Tips and Tricks

Recommendations


Identity Theft

What to do if you're a victim of Identity Theft. Click here to find out


Securing Your Computer to Maintain Your Privacy!

There are many potential risks to your computer. Some are more serious than others. Among these dangers are:

  • Malware stealing your passwords and login information
  • Ransomware that prevents you from using your computer
  • A hacker using your computer to attack others
  • Someone breaking into your system and altering files
  • Someone stealing your computer and accessing your personal information

There's no guarantee that even with the best precautions some of these things won't happen. However, you can take steps to minimize the risks to your computer and your sensitive information. Ultimately, the security of your computer is dependent upon you.

  • Using Firewalls, Anti-virus Programs, and Anti-malware Programs
  • Keep your software up-to-date
  • Use strong passwords

Be Skeptical
Think before you click. Don’t open unexpected email attachments from unknown persons. Just because an email message looks like it came from someone doesn't mean that it actually did. Scammers can "spoof" the return address, making it look like the message came from someone else. If you can, check with the person who supposedly sent the message to make sure it's legitimate before opening any attachments. For more information, visit https://www.us-cert.gov/ncas/tips/ST04-010


Using Wireless Connections (Wi-Fi): the security risks of using Wi-Fi

Wireless networks have spawned a past-time among hobbyists and corporate spies called war-driving. The data voyeur drives around a neighborhood or office district using a laptop and free software to locate unsecured wireless networks in the vicinity, usually within 100 yards of the source.

The laptop captures the data that is transmitted to and from the network's computers and printers. The data could include anything from one's household finances to business secrets.

Home networks should be secured with a minimum of WPA2 (Wi-Fi Protected Access version 2) encryption. Routers purchased in the last six years should include WPA2 security technology.

Security risks of using Wi-Fi hotspots

The number of Wi-Fi hotspot locations has grown dramatically and includes schools, libraries, cafes, airports, and hotels. With a Wi-Fi connection you can be connected to the Internet almost anywhere.

Man-In-The-Middle Attack refers to the act of intercepting the connection between your computer and the wireless router that is providing the connection.

Eavesdropping refers to the act of using sniffer software to steal data that is being transmitted over the network. Looking over the shoulder is the simple act of others peering over your shoulder to see your activities?