Thanks for taking the Staying Safe In A Digital World class. I hope you find this outline helpful to you as a reference to the material we covered. I have included videos and links to various things I think you may find helpful. If you have any further questions don't hestiate to contact Mike.

Update Your Software

Frequently when a company puts out software, it's not completely perfect and can have security holes or weaknesses called vulnerabilities. Software vulnerabilities make it easier for your computer to be infected by malware, so cyber criminals frequently try to take advantage of them. Companies often announce vulnerabilities as they are found and quickly work to fix them. You can fix vulnerabilities on your computer by installing software and security patches as soon as the company provides them. Check the company's website for software updates or set your software up to check by itself. It's especially important to keep your computer's defensive software and your Web browser up-to-date in order to keep up with new cyber defense threats.

Keep all of your devices up to date including:

  • Windows
  • Macs
  • iOS Devices (iPhone & iPads)
  • Smartphones
  • Anti-Virus
  • Flash
  • Printers

Here is some info about keeping Windows up to date from Microsoft's website.

Here is a blog post I wrote about keeping iOS devices (iPhones & iPads) up to date.

Here is a small section from the article How to Tell if Adobe Flash Player Update is Valid

How to Verify the Latest Flash Version

If a Flash installer notice pops up and tells you that your software is outdated and to download and install a new version, you can check with Adobe to verify if an update is necessary. Type this web address directly into your browser address bar:

http://www.adobe.com/software/flash/about/

On this page, Adobe lists the latest Flash Player version information for all operating system platforms. The page also displays your current version information, helping you quickly and easily determine if you do in fact need to update your software. Whenever you have doubts about whether your software is up-to-date after receiving a Flash update notice, use these techniques to find out if you need to download new versions of your software.

Where to Get Trusted Adobe Updates

Because malware authors will frequently employ tricky tactics to make malware look like something you should trust, it’s important to get your updates only directly from the vendor that publishes them. You can head over to Adobe’s site for Flash Player updates. The same goes for Adobe Reader updates as well.

Install Anti-Virus

If you are on a PC you want to make sure that you have Anti-Virus installed. I have been to many homes where the person has Anti-Virus installed but they stopped paying for it or turned it off because the software kept bugging them.

I would recommend that you use Microsoft Security Essentials. It is free and is updated on a regular basis. It doesn't slow your computer down as much as other solutions and it doesn't constanly pop up with annoying messages. It may not be the most comprehensive solution on the market but it does do a nice job and you will actually use it. If you have another Anti-Virus installed you will need to uninstall that software first before installing Microsoft Security Essentials.

It is very important to make sure that your Anti-Virus software is conducting routine scans. Sometimes Anti-Virus software is only scheduled to scan at 2am in the morning and if you have a laptop that is closed it may not scan.

Very important to make sure your Anti-Virus software is up to date. MS SE checks daily for any new updates and installs them automatically in the background

Back Up Your Data

Other interesting statistics from the 2012 survey: 43% of computer owners backup less than once a year (or never.)

35% of computer owners have NEVER backed up their computer.

It's not a question of will you lose your data—it's when. Whether it's a catastrophic event, such as an earthquake, fire, flood, or a mad panda that destroys your computer, or the more common virus, hard-drive crash, laptop left in a taxi, or coffee spill, your PC will eventually lose your photos, music, and documents.

On a Mac it's super easy to back up your data. You just purchase an external hard drive, plug it in and Time Machine will ask you if you want to use the hard drive to back up and it will then automatically do the work for you.

On a PC it's a bit harder to do and I assume that is the reason that many people don't backup. Most external hard drives come with some sort of backup software that will allow you to backup on a schedule. I would recommend Genie Timeline Free 2012.

When purchasing an external hard drive I would recommend that you stick with either Seagate or Western Digital.

Backblaze is an option for people who want an easy to use system to backup their computers online.

PASSWORD PROTECT YOUR DEVICE

Especially mobile devices (laptops, cell phones, tablets). This is important if you were to leave your device somewhere and wouldn't want whoever would find it to get access to your account.

It is also very important to have a password on your wireless router at home. If you do not have a password on your wireless router a neighbor or passerby could do illegal things on your connection and you may be held liable.

WIPE YOUR DEVICE

It's really important to completely wipe your device before selling it, recycling it, or discarding it. If you have sensitive information like tax returns on your device and you sell your computer to someone they may gain access to personal info.

HTTPS://

Share the analogy of sending cash in a clear envelope to your brother in a 3rd world country. Pretty good odds that it won't make it to it's destination safely. If you are doing any sort of banking or online shopping and you don't see https:// then you may want to avoid doing anything on that website.

PASSWORDS

Passwords are your first line of defense against people hacking into your accounts. Here are some things to keep in mind when creating a password.

  • Throw out the dictionary
  • Never use the same password twice
  • Choose your security questions carefully
  • Store your passwords somewhere safe
  • Change your passwords regularly

To prevent your password from being hacked with social engineering, brute force or dictionary attack method, you should notice that:

  • Do not use the same password on multiple accounts.
  • The password should contains at least 20 characters, it should consists of both numbers, letters and special symbols.
  • Do not use the names of your families, friends or pets.
  • Do not use postcodes, house numbers, phone numbers, birthdates, ID card numbers, social security numbers, etc.
  • Do not use the most commonly used English words.
  • You should not let your browsers(FireFox, Chrome, Opera, IE, Safari) save your passwords, any password saved in the browser can be revealed with a simple click using a script.
  • Do not login important accounts with a public computer or a machine of other guys.
  • Do not login important accounts with HTTP, because the username and password in the message of a HTTP connection can be captured easily with a network protocol analyzer like Wireshark, which means that the password can be sniffed or hacked with very little effort. You should use HTTPS connections.
  • It's a good habit to change your passwords regularly.
  • You can manage and encrypt your passwords with 1Password or Lastpass.

I wrote a blog post about creating Strong Passwords. You might find it helpful.

ONLINE SHOPPING

Remember when you are checking out that you should make sure that the site says https:// Try sticking to reputable websites like Amazon, Target, Bestbuy, etc. Buying something online from a person or website you have never heard of could be a little risky.

Always use a credit card not a debit card.

"You don't use a debit card online," says Susan Tiffany, director of consumer periodicals for the Credit Union National Association. Since the debit card links directly to a checking account, "you have potential vulnerability there," she says.

Her reasoning: If you have problems with a purchase or the card number gets hijacked, a debit card is "vulnerable because it happens to be linked to an account," says Linda Foley, founder of the Identity Theft Resource Center. She also includes phone orders in this category.

The Federal Reserve's Regulation E  (commonly dubbed Reg E), covers debit card transfers. It sets a consumer's liability for fraudulent purchases at $50, provided they notify the bank within two days of discovering that their card or card number has been stolen.

Most banks have additional voluntary policies that set their own customers' liability with debit cards at $0, says Nessa Feddis, vice president and senior counsel for the American Bankers Association. But the protections don't relieve consumers of hassle: The prospect of trying to get money put back into their bank account, and the problems that a lower-than-expected balance can cause in terms of fees and refused checks or payments, make some online shoppers reach first for credit cards.

Don't store your payment information online when possible. If someone does get ahold of your account username and password and you have a card attached they can start racking up the charges

PUBLIC WIFI

I feel fairly comfortable doing basic web surfing (looking up maps, finding restaurants, reading news, etc). I would not recommend banking or shopping on public Wi-Fi connections.

If you must bank or shop on a public Wi-Fi connection I would suggest using a program on your PC or Mac called Spotflux.

SCAMS

Big concern with email is phishing attacks.

Phishing email messages, websites, and phone calls are designed to steal money or your idenity.

There is a great article on Microsoft's website about phishing attackts. I would highly encourage you to read this article.

Check out my blog post Public Service Announcement - Microsoft Imposter Scam to learn more about a very common scam that has affected multiple people.

Sign Up For Mike's Blog Posts

You will receive approxmiately three emails a week containing the following:

  • Tips on how to use technology (iPads, Macs, Facebook, Google)
  • Interviews with people on the apps they use
  • Public Service Announcements when there is a threat in the world of technology
  • Mike's thoughts on various tech topics

At any point you can unsubscribe if you no longer wish to receive the emails. Approximately 216 people currently receive Mike's blog posts via email.

* indicates required

Powered by MailChimp