• March 18, 2016

The Layman-terms guide to online security and staying secure:

 

The world isn’t what it used to be, but what’s a person to do about it…you can’t stop using a computer or phone?  There are ways to keep yourself safe and secure, without having to get a degree to understand it all.  Technology changes often, so keeping up with the newest security features isn’t easy, but the latter option is…NOT AN OPTION.   STAY AHEAD FOR FALL BEHIND!!!

Today…the news is a buzz about Apple vs. U.S. Government and what really are the expectations on a private company and the U.S. government.  There’s that word again, “expectations”…and rather than having the void and uncertainty “expectations” brings, new laws beckon to rewrite the two hundred+ year-old laws governing this topic.  It’s time the government dust off their books and realize we are in the twenty-first century making legal decisions with laws created before computers, phones and the Internet. Changing the laws to reflect the digital world we live in today stops future issues like this from happening.  However, how do we handle it now and what should you be looking for when keeping your personal information secure?

 

Top 25-Ways to protect yourself online:

 

  • A strong virus protection software. Do your research first at downloads.com
  • A strong firewall (software or hardware).

Firewall Image

 

 

 

 

 

  • Pick a strong password. Never a real word, include caps, lowercase, numbers, and a symbol.
  • Only surf secure sites (Banking, Credit Accounts, Shopping, etc.) while on a secure network.
  • Never use your ATM card at gas pumps. Criminals break the locks placing key loggers within.
  • Never use your ATM card for online purchases. Use a credit card with online fraud protection.
  • Never use your ATM card overseas, use a credit card with fraud protection.
  • If shopping online, make sure the site is credit card PCI compliant…if not move on.
  • Use 256-bit Encryption or higher.

256 bit encryption

 

 

 

  • Do not work on confidential information when visiting Starbucks or alike. Hide your screen!
  • If you received an email with a link within, you’re best to copy the link and paste it into a web browser. The clicking of the link could activate (.exe) a virus software to launch.
  • Never post on social media that you are away on vacation.
  • Post vacation pictures when you get home.
  • Stop checking in on Facebook or other social media sites, just because you can doesn’t mean you should.
  • Stop Geo tagging pictures, there is no reason to show a person exactly where you are or have been.

Stop Geo Tagging Photos

 

 

 

 

 

 

  • Control your friends list on social media, many criminals, and perverts alike are cat-fishing and attempting to friend you for the wrong reasons.

biometrics image

 

 

 

 

 

  • Email addresses can be spoofed (altering a sender’s email address). If an email comes from a friend or relative but appears ‘off’ and not right…there is a good chance its spam and a virus.
  • Children’s Internet Safety: There are many products to protect what your child can’t surf, please be proactive and protect your children!  Research products at, downloads.com
  • If necessary, hide your email address and/or IP address so no one knows who you are and where you are located. There is free software out there and websites to assist with sending anonymous email and even browsers that will hide your IP address, e.g. Tor, Onion…etc.
  • Never send a username & password in the same email. Send it within two emails, separately.
  • If you use an ‘Online System’, make sure it deactivates an account if a user/pass are entered incorrectly multiple times. This protects against brute-force hacking attacks guessing passwords.

Brute Force Image

 

 

 

 

  • If using an ‘Online System’, make sure it ‘Times-Out’ after a delay in usage.

TIme Out Session Image

 

 

 

 

 

  • If you use a CRM, CMS, ERP, or some other type of  ‘Online System’, ask questions about the Servers and Hosting provider.  Is data encrypted on servers and during transit?  How is the data structure, how is data written?   Is the site credit card PCI compliant, and don’t forget to obtain the full SOC Reports (Service Organization Control)  (1, 2, & 3) or SSAE 16 report.  Have the company provide results of any internal or external vulnerability assessments or penetration testing.  What is their up-time and estimated down-time?  Have them provide a disaster recovery/business continuity plan and lastly…check it against an online security system like, https://www.ssllabs.com/ssltest.   Make sure the grade is an A or B.
  • Before doing business, run the company name adding the word ‘scam’ to a Google search.

 

© 2018, Darren L. Epstein, PI.   ALL RIGHTS RESERVED, NOT TO BE COPIED

Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to [Darren L. Epstein] and [Counter-Intelligence.com] with appropriate and specific direction to the original content.

16 thoughts on “The Layman-terms guide to online security”

  1. Hollie
    March 22, 2016 at 7:28 pm

    Knocked my socks off with the knowledge!

  2. Rubi
    June 3, 2016 at 2:18 am

    I truly appreciate this article post. Cool.

  3. Frank
    June 4, 2016 at 2:41 pm

    “Whats up, I log on to your blog often. Your personal humoristic styling is breathtaking, continue doing what you’re doing!”

  4. Rhodes
    June 9, 2016 at 7:57 pm

    I am so grateful for your blog. Want more.

  5. Bornstein
    June 12, 2016 at 9:14 am

    Very neat blog.Thanks Again. Great.

  6. MACKENZIE
    June 12, 2016 at 10:22 am

    Fantastic article.Really thank you! Keep writing.

  7. Montierth
    June 17, 2016 at 7:26 am

    Really appreciate you sharing this post. Really Cool.

  8. Hinshaw
    June 23, 2016 at 5:00 pm

    Im thankful for the blog.Really thank you! Keep writing.

  9. Derek Pearce
    June 24, 2016 at 4:48 pm

    Appreciate you sharing, great blog post.Really looking forward to read more. Cool.

  10. Zinni
    June 26, 2016 at 10:05 am

    This is one awesome blog post. Great.

  11. Wordpress
    July 11, 2016 at 6:32 pm

    “excellent post, very informative. I wonder why the other specialists of this sector don’t notice this. You must continue your writing. I’m confident, you’ve a great readers’ base already!”

  12. ReneTFerrone
    September 25, 2016 at 5:53 pm

    Oh my goodness! Incredible article dude! Thanks a lot, However I am just going through
    troubles with your RSS. I don’t know why I can’t join it.
    Will there be anybody else having identical RSS issues? Anybody that knows the remedy are you
    able to kindly respond? Thanks!!

    1. Darren
      July 18, 2018 at 10:37 pm

      No known issues w/ RSS, contact our offices and I’ll do my best to assist you. Or just pop-in now and then… you can also share your email and I’ll add it to our mailing list. Best to you!!

  13. LucyLoo
    November 17, 2016 at 7:19 pm

    I appreciate you sharing this blog article.Really thank you! Will read on…

  14. Simon Scott
    March 5, 2017 at 4:09 am

    I happen to be commenting to let you be aware of of the incredible discovery my child encountered going through your webblog. She picked up numerous details, which include what it is like to have a wonderful helping spirit to let others effortlessly fully understand various extremely tough issues. You really did more than our expectations. Thank you for delivering those informative, trustworthy, educational and even cool guidance on the topic to Tanya.

  15. David
    September 25, 2017 at 6:34 pm

    Really informative blog article.Really thank you! Great.

Leave a Reply

Your email address will not be published. Required fields are marked *