Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Dont be a Dork ? Protect Yourself > NetSparsh - Viral Content you Love & Share

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Submitted for your reading pleasure are some of my tips to protect yourself and your identity.

Gone Phishin'

When I was a wee lass, my Grandpa George would take me to the pond on a warm Saturday afternoon and we'd fish for hours. Unfortunately, this type of Phishing has nothing to do with warm fuzzy memories of my Grandfather.

Phishing (sounds just like fishing) usually arrives in your inbox in the form of a spoofed e-mail message. It sure looks legit, huh? Well, it's not. Phishers blast e-mail messages in the hopes you'll take the bait and click the links, which will redirect you to a fake website. What do they want? Your account numbers, PIN numbers, SSNs -- anything they can use to gain entry to bank and brokerage accounts and other financial information.

Remember, your brokerage, bank, credit union and credit card provider will never ask for this information via e-mail. They will never ask you to login to your account to confirm information.

If you feel you've been phished, do not access the links included in the e-mail. Also, report the phishing to your ISP and the Anti-Phishing Working Group (http://www.antiphishing.org/).

The Paper Trail ? Snatch that Receipt

I bet you're the type to leave the receipt at the gas pump and at the ATM when you make that late night deposit. Smack on the hand and shame on you ? stop doing that! Take ALL receipts when you make a purchase or a deposit, when you return items, etc. When you go to the clothing store, take the receipt out of the bag and place it in your wallet.

Save all receipts until you receive your end-of-month statements (see Two Dollars below). Also, don't throw away your receipts; see my notes on shredding.

It's ? Like ? Magic!

Pet Peeve: Folks who use cheesy passwords to protect their online accounts ? you folks make me crazy! I recently hired a client and I'm managing several e-mail accounts for him. Guess what password he used for ALL of them? You guessed it: magic. I immediately changed the passwords on all of the accounts and then we had a chat.

You should never use a word you can find in a dictionary as your password. You should never use your birthday, the names of your wife or children or dog as passwords. Use a combination of letters and numbers and where possible, add special characters such as a bang (!) to your password. Also, change your passwords frequently, such as once a quarter or every six months.

What's the "s" for, Anyway?

Ever notice certain website changes when you're making online purchases? There's an "s" which appears after HTTP, for starters. This let's you know you're on a secure server. Also, check the status bar on the window you're using to make the purchase. You should see a yellow padlock -- mouse over the lock and you'll see the encryption level for the site.

If you don't see both of these items, do not make the purchase right now and notify the vendor. Go back and make the purchase at a later time.

I Didn't Charge Two Dollars

Every month, without fail, I want to you check your statements from your credit union, bank, brokerage, credit card companies -- any institution from which you receive a paper statement or an online statement. If the bad guys have access to your account information, they may try and slip in a small charge before coming with the big guns. Take a look at each and every line item and verify you've made the purchase. If something is amiss, call that institution immediately.

The Joy of Shredding

I have a special "shred" basket near my desk and shred all of the basket's contents at the end of the work day. My personal receipts, which I no longer need and have reconciled against my online statements, get shredded. All working documents I've printed or proofed, especially for my attorney clients, are blitzed at the end of day, as well. Anything which may personally identify me or my clients gets the treatment.

You have no logical excuse for not owning a shredder. Price? Not an issue, as shredders are incredibly affordable. You don't have a car to get to the office supply store? If you're reading this article that means you've got internet access. Start a new browser window NOW and access your favorite online office supply vendor. You'll have your new shredder in a matter of days and you too can become a Shredder Queen (or King).

We live in a different world from just a generation ago. Be smart, be aware and remember that if something seems too good to be true, it is.

Lori Davis is Director of the Future at Davis Virtual Assistants, a New York-based VA firm. DavisVA offers a wide variety of administrative, creative and technical services to small business owners and entrepreneurs. To learn more about Lori and DavisVA, please visit http://www.davisva.com and http://loridavis.typepad.com/davisva/. You may contact Lori at 917.319.8224 and via e-mail at lori@davisva.com.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

CSO Online

6 essential elements of edge computing security
CSO Online
“If you're responsible for asset management, you need to account for your IT assets across the company, whether these assets come in through IT or end user areas,” says Mike Raggo, CSO at 802Secure, which specializes in IoT security. “If you don't do ...

and more »

Uranium: A More Compelling Case For National Security
Seeking Alpha
The Trump Administration is using national security argument for trade. It has been controversial. The next product that is being considered is uranium. National security arguments may ring truer than autos or steel/aluminum from Canada, EU and Japan.

and more »

TNW

Survey: 45% of security professionals reuse the same password
TNW
There's a saying — “practice what you preach.” If you give advice, make sure it's something you follow personally. Turns out, some security pros aren't doing that. A survey of 306 infosec professionals at London's Infosecurity Conference 2008 from ...


Fox News

Robot security guard patrols San Francisco gas station | Fox News
Fox News
Robots are popping up at corporations, campuses, shopping malls and airports.

and more »

TechRepublic

BetterCloud bolsters G Suite security with rapid risk identification
TechRepublic
On Wednesday, SaaS operations management platform BetterCloud launched a real-time security monitoring and reporting solution for businesses using G Suite. The solution, called Activity-Based Alerts for Google Cloud, allows enterprises to continuously ...

and more »

TechCrunch

Okta nabs ScaleFT to build out 'Zero Trust' security framework
TechCrunch
Okta, the cloud identity management company, announced today it has purchased a startup called ScaleFT to bring the Zero Trust concept to the Okta platform. Terms of the deal were not disclosed. While Zero Trust isn't exactly new to a cloud identity ...

and more »

Haaretz

Prominent Jewish Donor to Israel Questioned by Airport Security Over 'Palestine' Pamphlet
Haaretz
A prominent Jewish-American philanthropist was delayed for security questioning at Ben-Gurion Airport this week after a pro-Palestinian pamphlet was found in his suitcase. The incident involving attorney Meyer Koplow took place on Sunday and has drawn ...


Cloud Security: Lessons Learned from Intrusion Prevention Systems
Dark Reading
I recently had the opportunity to brief an industry analyst on the rapid advancement of artificial intelligence (AI) in solving public cloud security. Both the analyst and I had navigated the inception and commercialization of intrusion prevention ...


WOODTV.com

GRPD launching security camera database - WOODTV.com
WOODTV.com
Michael Wright was wrapping up a long day of work in the early morning hours of June 30 when something caught his attention.
Homeowner and business security camera help solve crimes, GRPD says of new databaseWZZM13.com

all 3 news articles »

Travel+Leisure

This Best-selling Home Security Camera With Over 13K Rave Reviews Is on Sale for Amazon Prime Day
Travel+Leisure
If you thought Prime Day was over, think again. Amazon's biggest sale event of the year doesn't end until Wednesday morning at 2:59 a.m. ET, so you can still stock up on deals if you missed out on Monday (or if you're coming back for seconds).

and more »
Google News

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More