Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Protect Your Little Black Book > NetSparsh - Viral Content you Love & Share

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Does she give it back, or does she explore it? If she gave it back, we wouldn't have a movie, now would we? Stacy then proceeds to identify his ex-girlfriends and contact them. Let the games begin.

Could this really happen? Of course it could. Most PDA's contain a plethora of information about a person and their activities, their digital footprints. People store contact information, appointments, meetings and midnight rendezvous'. They store passwords, login ID's and PIN numbers. They have photos of people they know and sometimes in awkward circumstances. It's a lot to have to explain. The courts are only beginning to grapple with how to handle the content in a PDA. One person's little black book can be very incriminating indeed.

For the rest of us, we have nothing as exotic; however, we are all in danger of exposure and threat. Identify theft has become one of the largest white-collar crimes. There is enough information in the average PDA for someone to take over your life. So, what's the solution? Give up your PDA? No. You face the same problem with the typical day planner. It has all of the same information, it's just not as accessible. In fact, a PDA has certain advantages over a planner. You can password protect some of the data. You can even encrypt data. Most importantly, you have a backup. The data is safely stored on your computer and archived on external media if you have taken the proper steps.

That duplication of data also means an identity thief has more ways to get to it. So, what can you do? Well, the first concern is to make sure that you backup your data. Synchronize your PDA at least daily. I synchronize my Treo 600 2-3 times each day, usually when I arrive at my office or leave it. Backing up your data means that you should be creating a copy on tape, CD, zip disk, flash ROM or other external media and storing it offsite. If you are not, you are asking for trouble and your business is at risk. If your PDA is ever stolen, you will need to restore that data on a new PDA.

Next, you need to minimize the amount of data someone can actually access. Let's face it, if a hacker really wants to get your data, they will succeed. However, not every criminal is a super hacker. Sometimes you just want to keep your information from prying eyes. Just because you labeled something as private in your PDA doesn't mean someone else can't read it. It depends on what application you synchronize with. If you sync with Outlook, records that are private on your PDA may be public in Outlook.

The best way to protect passwords and PIN numbers is to store them in a password application that encrypts the data. The best applications have both a PDA application and a desktop application that allows access to the information from either system. The trouble is converting that data from whatever format it's in currently. I've struggled with this one myself. There is no easy method I've found so far. Just set aside time to copy and paste the data into the password application. It might take a few hours to get that information into a secure application.

If you're worried about someone viewing your schedule, the best approach is to archive your past history periodically. Outlook has settings that allow you to specify to how often calendar events will be archived. This will wipe the history from your PDA also. Archives are usually stored in an external file that can be accessed later.

If you have incriminating photos, delete them. If you want a copy, save it on external media like tape, CD and flash ROM. For contacts, you can archive them or simply move the record to an external file. Outlook allows you to create a .pst file that you can use to save email, calendar, address, tasks, or other information. Once you move a record, it will be removed from your PDA.

And, don't forget to delete the cookies and memory cache on your PDA's web browser. Remember that website you checked out last week? Is that something you want everyone else to know about? I don't think so.

Don't forget physical security; keep an eye on your PDA. It's possible to take steps to protect your data and remove your digital footprints. Protect your little black book and it will protect you.

Rick Cooper, The PDA Pro, is the PDA Coach for productivity anytime, anywhere. He is a national speaker on business productivity and sales. Rick is President of StratAchieve, a company specializing in coaching services to improve productivity and increase revenues. For more information, visit his website at www.thepdapro.com or call (800) 677-6708.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Snopes.com

US Hires Security Firm Linked to KGB to Guard Embassies in Russia
Snopes.com
The $2.8 million, no-bid contract was awarded to Elite Security Holding Company after President Vladimir Putin ordered the expulsion of hundreds of U.S. diplomatic and technical personnel from Russia in retaliation for U.S. sanctions, the Russian daily ...


Forbes

How This Millennial Went From A High School Dropout To Cyber Security Expert
Forbes
Manan Shah, the 24-year-old founder of cyber security firm Avalance Global Solutions, is one of the top cyber security experts, but his path to the top was far from traditional. A high school dropout and former hacker, Shah had to overcome run-ins with ...


Mashable

Get a smart security camera that will alert you if something's wrong
Mashable
The EPEX WiFi Camera is the perfect home security solution for the person who never thought they could afford home security. Whether you're backpacking across Europe for weeks at a time or just sitting at work and wondering if you remembered to lock ...


Fox News

5 security mistakes you're probably making | Fox News
Fox News
File photo: An illustration picture shows a woman looking at the Facebook website on a computer in Munich February 2, 2012. (REUTERS/Michael Dalder).

and more »

The Hill (blog)

Individual attempts to jump security barrier near White House
The Hill (blog)
The Secret Service said Sunday that an individual tried to jump a bike rack security barrier along the White House lawn before being quickly detained. "An individual attempted to jump the bike rack security barrier along the @WhiteHouse North Fence Line.
Police: Va. man arrested after trying to jump White House security barrierWJLA

all 16 news articles »

PBS NewsHour

Turkey bans all LGBTI events in Ankara, citing security
PBS NewsHour
The Ankara governor's office announced Sunday that the ban was imposed to protect “public security.” It said the events may cause animosity between different groups and endanger “health and morality” as well as the rights and freedoms of others.
Turkey Bans LGBT Activism In Capital City Ankara, Citing 'Public Security' And 'Sensitivities'Newsweek
Turkey bans all LGBT events in capital to 'protect public security'The Independent

all 59 news articles »

WJXT News4JAX

Downtown church starts 'new normal' with armed security
WJXT News4JAX
JACKSONVILLE, Fla. - In the wake of the recent mass shooting in Sutherland, Texas, where a gunman opened fire and 26 people were killed, local churches have been reassessing their security protocols. The Bethel Church in Downtown is one of several in ...


ZDNet

Singapore CIOs believe machine learning can improve speed, security ops
ZDNet
Just 32 percent of organisations in Singapore currently tap machine learning, although 52 percent believe such tools' ability to make complex decisions is imperative to the success of their business. A further 87 percent said greater automation brought ...


Sun Sentinel

Florida may counter 'growing threat' to election security
Sun Sentinel
Sarah Revell, a spokeswoman for Secretary of State Ken Detzner, said in September the U.S. Department of Homeland Security told the state that Florida was unsuccessfully targeted by hackers last year. Ahead of the 2016 elections, the FBI held a phone ...

and more »

The Hill (blog)

Eric Trump: My father is 'not playing' on national security
The Hill (blog)
President Trump's son Eric Trump said in an interview Sunday that his father should be taken seriously when it comes to protecting the United States. Speaking to Fox News' “Sunday Morning Futures” about the president's recent five-nation tour of Asia ...
Eric Trump Says Dad 'Isn't Playing Games' On National Security, Blasts Russia Probe As 'Sham'Newsweek

all 5 news articles »
Google News

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More