What access permissions have you given others to your phone and the data contained within it?
We are at a time when your phone is your kingdom, and you would be wise to erect a mote to keep out marauders.
With the summer travel season in full swing and the current state of our world it is wise to be prepared for problems,which brings us to a tip I read some time ago and have had in practice since then with minor adjustments for changing technology and environments.
The past few weeks brought news of a rush of new hacks and old ones brought back to light. We saw LinkedIn, Tumbler, and Twitter with breaches in the tens of millions of accounts. We saw major celebrities get hacked from Mark Zuckerberg and Lana Del Rey, Katy Perry, the NFL, and DeRay Mckesson.
With these unpredictable acts of nature we have seen of late I thought I would talk about how we can prepare our digital lives for some of the more unforeseeable events.
It is your right to have a browser that does not run Flash at all (Firefox), and to not be indexed and branded.
As we mature and have dependents that count on us, we need to consider how they depend on us and how we can plan for our future and theirs.
Flash has outlived its safe and useful existence and should be used with extreme caution.
With the amount of information we store on our computers and phones, and the cost of storage, how can we not consider having a good backup system in place.
When you think about all of the accounts we have online and the number of information leaks, think about how often you reuse the same username or worse, password.
Encryption; its use, weaknesses, and the stigma that gets attached by those that do not understand its intrinsic value is forefront in the news and my mind.
This week I want you to think about how vulnerable you are when you are in public. When you go to a restaurant, bar, or even a class, think about what others are looking at and noticing.
Everything you share should be planned out and not be compromising to your privacy and security if you can help it.
All business be they physical or virtual want to know who their customers are and how they shop. This is evident by the abundance of membership cards, signup sheets, and surveys conducted after a purchase.
The number of hands that touch and see your luggage is immense and letting them know you are out of town and where you live is inviting trouble.
While the process of encrypting information is nothing new, encryption technologies are a hot topic in IT recently — with good reason. This article hopes to explain the various types of encryption as used regularly by IT pros.