![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Protect Your Little Black Book
The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Does she give it back, or does she explore it? If she gave it back, we wouldn't have a movie, now would we? Stacy then proceeds to identify his ex-girlfriends and contact them. Let the games begin. Could this really happen? Of course it could. Most PDA's contain a plethora of information about a person and their activities, their digital footprints. People store contact information, appointments, meetings and midnight rendezvous'. They store passwords, login ID's and PIN numbers. They have photos of people they know and sometimes in awkward circumstances. It's a lot to have to explain. The courts are only beginning to grapple with how to handle the content in a PDA. One person's little black book can be very incriminating indeed. For the rest of us, we have nothing as exotic; however, we are all in danger of exposure and threat. Identify theft has become one of the largest white-collar crimes. There is enough information in the average PDA for someone to take over your life. So, what's the solution? Give up your PDA? No. You face the same problem with the typical day planner. It has all of the same information, it's just not as accessible. In fact, a PDA has certain advantages over a planner. You can password protect some of the data. You can even encrypt data. Most importantly, you have a backup. The data is safely stored on your computer and archived on external media if you have taken the proper steps. That duplication of data also means an identity thief has more ways to get to it. So, what can you do? Well, the first concern is to make sure that you backup your data. Synchronize your PDA at least daily. I synchronize my Treo 600 2-3 times each day, usually when I arrive at my office or leave it. Backing up your data means that you should be creating a copy on tape, CD, zip disk, flash ROM or other external media and storing it offsite. If you are not, you are asking for trouble and your business is at risk. If your PDA is ever stolen, you will need to restore that data on a new PDA. Next, you need to minimize the amount of data someone can actually access. Let's face it, if a hacker really wants to get your data, they will succeed. However, not every criminal is a super hacker. Sometimes you just want to keep your information from prying eyes. Just because you labeled something as private in your PDA doesn't mean someone else can't read it. It depends on what application you synchronize with. If you sync with Outlook, records that are private on your PDA may be public in Outlook. The best way to protect passwords and PIN numbers is to store them in a password application that encrypts the data. The best applications have both a PDA application and a desktop application that allows access to the information from either system. The trouble is converting that data from whatever format it's in currently. I've struggled with this one myself. There is no easy method I've found so far. Just set aside time to copy and paste the data into the password application. It might take a few hours to get that information into a secure application. If you're worried about someone viewing your schedule, the best approach is to archive your past history periodically. Outlook has settings that allow you to specify to how often calendar events will be archived. This will wipe the history from your PDA also. Archives are usually stored in an external file that can be accessed later. If you have incriminating photos, delete them. If you want a copy, save it on external media like tape, CD and flash ROM. For contacts, you can archive them or simply move the record to an external file. Outlook allows you to create a .pst file that you can use to save email, calendar, address, tasks, or other information. Once you move a record, it will be removed from your PDA. And, don't forget to delete the cookies and memory cache on your PDA's web browser. Remember that website you checked out last week? Is that something you want everyone else to know about? I don't think so. Don't forget physical security; keep an eye on your PDA. It's possible to take steps to protect your data and remove your digital footprints. Protect your little black book and it will protect you. Rick Cooper, The PDA Pro, is the PDA Coach for productivity anytime, anywhere. He is a national speaker on business productivity and sales. Rick is President of StratAchieve, a company specializing in coaching services to improve productivity and increase revenues. For more information, visit his website at www.thepdapro.com or call (800) 677-6708.
MORE RESOURCES: Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) The impressive security measures at Pope Francis' funeral, from anti-drone bazookas to Eurofighters Euronews.com Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) Belarus Weekly: Russian, Belarusian security services plan violent attacks on Belarusian diaspora The Kyiv Independent Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) Summit on the Future of Energy Security IEA – International Energy Agency NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay Get to know new security leaders at OSU-CHS Oklahoma State University ATA Transportation Security Council Recognizes Fleets American Trucking Associations Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine Judges Worry Trump Could Tell U.S. Marshals to Stop Protecting Them The New York Times Mobile Applications: A Cesspool of Security Issues Dark Reading Inside the Fiasco at the National Security Council The Atlantic Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico US Donates Decommissioned Cutters to Tunisia to Bolster Regional Security The Maritime Executive DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Kristi Noem’s Stolen Purse at a Burger Joint Is Still a Washington Mystery The New York Times King County Security Tips – “Google” yourself kcemployees.com UN Security Council condemns Jammu and Kashmir terror attack Department of Political and Peacebuilding Affairs Fiesta goers can expect increased security at main events Texas Public Radio Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) Homeland Security, Riverside County deputies raid business in Pomona FOX 11 Los Angeles Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent Footage Reveals New York-To-Paris Delta Flight Stowaway Getting Through Airport Security Travel Noire Rome Health to install new security systems Rome Sentinel Tarleton State University elevates campus security, student safety with new mobile app. Beneath the Surface News National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com Associated Press: Civil rights groups sue to restore jobs at Homeland Security oversight offices that were gutted Robert F. Kennedy Human Rights Security increased in disputed Kashmir as India vows to punish perpetrators of attack that killed 26 PBS California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Climate and National Security: Bridging the Divide in Energy Policy Columbia Business School Anton’s Security Blog Quarterly Q1 2025 Security Boulevard Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) Trump administration highlights economic growth and national security wins in April 2025 Fingerlakes1.com Temple University stepping up security after several students assaulted near campus last week CBS News NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) Trump Should Have Stuck With Border Security, Not Mass Deportations New York Magazine Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure Windows "inetpub" security fix can be abused to block future updates BleepingComputer Hegseth’s Personal Phone Use Created Vulnerabilities The New York Times New Syrian foreign minister attends UN Security Council in first US appearance since Assad's fall AJC.com Verkada launches executive protection offering Security Systems News Pete Hegseth’s bad calls: Unfit defense secretary is a major security risk New York Daily News Increased Security at City Courthouses? Unanswered Questions Baltimore Witness Two state officials join Department of Homeland Security Dakota News Now ‘We need to apprehend him’: $10K reward offered for Family Dollar ‘security guard’ who killed man WSB-TV The Role of Smart Security Systems in Addressing Healthcare Demands Security Sales & Integration Updates to parking and security at the parks around Lake Tapps Tacoma News Tribune |
![]() |
![]() |
![]() |
RELATED ARTICLES
8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Protecting Your Home Both Inside and Out If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged. Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. HackAttack P C. owners are constantly at risk from attacks by hackers. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. Top 10 tips for Safe Internet Shopping Over 5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. If You Steal It, They May Come! Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks. Five Excellent Indie Encryption And Security Solutions You Have Not Heard About 1. Geek Superherohttp://www. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. ![]() |
home | site map |
© 2006 |