![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Dont be a Dork - Protect Yourself
There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Submitted for your reading pleasure are some of my tips to protect yourself and your identity. Gone Phishin' When I was a wee lass, my Grandpa George would take me to the pond on a warm Saturday afternoon and we'd fish for hours. Unfortunately, this type of Phishing has nothing to do with warm fuzzy memories of my Grandfather. Phishing (sounds just like fishing) usually arrives in your inbox in the form of a spoofed e-mail message. It sure looks legit, huh? Well, it's not. Phishers blast e-mail messages in the hopes you'll take the bait and click the links, which will redirect you to a fake website. What do they want? Your account numbers, PIN numbers, SSNs -- anything they can use to gain entry to bank and brokerage accounts and other financial information. Remember, your brokerage, bank, credit union and credit card provider will never ask for this information via e-mail. They will never ask you to login to your account to confirm information. If you feel you've been phished, do not access the links included in the e-mail. Also, report the phishing to your ISP and the Anti-Phishing Working Group (http://www.antiphishing.org/). The Paper Trail - Snatch that Receipt I bet you're the type to leave the receipt at the gas pump and at the ATM when you make that late night deposit. Smack on the hand and shame on you - stop doing that! Take ALL receipts when you make a purchase or a deposit, when you return items, etc. When you go to the clothing store, take the receipt out of the bag and place it in your wallet. Save all receipts until you receive your end-of-month statements (see Two Dollars below). Also, don't throw away your receipts; see my notes on shredding. It's ? Like ? Magic! Pet Peeve: Folks who use cheesy passwords to protect their online accounts - you folks make me crazy! I recently hired a client and I'm managing several e-mail accounts for him. Guess what password he used for ALL of them? You guessed it: magic. I immediately changed the passwords on all of the accounts and then we had a chat. You should never use a word you can find in a dictionary as your password. You should never use your birthday, the names of your wife or children or dog as passwords. Use a combination of letters and numbers and where possible, add special characters such as a bang (!) to your password. Also, change your passwords frequently, such as once a quarter or every six months. What's the "s" for, Anyway? Ever notice certain website changes when you're making online purchases? There's an "s" which appears after HTTP, for starters. This let's you know you're on a secure server. Also, check the status bar on the window you're using to make the purchase. You should see a yellow padlock -- mouse over the lock and you'll see the encryption level for the site. If you don't see both of these items, do not make the purchase right now and notify the vendor. Go back and make the purchase at a later time. I Didn't Charge Two Dollars Every month, without fail, I want to you check your statements from your credit union, bank, brokerage, credit card companies -- any institution from which you receive a paper statement or an online statement. If the bad guys have access to your account information, they may try and slip in a small charge before coming with the big guns. Take a look at each and every line item and verify you've made the purchase. If something is amiss, call that institution immediately. The Joy of Shredding I have a special "shred" basket near my desk and shred all of the basket's contents at the end of the work day. My personal receipts, which I no longer need and have reconciled against my online statements, get shredded. All working documents I've printed or proofed, especially for my attorney clients, are blitzed at the end of day, as well. Anything which may personally identify me or my clients gets the treatment. You have no logical excuse for not owning a shredder. Price? Not an issue, as shredders are incredibly affordable. You don't have a car to get to the office supply store? If you're reading this article that means you've got internet access. Start a new browser window NOW and access your favorite online office supply vendor. You'll have your new shredder in a matter of days and you too can become a Shredder Queen (or King). We live in a different world from just a generation ago. Be smart, be aware and remember that if something seems too good to be true, it is. Lori Davis is Director of the Future at Davis Virtual Assistants, a New York-based VA firm. DavisVA offers a wide variety of administrative, creative and technical services to small business owners and entrepreneurs. To learn more about Lori and DavisVA, please visit http://www.davisva.com and http://loridavis.typepad.com/davisva/. You may contact Lori at 917.319.8224 and via e-mail at lori@davisva.com.
MORE RESOURCES: Leading Jewish security organizations form super group called the ‘Jewish Security Alliance’ JTA News - Jewish Telegraphic Agency Security camera captures the moment a tornado hit a high school FOX 8 Local First ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation SecurityWeek Nashville Police Release Security Video of Suspect Shooting Out Doors and Entering Covenant School NBC 6 South Florida Executive Order on Prohibition on Use by the United States ... The White House What Is Security as a Service? MUO - MakeUseOf Lumen Technologies hit with 2 separate security incidents Cybersecurity Dive GPT-4 kicks AI security risks into higher gear VentureBeat Hunger and Malnutrition Threaten U.S. National Security, Report Says Drovers Magazine Remarks at a UN Security Council High-Level Debate on ... United States Mission to the United Nations NY Law Firm Pays $200K Over Healthcare Data Security Failures HealthITSecurity Security equipment taken in package theft - Oak Park Wednesday Journal Security experts discusses training practices to prepare for mass shootings Western Massachusetts News Apple Issues Urgent Security Update for Older iOS and iPadOS ... The Hacker News Why cybersecurity risks matter - and how to raise security World Economic Forum Breaking silence, GOP lawmakers lament overhaul’s security ramifications for Israel The Times of Israel Homeland Security warns about scam in Kansas City area WDAF FOX4 Kansas City Murray, Shaheen, 36 Colleagues Write to Pentagon Underscoring ... Senator Patty Murray Commerce Department Outlines Proposed National Security ... US Department of Commerce 908th Security Forces Squadron partakes in specialized skills training 908aw.afrc.af.mil Second suspect in fatal shooting of security guard at S. Houston ... KPRC Click2Houston Florida Agriculture Commissioner sees farmland, food as national ... WKMG News 6 & ClickOrlando Citing national security, Aurora bans TikTok on city devices Fort Morgan Times Wellsville man stages "protest" over school security in front of ... THE WELLSVILLE SUN Getting two Supplemental Security Income payments in one month Montgomery Advertiser ViVE 2023: How to tackle data privacy, security talent vacancies FierceHealthcare Squalicum students and staff safe following security scare | 790 KGMI 790 KGMI | News Talk Radio Rising Rate of Drug Shortages Is Framed as a National Security Threat The New York Times Statement from Secretary Mayorkas on President Biden’s National ... Homeland Security Microsoft pushes OOB security updates for Windows Snipping tool flaw BleepingComputer Society Hill residents pool money to hire a private security guard for the summer The Philadelphia Inquirer Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner FTC Approves Final Order Requiring Michigan-Based Security ... Federal Trade Commission News Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration FACT SHEET: President Biden’s Budget Strengthens Border ... The White House Department of State Announces Plans to Implement the CHIPS Act ... Department of State The Case for a Security Guarantee for Ukraine Foreign Affairs Magazine Biden Administration Announces Additional Security Assistance for ... Department of Defense TikTok Pushed by U.S. to Resolve National Security Concerns The New York Times After Denver school shooting, an outcry erupts over security The Associated Press Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security |
![]() |
![]() |
![]() |
RELATED ARTICLES
The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. Check Out That Privacy Policy Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. Web and Computer Security Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?Today’s cyberspace is hazardous. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. ![]() |
home | site map |
© 2006 |