look for places that recycle used electronic devices. They contain valuable resources that can be used in manufacturing future devices. If you’re not sure how to go about it, you can check with the manufacturer’s website or your government should have reasonable advice.

If you are not planning on handing a still functional device on to a relative or friend, consider donating it. One person’s trash is another’s treasure and after all, it is the season to be jolly, so why not share the cheer with someone less fortunate?
b