Posts Tagged ‘tech’
Monday, March 28th, 2016
By Dennis Powell, e-Management
Experts say cybersecurity is 90% YOU and only 10% technology. What are you doing to protect yourself from hackers?
Newsflash! There is no privacy on the Internet. I repeat: There is NO privacy on the Internet. Anyone with a web browser can see everything anyone has ever posted online! That’s according to the e‑Management Chief Information Officer (CIO) team (and numerous other cyber experts). Cyber experts say online security is 90% user and 10% technology. I know it sounds like a lot of responsibility. But securing the things stored on your Internet-enabled devices that are important to you (e.g., finances, pictures, intellectual property, work products, family stories) may be easier than you think.
Clearly, you should invest in anti-virus and anti-malware software or services. But that’s just 10% (technology) of the solution. The other 90%, remember, is you. Here are a few simple considerations to help you protect yourself from hackers.
-
Keep work and home separate. We are not talking about a work-life balance here. Keep your work and personal devices separate. Hackers will sometimes target you to steal valuable information about work projects or sensitive customer or client information. Oftentimes, the easiest way to hack a nonprofit, business, or government agency is through the organizations’ staff. Avoid using your smartphone for dual purposes, such as accessing your corporate enterprise network and visiting sites to download apps/games on the same device. Still, it may be best if you talk to your company’s or agency’s information technology (IT) or cybersecurity team about BYOD (Bring-Your-Own-Device) policies and best practices before accessing work products from home or downloading personal-use entertainment on business devices.
-
Be mindful of online phishing and social engineering scams. You’re only human. And that’s what hackers are counting on. They prey on admirable qualities in people, including being helpful and trusting of others. Clever and “social” hackers employ tactics such as having chats with you while claiming to be someone you would normally trust. In reality, their intentions are nefarious—potentially tricking you into giving away clues and facts to obtain sensitive information. Similarly, phishing scam artists carefully craft e-mails and posts on social media sites like Twitter and Facebook. The phishing goal is to get you to click on links that launch malware, which downloads to your device and essentially gives hackers free range to your sensitive information and privacy. To protect yourself, never respond to online requests for personally identifiable information such as your full social security number. In addition, do not complete forms within the body of an e-mail message. And, avoid clicking on the links of sensational posts on social media sites.
-
Avoid tricks that will hold your computer ransom. It’s true. Hackers have an arsenal of malware to infect your computer. Even your cloud files can be destroyed if you’re a victim to ransomware. That’s malware that holds your files hostage and demands payment for you to re-gain access. (As if the anti-virus subscription you paid for was not expensive enough). Hackers have even gone one step further with the encrypted CryptoLocker, which made ransomware headlines last year. How do you get infected? According to a Symantec blog posting, it’s the old enticing e-mail that you just gottah open trick AND then the ransomware infection downloads. The good news is that there is protection for malware/ransomware through security products like Symantec. Also, the e-Management CIO team recommends daily backups of your data to avoid the pain and inconvenience of losing or paying for access to your files.
-
Get training. But before you sign up for a class, accept the fact that you are important enough to be a target for online predators. Next, take advantage of possible free training available to you. Several government agencies such as the Small Business Administration (SBA) offer free training. One best practice is continuous cybersecurity training. At e-Management, for example, we have a commitment to cybersecurity readiness. One of the first things our employees learn in the training is: There is the possibility that someone will deliberately or accidentally attempt to steal, damage, or misuse the data in our computer system(s).
Remember, online security is 90% user and 10% technology. By the way, if your company needs support figuring out where you may be at risk and what you can do to improve your level of readiness, do . We can help.
Knowledge is protection.
You get it. Cybercrime is on the rise and you have to do something to protect yourself from the cyber-crooks. The recently relaunched e-Management blog will focus on technology and cybersecurity, providing useful tips to help you navigate the ever-changing landscape of apps, policy, privacy protection, and consumer tech. So, (1) how do you protect yourself from hackers? (2) Does the organization you work for have clear guidelines around cybersecurity? (3) What are other consumer technology or cyber-focused topics you’d like for the e-Management blog team to tackle?
Tags: CryptoLocker, cybersecurity, Dennis Powell, Hackers, Ola Sage, Phishing, ransomware, social engineering, tech
Posted in Corporate, Information Security, Internet/Intranet, IT Infrastructure, Lifestyle, Social Media | 22 Comments »
How did we ever live without our apps?
Thursday, January 31st, 2013
By Dennis Powell, e-Management
One app store may see more than 400,000 new apps added to its ecosystem this year. There is absolutely no doubt that apps are changing the way we do business, live, and even get hitched.
Today many of us are wondering how we ever lived without apps. What’s an app? It’s quite simple actually. An app is the short form for “software application.” Apps help you do a lot of wonderful things including cataloging recipes, getting driving directions, helping you manage your weight, and even letting you know who’s winning the week’s most important sports matchup. When you hear people referring to an app, they are usually talking about software on smart phones (e.g., Android, Blackberry, iPhone, Windows phone), mobile devices, tablets, or Internet media devices (e.g., bluray players, Wii, Roku, Applet TV, Xbox, smart TVs). Apple and Google have dominated the apps market in the U.S.A. According to mobile analytics leader App Annie, Google’s revenue of apps was up more than 300 percent in 2012 over the previous year. Mostly recently, media reports are predicting that the Apple Store will see more than 400,000 new apps added to its ecosystem this year. Microsoft recently unveiled its reportedly new and improved operating system Windows 8, which introduced the Windows App Store. This week saw big smart phone/mobile app news coming out of Research in Motion (RIM)—the makers of Blackberry.
It’s an App World Out There.
There is absolutely no doubt that apps are changing the way we do business, live, and even get hitched. So, e-Management has decided we would once again provide a short list of useful apps. Keep in mind, many of the following apps are available for free or purchase in the App Store, Google Play, or the Windows App Store. How do you find an app? Your mobile device will have an icon for an app store. For example, Android’s app store is called the “Play Store.” Likewise, the store for iPhones and iPads is simply called the “App Store.” Click on the appropriate app store icon and the rest is intuitive. You can pick categories of apps or you can type in the name of an app to find a specific tool. Once you find an app, read the terms of privacy and click on the download button. It’s that simple!
Facebook Pages Manager App: The Facebook app is the most downloaded mobile software in the U.S.A. But did you know there are other Facebook apps available for free? In May 2012, Facebook launched its Pages Manager for Apple. The company also recently introduced a version for Google-centric Android phones. What’s cool about this app? It’s great if you are the social media or Facebook manager for your agency, organization, or brand. If you manage a Facebook page (different from a user profile), Pages Manager helps you connect with people who are visiting your Facebook site and give you “Insights” into what campaigns are working.
The Flashlight App: Yes. It’s exactly what you think it is. The app turns your mobile device into a flashlight by turning on all available light features. Flashlight also has an S.O.S. feature for times of emergencies.
The ESPN App: With March Madness just around the corner, this app is perfect for diehard basketball and sports fans. The ESPN App gives you access to the latest scores and breaking news. You can also get quick facts on your favorite teams and players. For Windows fans, you can access this app via mobile device, tablet, or desktop!
Urban Dictionary App: Are you just not up on the latest slang you hear from youngsters or on trashy reality TV? Well, here is the app for you! The Urban Dictionary gives you quick and easy access to the largest database of hip talk or slang on the planet—at least that’s what the makers claim. Don’t have a smart phone yet? No worries, you can always visit UrbanDictionary.com to jumpstart your crash course in urban slang.
HuluPlus App: TV lovers are probably going to like this app because it offers streaming video of classic and current shows. Many of the top rated shows like Family Guy and Modern Family are available using this app. Also, you get popular movies as well. The app is free; however, you must subscribe to the Hulu Plus streaming video service. The app is available on many media devices such bluray and Apple TV, as well as mobile devices that run Apple, Android, and Windows 8.
Google Maps App: With nearly 75 million users, Google Maps is the second most popular app according to CommScore. What’s new? In addition to being the preferred mobile app to help find our way through parks, city streets, and highways, Google Maps has added more functionality to help you navigate shopping malls, popular buildings, and airports. Even Apple is on the Google Maps bandwagon following its failed entry into the maps apps world.
Swype App: Many Samsung Android-based mobile users already take advantage of the Swype app. Users can create words quickly without traditional finger/thumb typing on their smart phones by simply swiping over letters with a finger or stylus. The app is available on mobiles phones, tablets, game consoles, Internet TVs and more. (Note: New version is not yet available for iPhones).
Skype App: If you want to stay in touch with your friends and family wherever they may be, then the Skype App might be right for you. With Skype, you can chat via instant messaging, video conference, or make phones to other Skype users for free; which can help you save tons of money when you are traveling or connecting to loved ones who live abroad! If you are concerned about the battery life of your mobile device, fear not! Unlike many apps, Skype won’t drain your battery.
WebMD App: One of the most recognizable online resources of health and wellness naturally has its own app. In addition to being a tool that can be great to have in emergencies situations, the WebMD app allows you to provide your symptoms to help you make an informed determination of illness in the absence of a doctor.
IMO Instant Messenger App: It’s free! It’s available through multiple platforms including Apple, Android, and BlackBerry. If you are really into sending and receiving instant messages, this is the tool for you. The app allows you to talk across imo, Skype, Google Talk, AIM, Jabbar, Facebook, and many other messaging networks. It’s THE one-stop instant messaging. How do you like them APP-les? *SMILES*
Yes, I know. I missed a lot.
So, here’s your chance to add to your list of must-have apps. What’s your favorite app? What are the apps you just cannot live without?
Tags: Android, app, , Blackberry, Dennis Powell, , , IMO, iPad, iPhone, mobile, Ola Sage, RIM, Skype, Swype, tablet, tech, Windows 8
Posted in Entertainment, Gadgets, Internet/Intranet, Lifestyle, Social Media, Uncategorized | 22 Comments »
iPhone, BlackBerry, and Android. Oh My!
Tuesday, July 13th, 2010
By Dennis Powell, e-Management
Before I purchased my Android smartphone, I could live definitely without smartphones. Today, not sure so much. What would I do without my movie show time app, my GoogleMap app, GPS, YouTube, Gmail, touch screen…and you know I could go on; but, I will spare you my app-obsession.
What would happen to your personal data if you lost your mobile phone?
Whether you like it or not, smartphones are everywhere. The fascination with these convenient devices isn’t limited to my fixation. Remember the long lines for the release of the iPhone 4? Not surprising if you consider CommScore’s most recent estimates that more than 234 million Americans (ages 13 and older) are mobile subscribers. Among that number, more than 42.7 million people own smartphones.
Meet the Jetsons Smartphones such as the iPhone, Android, Palm, or BlackBerry offer 21st Century convenience reminiscent of the classic TV show, The Jetsons. (Personally, I have never seen this show since I just celebrated my 21st birthday again for the 20th time. ) But seriously, as a kid growing up, I never thought I would be able to use a futuristic device to get or store phone numbers, birthdays, or find my way to the closest dry cleaner or novelty shop in a city I have never visited. And yet, here we are—a future not much different from the videophones of The Jetsons.
Technology is great. Right? And, no one doubts if smartphones are good for us. But, if used improperly, they can easily become liabilities. Here are a few security tips that should keep you and your organizations safe from smartphone predators.
Don’t Lose It
A few months ago, I lost my mobile phone and I totally lost my mind. I panicked because so much of my life was housed in the phone. Lucky for me it was in the seat of my best friend’s SUV. Plus, I didn’t have sensitive data connecting me to work or home. Personally, I avoid having my social security number, credit card digits, notes regarding passwords, or financial data on my mobile device. Along with those best practices, be sure to back up data on your home computer, authorized and approved work computer, or in the cloud (online data storage services)—just in case you’re “unlucky” like me when it comes to mobiles devices. (Click here to read a link to Gizmodo that provides easy ways to back up your smartphone).
Keep in Mind Passwords Are Your BFF So let’s say you are “unlucky” and lose your phone. What then? Well, you may be better protected if you have a password in place that allows access to your device’s information. Seriously, passwords are your best friends forever (BFF). Some smartphones use alphanumeric codes to grant access to users. Others, such as touch screen devices, may require patterns to unlock smartphones. Be sure to have a strong password or code to gain access to your phone. For alphanumeric best practices, check out Doug Pitcher’s blog posting that addresses creating strong passwords.
There’s a Scam for That!
All of the security issues you have with your laptop and/or desktop are relevant when it comes to your BFF…oops, I mean your smartphone. And while there are fun commercials claiming that “there’s an app for that,” buyer beware. If you plan to download apps, be sure to use the same caution you would with your personal computers. Specifically, avoid unfamiliar third party apps—especially the free ones from anonymous developers. These rogue apps could be spyware or malware that have the power to steal valuable personal information or even hack into your work network. Similarly, avoid clicking links included in text messages to unknown sites, or coming from strange sources. The Internet is loaded with con artists trying to take over your identity or steal your organization’s or company’s intellectual property, secrets, or workers. And yes, there truly is a scam app for that!
Have Your Smartphone Validated by Your Office Security/IT Team
Even company and government agencies are trying to figure out how to secure their sensitive data with smartphones, which are essentially minicomputers connected to IP networks. To reduce the risk of compromising your work network, be sure to have your smartphone approved by your organization if you plan to access its network. At the very least, you should use secure connections (e.g., VPN) to access company resources. Ask your security/IT team about using encryption technology to safeguard sensitive, confidential, or proprietary data.
Don’t Even Think About Jailbreaking Some iPhone users aren’t happy with their exclusive mobile carrier. (True story.) So, they “jailbreak” or hack their own phones in order to take advantage of another mobile network. Unless you are a credentialed cyber security professional, jailbreaking may open your smartphone up to serious security issues. We advise you to find another smartphone that works on your network of choice. Hacking your phone is “not a good look.”
Time for you to chime in… We want to hear from you. Have you ever lost your smartphone? If so, how did it affect you? Are smartphones overpriced toys? What smartphone is the best for security? Why? Do you have any smartphone security tips you would like to share?
Feel free to comment and/or share this blog thread with your social networks (e.g., Twitter, Facebook, Digg, Google, MySpace, LinkedIn).
Tags: Android, app, Blackberry, cloud computing, CommScore, cybersecurity, , gadget, , iPhone, jailbreaking, malware, mobile, Palm, password, Phishing, scam, security, sensitive data, smartphone, Social networking, spyware, tech, The Jetsons, tips,
Posted in Corporate, Entertainment, Gadgets, Government, Information Security, Internet/Intranet, IT Infrastructure, Lifestyle, Risk Management, Social Media, Uncategorized | 17 Comments »
|
|