Posts Tagged ' passwords'

We are pleased to present below all posts tagged with ' passwords'. If you still can't find what you are looking for, try using the search box.

PUBLIC WIFI – Are you risking everything by logging on?

Most of us are guilty of it.  You are sitting in a coffee shop, an airport or in the park and you find a moment to open your backpack and pull out your laptop, I-Pad or smart phone. Time to check in at work, (or see what is happening in the lives of your Facebook friends). The Wi-Fi Wave at the top of your device will give you options on which wireless network to choose to interface with. Scroll down and you may find everything from optimumwifi, to wisedragonfly to hiltonguest. Twenty options may appear. The choice you make, may mean the difference between keeping your personal and private information safe, and sharing it with thieves that may rip you off. So, what is the wise choice. 1. Choose the Network with the “Lock” On it. - You are going to have a choice. Many hotspots across the country have no security set. You can simply log on. And that is where the danger lies. If you have an account with a company such as Optimum Online, you can change the settings on your devise to recognize ...

Popular tags: , , , , , , ,

The Internet of Things – Cyber criminals are now exploiting the vulnerabilities of automobiles, commercial airliners and even heart monitors.

When consumers and business think of cyber-security, hacking and breaches, the first thing that generally comes to mind is credit card accounts, bank accounts and health data; any personal information that is stored on large mainframes in extensive databases. But did you know that your automobiles, smart thermostats, bio-chips, heart monitoring implants and other small devices in your everyday life, also have the capability of being hacked? Devices that collect useful data are known as “The Internet of Things”. IoT is a network of physical objects embedded with electronics, software, sensors and connectivity to enable objects to collect and exchange data. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. Experts predicted that the amount of IOT devices in the marketplace will be 50 billion objects by 2020. On September 10th, the F.B.I issued a Public Service Announcement warning to businesses and cons ...

Popular tags: , , , , , , , , , , , , ,

There is at least one individual out there, that is trying to steal your identity ...

Do you remember a time when you could simply tear up a piece of paper and toss it in the trash? You could carry your Social Security card in your wallet? It’s amazing how much the world has changed in the last 20 years, that a person can “Google” your name and zero in on the exact location of your home, complete with Street View images. Your identity is no longer safe. At this moment, there is at least one individual looking to steal your identification and use all of your personal information for their own private use. And almost always, by the time you realize that something is askew … the damage is done. It can take years and thousands of dollars to rectify.  Because it is vitally important to protect all aspects of your identity, below is a list of tips on how to keep it safe:  1. Use a paper shredder. Carefully watch what you throw out. Shred any papers or statements that contain personal facts about you, including your date of birth and any of the following numbe ...

Popular tags: , , , , , , , , , ,