Saturday, February 27, 2016

Install Mobile Apps

The last post summarized concerns about downloading apps.  Now, what can you do to reduce the possibility of downloading an app that has malicious intent.

  • Download applications from trusted sources such as Google Play Store or Apple Store.
  • For Android users, leave the checkmark unchecked for "allow installation of apps from unknown sources" in the security settings.
  • Read the ratings and reviews.  People love voicing their opinions and frustrations, especially when money is involved.
  • Refrain from "rooting" or "jailbreaking" your mobile device, which grants administrative access and allows the installation of anything.

Tuesday, February 23, 2016

More Cyber

I expect you feel I am doing overkill with information on cybersecurity, but believe me, we are seeing lots of cyber attacks on clients.

Thousands of applications are downloaded each day for entertainment or to make our lives easier, but along with the fun and convenience offered by mobile devices comes increased risk for malware.  Money isn't just made from popular apps like Angry Birds.  It is also lucrative to create malware disquised as legitimate applications to mislead users into allowing additional permissions that give access to accounts, storage, contacts, network communication, system tools, and settings.  Some malicious applications are known to mimic banks, deceiving users into entering their financial information.

Looking ahead, it's only going to get worse as mobile devices become more affordable.  Security software companies have already rolled out malware detection applications because of the amount of malicious software already discovered.

Nest:  What can you do?

Wednesday, February 17, 2016

More on Think Before You Post

I am dedicating a lot of space to cybersecurity issues, but it is one of the most important issues facing all of us today.

So here is more on what you can do to avoid posting information that you would not compromised. 

Employ what you learned during communications about the responsibility of the sender and the perspective of the receiver.  Quick phrases without context, mixed with emotion, and combined with a lack of nonverbal cues are easily misread.  Always think about how you want to be viewed, and don't believe that it doesn't reflect on you away from the keyboard.  If it's posted online, it does!

Online gaffes are played out online all the time, whether by a politician or a celebrity or even among your friends.  Odds are you know someone whose relationship has been affected by something said online.  So always take a moment before pressing "enter" or "send" and exercise a strict rule about how and when you will engage online.  Remember this is ink for the entire world to see, and not only immediately, but likely until the end of time.

Saturday, February 13, 2016

Post, Update

As we said in the last post, what you put out there in cyber space is forever. 

Today's speed of information sharing means that other users can rebroadcast your statements to any number of profiles and services within seconds, effectively creating thousands and thousands of copies.  Beyond rebroadcasting, search engines actively gather content across the Internet and store it on their databases, even storing the pages themselves.  Organizations like Archive.org and the Library of Congress make it their mission to preserve the Internet by copying billions of pages.  So one way another, whatever you post, comment, tweet, or share is immediately captured by something you don't control -- and can't delete!

More later.......