TOTALLY GEEKED!

Members Login
Username 
 
Password 
    Remember Me  
Post Info TOPIC: Protecting Online Data


Guru

Status: Offline
Posts: 9186
Date:
Protecting Online Data
Permalink  
 


 

Protecting Online Data

Dear Ed,

Whether you do your banking, shopping, or just check your email, online personal privacy is a growing issue as hackers become more and more sophisticated. Take these steps to keep your information secure: Protect Online Data

Secure your passwords: You’ve heard it over and over, but a strong password is your first defense against scammers. Do use complex and creative passwords: experts recommend thinking of a special phrase and using the first letter of each word as your password, or substitute numbers for some words or letters. Do not use the same password for all your accounts; do not write your passwords down or share them with others; and change your passwords frequently.

Use two-factor authentication: Lock down your Facebook, Google, Apple ID, Microsoft, Twitter and other accounts with two-factor authentication. That means that when you log in, you’ll also need to enter a special code that the site texts to your phone. Some services require it each time you log in, others just when you’re using a new device or web browser.

Keep your browser secure: To guard your online transactions, use encryption software that scrambles information you send over the internet. A “lock” icon on the status bar of your internet browser means your information will be safe when it’s transmitted. Look for the lock before you send personal or financial information online.

Keep your device clean: Install anti-virus software, anti-spyware software, and a firewall. Set your preference to update these protections often. Protect against intrusions and infections that can compromise your computer files or passwords by installing security patches for your operating system and other software programs.

Lock down your hardware: Set up your PC/laptop to require a password when it wakes from sleep or boots up. Same thing with your mobile devices; not only should you use a passcode to access them every time you use them, but also install an app that will locate your phone or tablet if it’s lost or stolen.

Treat your phone like a computer: Smartphones have access to your email, address book and many other sensitive pieces of data yet rarely include any privacy controls. And always read the fine print before installing any new apps: security software on your phone can’t protect you if you ignore security warnings and install the app anyway.

Avoid phishing emails: Make sure you know who is getting your personal or financial information online. Don’t open files, click on links, or download programs sent by strangers via email. Opening a file from someone you don’t know could expose your system to a computer virus or spyware that captures your passwords or other information. If a company that claims to have an account with you sends email asking for personal information, don’t click on links in the email. Instead, type the company name into your web browser, go to their site, and contact them through customer service to ask whether the company really sent a request.

Watch what and how you share online: If you post too much about yourself, an identity thief can find information about your life, use it to answer ‘challenge’ questions on your accounts, and get access to your money and personal information. Never post personal details like your address or phone number on a social networking website, or anywhere else online. Set your social media profiles to the strictest privacy settings available, and share information only with people you know and trust.

Be careful of free or open Wi-Fi connections: Any time you connect to the internet using unprotected Wi-Fi, anyone on that network can see your data. Before you send personal information over your laptop or smartphone on a public wireless network in a coffee shop, library, airport, hotel, or other public place, see if your information will be protected. If you use an encrypted website, it protects only the information you send to and from that site. If you use a secure wireless network, all the information you send on that network is protected.

Know privacy policies: Privacy policies tell you how the site maintains accuracy, access, security, and control of the personal information it collects; how it uses the information, and whether it provides information to third parties. If you don’t see or understand a site’s privacy policy, consider doing business elsewhere.

Dispose of personal information: Before you dispose of a computer or mobile device, get rid of all the personal information it stores. For your computer, use a “wipe” program to overwrite the entire hard drive; and for a mobile device, check your owner’s manual on how to delete information permanently, and how to save or transfer information to a new device.

Log-off and lock up: Always log-off of your device when you’re finished and don’t depend on an automatic login feature that saves your user name and password; so, if your laptop is stolen, it will be harder for the scammer to get your online information. And although this may be basic, lock up your computer/laptop when it isn’t in use and keep it out of prying eyes.

 


Sincerely,

Kristin Keckeisen
Fraud Watch Network

P.S. Spotted a scam?  Tell us about it.  Our scam-tracking map gives you information about the latest scams targeting people in your state.  You’ll also find first-hand accounts from scam-spotters who are sharing their experiences so you know how to protect yourself and your family.

 



__________________

The Principle of Least Interest: He who cares least about a relationship, controls it.

Always misinterpret when you can.

Page 1 of 1  sorted by
Quick Reply

Please log in to post quick replies.



Create your own FREE Forum
Report Abuse
Powered by ActiveBoard