Security Information |
|
Dont be a Dork - Protect Yourself
There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Submitted for your reading pleasure are some of my tips to protect yourself and your identity. Gone Phishin' When I was a wee lass, my Grandpa George would take me to the pond on a warm Saturday afternoon and we'd fish for hours. Unfortunately, this type of Phishing has nothing to do with warm fuzzy memories of my Grandfather. Phishing (sounds just like fishing) usually arrives in your inbox in the form of a spoofed e-mail message. It sure looks legit, huh? Well, it's not. Phishers blast e-mail messages in the hopes you'll take the bait and click the links, which will redirect you to a fake website. What do they want? Your account numbers, PIN numbers, SSNs -- anything they can use to gain entry to bank and brokerage accounts and other financial information. Remember, your brokerage, bank, credit union and credit card provider will never ask for this information via e-mail. They will never ask you to login to your account to confirm information. If you feel you've been phished, do not access the links included in the e-mail. Also, report the phishing to your ISP and the Anti-Phishing Working Group (http://www.antiphishing.org/). The Paper Trail - Snatch that Receipt I bet you're the type to leave the receipt at the gas pump and at the ATM when you make that late night deposit. Smack on the hand and shame on you - stop doing that! Take ALL receipts when you make a purchase or a deposit, when you return items, etc. When you go to the clothing store, take the receipt out of the bag and place it in your wallet. Save all receipts until you receive your end-of-month statements (see Two Dollars below). Also, don't throw away your receipts; see my notes on shredding. It's ? Like ? Magic! Pet Peeve: Folks who use cheesy passwords to protect their online accounts - you folks make me crazy! I recently hired a client and I'm managing several e-mail accounts for him. Guess what password he used for ALL of them? You guessed it: magic. I immediately changed the passwords on all of the accounts and then we had a chat. You should never use a word you can find in a dictionary as your password. You should never use your birthday, the names of your wife or children or dog as passwords. Use a combination of letters and numbers and where possible, add special characters such as a bang (!) to your password. Also, change your passwords frequently, such as once a quarter or every six months. What's the "s" for, Anyway? Ever notice certain website changes when you're making online purchases? There's an "s" which appears after HTTP, for starters. This let's you know you're on a secure server. Also, check the status bar on the window you're using to make the purchase. You should see a yellow padlock -- mouse over the lock and you'll see the encryption level for the site. If you don't see both of these items, do not make the purchase right now and notify the vendor. Go back and make the purchase at a later time. I Didn't Charge Two Dollars Every month, without fail, I want to you check your statements from your credit union, bank, brokerage, credit card companies -- any institution from which you receive a paper statement or an online statement. If the bad guys have access to your account information, they may try and slip in a small charge before coming with the big guns. Take a look at each and every line item and verify you've made the purchase. If something is amiss, call that institution immediately. The Joy of Shredding I have a special "shred" basket near my desk and shred all of the basket's contents at the end of the work day. My personal receipts, which I no longer need and have reconciled against my online statements, get shredded. All working documents I've printed or proofed, especially for my attorney clients, are blitzed at the end of day, as well. Anything which may personally identify me or my clients gets the treatment. You have no logical excuse for not owning a shredder. Price? Not an issue, as shredders are incredibly affordable. You don't have a car to get to the office supply store? If you're reading this article that means you've got internet access. Start a new browser window NOW and access your favorite online office supply vendor. You'll have your new shredder in a matter of days and you too can become a Shredder Queen (or King). We live in a different world from just a generation ago. Be smart, be aware and remember that if something seems too good to be true, it is. Lori Davis is Director of the Future at Davis Virtual Assistants, a New York-based VA firm. DavisVA offers a wide variety of administrative, creative and technical services to small business owners and entrepreneurs. To learn more about Lori and DavisVA, please visit http://www.davisva.com and http://loridavis.typepad.com/davisva/. You may contact Lori at 917.319.8224 and via e-mail at lori@davisva.com.
MORE RESOURCES: Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal He’s a Security Guard at the Met. Now His Work Is Showing There. The New York Times Why does Trump want Greenland and the Panama Canal so badly? One reason may surprise you - USA TODAY Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data ABC News Remarks at a UN Security Council Briefing on Nonproliferation and the Democratic People’s Republic of Korea United States Mission to the United Nations Sweet Security Partners with Illustria to Offer Proactive Open-Source Supply Chain Risk Management GlobeNewswire Krebs on Security – In-depth security news and investigation Krebs on Security One week later: New Orleans debates security, memorial grows, more chemicals found FOX 8 Local First New in 2025: Counties Should Prepare Now for the Upcoming HIPAA Security Rule Update National Association of Counties Special ops forces seek to manage digital footprints, achieve ‘security through obscurity’ DefenseScoop Pope to celebrate Jubilees for Communications, security forces Vatican News - English White House program to certify the security of IoT devices goes live Cybersecurity Dive U.S. citizen denied entry into Poland after security staff object to handwritten notes in passport ABC News Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations Stowaways on planes and inside landing gear raise worries about aviation security The Associated Press Brillion Achieves SOC 2 Type 2 Compliance, Reinforcing Commitment to Data Security and Privacy Business Wire Opinion | Biden’s ‘security’ concern about TikTok and U.S. Steel is doubly specious The Washington Post New Orleans Homeland Security criticized during terror attack probe WDSU New Orleans Border security is national security Foundation for Defense of Democracies The Rio Treaty's Security Pact and Unintended Consequences of Threatening Canada, Greenland, and Panama Just Security Tidal Cyber Acquires Zero-Shot Security to Enhance Threat Intelligence Mapping Capabilities Business Wire Swimlane Hero helps solve complex security operations problems Help Net Security Security guard catches DJ molesting 12-year-old boy at California mall, officials say Sacramento Bee Who is Acronis’ New Chief Information Security Officer? Cyber Magazine UN aviation agency confirms recruitment database security breach BleepingComputer AITX's RAD-R Welcomes Steve Danelon as President, Strengthening Leadership for Residential Security Solutions GlobeNewswire Fort Smith Public Schools to integrate AI gun detection software in security cameras Northwest Arkansas Democrat-Gazette Orange Bowl pep rally security includes surveillance cams, law enforcement on the ground - CBS Miami Update on former Vigo County Security Annex demolition MyWabashValley.com Security Industry Association Welcomes New Perimeter Security Subcommittee Leaders Security Sales & Integration BreachLock Unveils Unified Security Testing Platform for PTaaS, ASM, Continuous Pentesting, and Red Teaming PR Newswire Alois Brunner, the Nazi ‘butcher’ who trained Syrian security Al Jazeera English Marine Corps bases take increased security posture The Island News – Beaufort, SC When It Comes to Security, Europe Is Whistling Past the Graveyard World Politics Review Synology Launches ActiveProtect: Simplifying Enterprise Data Protection with Unmatched Security, and Scalability Business Wire Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data The Associated Press Security and Sanctions in Post-Assad Syria The National Interest Online Security consultant denied profiteering in defamation case against CNN WMBB - mypanhandle.com 2025 Security Industry Predictions: Jon Adams, Vice President of Sales, DMP Security Sales & Integration Eric Trager tapped for Mideast slot on Trump’s National Security Council The Times of Israel Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Washington Township Police to launch security risk assessment program for businesses Bellefontaine Examiner New Orleans hires consultant to review security after Bourbon Street attack. See who has the job. NOLA.com New Orleans attack prompts tighter security in D.C. ahead of inauguration, Carter funeral The Chicago Cusader Newark Airport makes list of Top 10 craziest security catches New Jersey 101.5 FM Base steps up security measures following terrorist attacks Mountain Home News Gov. Ivey mourns security detail member Justin Williams, 42, succumbed to cancer Alabama Political Reporter |
RELATED ARTICLES
Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. What Can Be Done About Spyware And Adware Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use. Spyware, What It Is, What It Does, And How To Stop It Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Web and Computer Security Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?Today’s cyberspace is hazardous. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800. |
home | site map |
© 2006 |