7 Steps You Can Take to Amp Up Your Cyber Security

October 31st, 2013

malware ahead

Websites can have malware or other malicious code built into their programming language. Fortunately, most web browsers have some degree of built-in security measures to help prevent users from visiting such sites. Browser security can only go so far, however, and users must remain proactive and ever-diligent in protecting themselves against theft and fraud.

Since the olden days (when state-of-the-art computers occupied entire rooms), computer technology has been in a perpetual state of advancement. Today, we’ve shrunken those room-sized behemoths into pocket-sized, mega-powerful machines that are 1000s of times more efficient than anything envisioned in the early days of computing. More powerful, however, doesn’t automatically equate to more secure; a fact I think many users forget when using their devices. Part of the problem, it seems to me, is that hackers and cybercriminals benefit from advances in computer technology, just like the rest of us do. Improved computing power means more-sophisticated hardware and software for thieves to use in stealing your personal information and your identity. Moreover, hackers and cybercriminals are constantly improving their skills and knowhow, continually adjusting and altering their techniques, and constantly devising new schemes to dupe users into divulging private information. Thus, users must remain ever-diligent, ever-aware in working to prevent data and identity theft.

Read More

The need for users of mobile devices to protect their sensitive data is critical

October 16th, 2013

Sales of mobile computing devices, including smartphones, tablets, and various other mobile phones have absolutely exploded in recent years, even as PC sales have spiraled into free fall. Chances are good that you’re reading this post on such a device. Mobile computing devices are replacing PCs at a rapid clip in almost every area of life. Mobile devices have long been popular in business settings, but the release of the smartphone in 2007 has gradually made them almost as common – if not more so – in certain business arenas as PCs. Certainly, consumer adaptation of mobile devices has reached epic proportions. From games to online banking; from social networking to homework; from TV and movies to weight loss, dieting and web surfing, everybody’s using these devices for every conceivable purpose. I’ve outlined below some of the reasons you should be cautious when using mobile devices, and some ways to protect your private data from being stolen.

Read More