iTecs IT Outsourcing and Support Blog
When you take an out of town trip, there are plenty of ways of getting yourself into trouble. Using public WIFI, browsing unsecured websites and posting lots of geotagged photos or location updates on social media. Here are some tips to keep your computer, online account, and even your home safe while you're on the road.
Using that free WIFI provided by a local coffee shop can be a huge risk if you don't adequately protect yourself after you've connected. You never know what type of security measures, if any, that free WIFI network is providing. It's better to assume that there isn't anything stopping the guy sitting next to you from "sniffing," which means collecting, the network traffic generated by your computer. When you browse the Internet, log into your email account or bank website, the traffic to and from your computer can be easily captured, giving the "sniffer" your usernames and passwords.
Now imagine you're in another state or country and someone malicious has your email account. They can email your friends, relatives, and coworkers, pretending to be you, and beg for money or sensitive information like your social security number. You get the idea, and it never ends well when your email, bank or other online resources become compromised.
The best way is to establish a virtual private network (VPN) as soon as you make that WIFI connection. When your computer creates a VPN, all the traffic to and from your computer is encrypted, so that even if there is a sniffer, the traffic he's capturing is unreadable. To add to this layer of security, ensure that the websites you log into have the green padlock which means they've enabled HTTPS Secure Socket Layer (SSL).
There are plenty of virtual private network services out there, and you can also check with your company to see if they have something in place you can use.
Post a lot of geotagged photos or share location updates on social media. Criminals love to monitor social media sites, and when they know someone is out of town, they can take advantage of the situation in a couple of ways. First, they could reach out to your family or friends and claim you are their hostage. This situation occurs if they know you're on a camping trip or somewhere you can't communicate with the outside world. They'll demand a small amount of money that can be easily wired and use fear tactics to keep them on the phone. Secondly, when your out of town and the criminals have a right idea your house/apartment is left unprotected, they can more confidently break into your home to steal all your belongings.
To ensure this doesn't happen to you the next time you take that two week trip to Europe or go skiing in the Alps, delay posting your pictures until you're on your way back home from the airport.
Leave your devices unattended. Leaving your cell phone or laptop unattended in a public place is a huge no-no. Their easily stolen, even if you turned your back and walked away a few feet. While most of us have security password, pattern swipes, pins or other means of locking the device, there are ways around them.
The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.Read More
There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.Read More
The first and most crucial thing any company can do to reduce the likelihood of a cyberattack is to train their employees about cyberthreats and how to recognize them. This may seem obvious and intuitive, but the fact of the matter is that human error accounts for a large percentage of successful cyberattacks.Read More