Today’s task is to encrypt your device and put a (better) passcode on it. I realize that most of you probably have a passcode on your mobile phone, but many out there don’t. Even if you do I want to make those passcodes better; this is a critical step in smartphone security. Phones are much more easily lost or stolen than your laptop and they carry a wealth of information about you. You should protect the data that is on your phone. Continue reading “3DSC 2.24: Smartphone Security Part II”
Today we will move into securing our mobile devices. At this point your laptop and desktop computers should be reasonably well-protected. Smartphones and tablets have the potential to represent an even greater attack surface is not secured properly. today’s task is to ensure your smartphone OS and all installed apps are updated. Ensuring all software is updated is the single greatest security measure you can take to protect your device from malware. Continue reading “3DSC 2.23: Smartphone Security Part I”
At this point your personal credit should be locked down pretty tightly. With your credit report in hand, you have reasonable certainty that your credit has not been stolen. With a credit freeze initiated, you don’t have to worry about anyone opening new lines of credit in your name. However, these previous techniques do nothing to protect your existing accounts, so it is still important to protect your credit card numbers. Today, you should set yourself up to use private payment methods.
Identity theft is an increasingly common crime. The fallout from an identity theft can be financially ruinous. If you are not already doing so, you should request your free annual credit report(s). Continue reading “3DSC 2.21 – Request Your Free Annual Credit Report”
Identity theft is an incredibly invasive and potentially devastating form of crime. It can cost tens of thousands of dollars, ruin credit, and consume countless hours of time. One of the best tools for preventing identity theft is what is known as a credit freeze (sometimes called a security freeze). Today’s task is to initiate a credit freeze for yourself and all members of your family, including your children. If your children have a social security number they, too are vulnerable to identity theft. Continue reading “3DSC 2.20 – Initiate a Credit Freeze”
Today I am going to ask you to to take a step that will reduce your attack surface online: clean up your digital clutter by identifying and closing unused accounts. Online accounts exist in what I like to call “enemy territory”. The are on hardware that you do not control, owned by companies that make very few promises to you about how they will handle your data, and as public-facing sites, are subject to far greater risk than your home computer. Accounts you no longer use represent nothing but risk. Continue reading “3DSC 2.18: Clean Up Your Digital Clutter”
Giving out your email address can introduce some vulnerabilities. While most of these are privacy concerns, there are some security concerns with this, as well. Your email address is attached to your “real” accounts. This allows advertisers, data-aggregators, and hackers to see linkage between your accounts. Security-wise, your email address is your username for some services. If an attacker tries to hack one of your accounts (your Amazon.com, bank, or
Today’s task is to begin enabling two-factor authentication wherever it is available. This will increase the security of these accounts well beyond what even the very best password could.
Last weekend, I asked you to install password manager. This is a critical step in performing today’s task: today I will challenge you to
change your online account passwords begin changing your online account passwords. Don’t rush in and try to change them all at once – there’s a good chance you will get locked out of something. Instead, change your passwords during your normal logins. Continue reading “3DSC 2.14: Change Online Account Passwords”
This weekend I recorded an interview with Aaron from the In the Rabbit Hole Urban Survival Podcast. Aaron invited me on to talk about the recent Wikileaks “Vault 7” leaks that concern the CIA’s hacking and cyber capabilities.