- December 18, 2017
Written by Darren L. Epstein, all rights reserved. Copyright © 2019 / (DO NOT COPY)
Written by Darren L. Epstein, all rights reserved. Copyright © 2019 / (DO NOT COPY)
The Layman-terms Guide to Online Security and Staying Secure:
The world isn’t what it used to be, but you can’t stop using a computer or smartphone. There are ways to keep yourself safe and secure, without having to get a degree to understand it all. Technology changes often, so keeping up with the newest security features isn’t easy, but the latter… ISN’T AN OPTION. STAY AHEAD OR FALL BEHIND!!!
Today…the news is a buzz about Apple, Google, Facebook, and Twitter vs. the U.S. Government and what really are the expectations of a private company and the U.S. government. There’s that word again, “expectations”… it seems to always follow us. Rather than having the void and uncertainty “expectations” brings, new laws beckon to rewrite the two hundred+ year-old laws governing this topic. It’s time the government dust off its books and realize we are in the twenty-first century making legal decisions with laws created before computers, phones, and the Internet. Changing the laws to reflect the digital world we live in today stops future issues like many happening today. Until the laws catch up with the companies taking advantage of their customers… we must act! How? What should you be looking for when keeping your personal information secure?
Top 30-Ways to protect yourself online:
- A strong virus protection software. Do your research at downloads.com
- A strong firewall (software or hardware).
- Pick a strong password. Never a real word, include caps, lowercase, numbers, and a symbol. BETTER YET… use a “Passphrase” which is easier to remember and more difficult to guess. Make sure it’s a made-up phrase, BOTS and AI can search song databases, books, and alike and brute force your password or passphrase.
- Only surf secure sites (Banking, Credit Accounts, Shopping, etc.) while on a secure network. If out and about, use your smartphone’s Hotspot to stay within your private network.
- Never use your ATM card at gas pumps. Criminals break the locks and place key loggers within stealing your CC details.
- When using an ATM, make sure it’s secure and when possible walk into the bank to obtain money from the teller. Criminals exploit ATM machines in various ways along with the ability to hack these machines today.
- Never use your ATM card for online purchases. Use a credit card with online fraud protection.
- Never use your ATM card overseas, use a credit card with fraud protection.
- If you use electronic Door locks, don’t add them to your web hub. You can still use all the great features, besides being able to unlock your door from miles away… and why would you want to. When you make these electronic door locks ‘Net-enabled’ you open your front door to the world of hackers. Keep it local, like a key! Your local Amazon, Siri, and alike will still open the door on command, just not from miles away.
- If shopping online, make sure the site is credit card PCI compliant…if not move on.
- Make sure the site you’re using is secure by using 256-bit Encryption; click the lock within the URL for additional details.
- Do not work on confidential information when visiting Starbucks or alike. Hide your screen!
- If you received an email with a link within, you’re best to copy the link and paste it into a web browser. The clicking of the link is the executable action, it could activate (.exe) a virus software to launch.
- Years ago, you could spoof caller ID, making it look like someone else was calling. Today, you can spoof almost anything… e.g. spoof Caller ID, Spoof Emails, Spoof a website, etc. Another trick online criminals often use. Just because you think you got an email from someone you know… doesn’t necessarily mean so.
- Never post on social media that you are away on vacation; post vacation pictures when you get home.
- Turn off your GEO tagging in pictures, there’s no reason to show a person exactly where you have been.
- Control your friends list on social media; many criminals, and perverts alike are catfishing and attempting to friend you for the wrong reasons. Once in they spread to other users.
- Use biometrics to access systems whenever possible. Using fingerprint or facial recognition. Use FIPS 201, PIV biometric, or above.
- Children’s Internet Safety: There are many products to protect what your child can’t surf, please be proactive and protect your children!
- Start using a VPN (Virtual Private Network), you can download one and use it on multiple devices, e.g. (computer, smartphone, TV, gaming system, etc.). A VPN hides your actual IP address, no one truly knows who you are and where you’re located. There are free versions, hardware versions, etc. Check out the differences before you make your decision.
- There are websites to assist with sending anonymous emails, and even browsers that will hide your IP address, e.g. Tor, Onion…etc.
- Never send a username & password in the same email. Send it within two emails, separately… or better yet text the password. This goes for credit card data as well.
- If you use an ‘Online System’, make sure it deactivates an account if a user/pass is entered incorrectly multiple times. This protects against brute-force hacking attacks that guess passwords.
- If using an ‘Online System’, make sure it ‘Times-Out’ after a delay in usage.
- If you use an ‘Online System’, ask questions about Servers, Hosting providers, whether data is encrypted on servers and during transit, and the Structure of how data is written. Is it PCI-compliant? Also, obtain the full SOC reports (Service Organization Control) reports (1, 2, & 3) or SSAE 16 reports. Have the company provide results of any internal or external vulnerability assessments or penetration testing. What is their up-time and estimated downtime? Have them provide a disaster recovery/business continuity plan and lastly…check it against an online security system like https://www.ssllabs.com/ssltest. Make sure the grade is an A or B. Ask about their server setup – 2-server setups ONLY! App Server / Database Server. Are users/passwords Encrypted?
- Turn off ports within your server so hackers can’t ping attempting to access your system. FYI: Use other remote desktop software, Microsoft Remote Desktop is known to have vulnerabilities.
- All Cloud-Drives (OneDrive, GDrive, etc.) are vulnerable, while they’re mostly secure… it’s online and can be attacked to gain access. Use these drives for convenience for MOST of your business and personal documents. However, the highly sensitive ones (e.g. an accounting document with lots of sensitive data) should be stored on a thumb drive off of the web and your local computer. This along with other sensitive documents should also be printed, ALWAYS have a paper copy for emergency purposes.
- Before doing business, run the company name add the word ‘scam’ to your web search, and see if you locate any results. Additionally, check the BBB and their reviews. Lastly, always get 3 quotes!
- Before getting too serious in any relationship, check them out! If something doesn’t sit right and your inner gut is speaking… listen! We run Carfax reports before buying a vehicle…. but you’re not going to spend a dime on the potential love of your life? Crazy talk! Be good to you!
I’m going to inform my little brother, that he should visit this weblog
on regular basis to get updates from hottest information.
I am actually grateful to the owner of this site who has shared this impressive piece of writing at this time.
Hi to every body, it’s my first pay a quick visit of this web site; this weblog includes
awesome and truly excellent material in favor of readers.
You’re really just right as a webmaster. The website loading speed is amazing. It sort of feels that you are doing a trick. Also, The contents are masterwork, you have done a fantastic process on this subject!