Bitdefender’s BOX: All-in-one Cybersecurity from one App

Gee, if your home is connected to lots of different devices, doesn’t it make sense that your cybersecurity integrates all your connected devices? Meet the Bitdefender BOX, a network bulletproofing hardware cybersecurity tool for the home that embraces smart home protection focusing on the Internet of Things with remote device management offering next generation privacy protection.

boxBOX description:

  • One complete security solution for connected homes
  • Sets up to a router
  • Is controlled by the user’s mobile device and hence, can be controlled anywhere
  • Everything is protected: not just your computer, but all of your connected devices, like your baby monitor, TV, thermostat, garage door opener and house alarm system. You name it; it’s protected from hackers.
  • BOX works with an annual subscription much like most cyber security “security as a service” technologies.

Features:

  • Easy Setup. Just plug and play.
  • Advanced Threat Protection. In and outside your home network. You’re safe on the go as well!
  • Management and Control. All available in one app, at your fingertips, anywhere you are.

So, protection from hackers means that you can have peace of mind knowing that BOX is warding off attempts at ID theft, fraudulent activities, cyber snooping and other threats.

All you need to do is connect BOX to your router via one of its ethernet ports. Then get the BOX application going. Its user friendly and you just follow its easy instruction: all of a few minutes’ worth. BOX then goes to work to intercept cyber threats at the network level. And all from just one app.

So yes, you need a smartphone (Android or iOS) to take advantage of BOX. If you’ve been on the fence about getting a mobile device, move out of your cave, junk your Pinto, cut your mullet, and get the BOX.

Think of how great it would be to be alerted of network events through this does-it-all application that you can control no matter where you’re located. This means you can control all of your connected devices.

One of BOX’s features is the Private Line. This protects your Internet browsing experience, including making you anonymous. Other features:

  • Protection against hacking attempts including lures to malicious sites.
  • Protection against viruses, malware including downloads, phishing, etc.
  • Protection against anyone wanting to pry open your files and see what’s in them or steal them.
  • Protection occurs even when you’re using public Wi-Fi, such as at a hotel, airport or coffee house!

Who needs BOX?

Everyone who has connected devices at home and uses the Internet. This is like asking, who needs a lock on their home’s door? Anyone who lives in a home.

Think about a home and home security as an example. If you’re going to have a lock, it should be a good lock, right? But the lock is only effective if you actually lock it. You also need to lock up your windows and consider a home security system. These are all “layers of protection. Well, the BOX is multiple layers of protection for protecting your online experience as well as computer files.

BOX is designed for non-techy users, so if you’re one of those people who is “not good with computers,” you’ll still find BOX’s setup and navigation quite friendly. It also helps set up password-protected Wi-Fi network does for you and you can even let guests use a secured Wi-Fi network. This post is brought to you by Bitdefender BOX.

Can the cloud be trusted?

Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe?

4HA cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The cloud is made of millions of servers across the globe and most are owned by private or public corporations. Many of those corporations are diligent about security, and you are likely using the cloud whether you know it or not.

Most customers using cloud services have faith that their information will remain safe. But there are some precautions you need to take. Here are some questions to ask any cloud service provider before relying on them to store your business data:

  • How often do you clean out dormant accounts?
  • What type of authentication is used?
  • Who can access and see my data?
  • Where is the data physically kept?
  • What level of encryption is in place?
  • How is the data backed up?
  • What’s in place for physical security?
  • Are private keys shared between others if data encryption is being used?

Keeping your company data safe

Over time, a company surely will accumulate data that seems irrelevant, but you shouldn’t be so quick to dispose of this data, especially if it is sensitive. This might include data such as customer or client information, employee information, product information or even old employee records.

The truth is, you just never know when you may or may not need this information, so it is best that you keep it. Digital data should be backed up in the cloud. If it’s paper, convert it to digital and store it offsite. Here are some things to remember when doing this:

  • All data, even if old or irrelevant, should be backed up.
  • Data retention policies should always include an “expiration date” for when this data is no longer useful to you.
  • Companies that want to delete old data should understand that deleting files and emptying the recycle bin, or reformatting a drive may not enough to get files off of your computer. Hackers may still be able to access this data.

If you actually want to remove all of the data on a disk, literally break or smash it. To truly delete a file, you must physically destroy the hard drive.

Consultant Robert Siciliano is an expert in personal privacy, security and identity theft prevention. Learn more about Carbonite’s cloud and hybrid backup solutions for small and midsize businesses. Disclosures.

My EMV for a Week Challenge is DONE!

This week I worked with Gemalto, as part of Gemalto’s #ChipAwayAtFraud campaign. I was tasked with using my “chip” card when making a bunch of every day purchases like getting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a real-world take on the EMV card experience, which includes the security benefits EMV cards presents. You know EMV; it’s the “chip” credit card that, by now, you should have.

1CHere’s what I learned:

A significant portion of the retailers I frequented didn’t have the chip terminals in place. The ones that did afforded more security and a seamless transaction. At this point in EMVs rollout, the biggest issue, or frustration, I think, is its lack of deployment. For instance, you may have to redo a transaction when a chip card is inserted opposed to swipe and then to be told by the cashier “We don’t accept chip cards yet, please swipe”. The opposite happens too, but less frequently.

Otherwise, chip cards are a no brainer. The “learning curve” for EMV or Chip is learned in the first transaction. Once done, you’ll be able to do it every time, and there are no delays or issues with the transaction.

Overall, we are collectively more secure because of EMV/Chip technology. Over time, there will be 100% adoption of this method as magnetic striped cards are phased out along with magnetic striped “swipe” point of sale terminals. For now, and really, forever, a consumer’s first line of defense is to pay close attention to their card statements.

I always recommend signing up for your bank or card company’s mobile app and receiving alerts and notifications with each transaction. This way you’ll be able to dispute fraudulent charges in real-time, if needed.

Meanwhile, your chip cards are here to stay. Embrace the technology, as its primary purpose is security and convenience. As more and more retailers get up to speed, we will see fewer and fewer news reports of huge credit card data breaches because of EMVs full scale deployment.

How to figure out Crime Statistics in a Town

If you want to get an idea of how safe or crime-ridden a town may be, do some casual observing including at night:2H

  • Are women walking or jogging alone at night?
  • Are people hanging out in the evening having a good time?
  • Are children mysteriously absent on a sunny weekend afternoon?
  • Are there a lot of “for sale” signs among the houses?
  • Do many houses have security signs in their yards?
  • Are there any other tell-tale signs that the town is safe—or seedy? Like many taverns and only one recreation center?

Before moving to a particular town, you should also chat with its residents. Maybe you shouldn’t reveal you’re thinking of moving there, as they may tell you things you want to hear. Pretend you’re a resident and strike up a conversation at the local diner or some place like that, a comment that would lure someone into giving information about the safety—or danger—of the town.

But of course, you can just be more upfront and honest and flat-out ask about the crime rate, safety, etc. Ask if it’s safe for children to walk to and from school by themselves (I don’t mean six-year-olds, of course).

Ask if there’s a neighborhood watch and why it was established. Inquire about safety measures the townsfolk are taking.

Safety also means the condition of roads and sidewalks, not just for motor vehicles but bicyclists and pedestrians. Are roads in good condition? Are intersections well lit? Are stop signs easily visible?

If your move is long-distance and you can’t in-person visit the town:

  • It’s time for some googling. Type in “city of (name of town)” to view its website and various stats such as “crime rate.”
  • Also visit the town’s police department’s website. See if it has a Facebook page. A lot of local buzz is reported on a police department’s Facebook page.
  • Read the town’s major online newspaper to see what’s usually cooking.
  • Find out what the town’s news station is and visit its site.
  • Are the sites laden with crime stories? Over time, have there been a lot of sexual assaults or home robberies?
  • Any continuous complaints about the schools?

For more comprehensive research, visit the following:

  • MyLocalCrime.com
  • FamilyWatchdog.us
  • CrimeReports.com
  • Neighborhoodscout.com
  • City-data.com

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Why Are Cyber Hucksters so successful?

Often, hucksters prey on the consumer’s desperation, which is why it’s no surprise that the No. 1 rip-off (at least between 2011 and 2012)) was bogus products promising weight loss.

6DVICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so successful—even with the most ridiculous sounding bait (Nigerian prince, anyone?).

The bait becomes more attractive when the target is receiving an influx of cyber attention. Sad to say, this trips up a person’s rationale, making them susceptible to the huckster’s plan.

Konnikova is quoted as stating, “Few things throw us off our game as much as so-called cognitive load: how taxed our mental capacities are at any given moment.” She explains that people are vulnerable when the con artist hits them up with their scheme while the victim is distracted with Twitter, texting, etc. In short, it’s cognitive overload.

Konnikova is the author of the book, “The Confidence Game: Why We Fall For It, Every Time.” In the book, she mentions that victims such as the U.S. Navy were too humiliated to prosecute the crooks who conned them. She tells vice.com: “Because admitting it [getting rooked] would mean admitting you’re a sap.”

And in this day of rapidly evolving cyber technology, the huckster’s job is becoming easier, what with all sorts of pathways he can snag a victim, such as dating sites and pop-up ads warning your computer has been infected. But something else is on the crook’s side: the false sense of security that all this techy mumbo jumbo gives the common user—who hence lets down their guard.

And despite all the parodies and mockeries surrounding the so-called Nigerian prince scam (aka 419 scam), it’s still out there in full force and effect. Look how technology has made it swell. And it will continue evolving as long as people want something for nothing. Why else would the Powerball swell to over 1.3 billon. “The basic contours of the story won’t change,” Konnikova tells vice.com.

Another factor is that some people equate online with credibility: “It’s online so it must be legitimate,” is the mindset. According to this mindset, the Loch Ness Monster must really exist, since there are many stories about it online. Despite how irrational this mindset is, scammers know that many people think this way and will design their ploys to look even more legitimate (with creative layouts, slogans, links, etc.).

Though it takes skill to be a successful huckster, they can’t get the job done without the victim being “vulnerablized” by cognitive overload.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Beware of ALL these Scams

Scams targeting older people are probably very under-reported, as seniors don’t want to appear senile. The most vulnerable group is educated men over 55, because, quite frankly, they think they know everything.

9DSweepstakes/Lottery

  • This scam comes in many forms, but the common denominator is that you’re requested to pay a fee or taxes.
  • A legit sweepstakes or prize event never requires payment.

Kids/Grandkids Need Money

  • The scammer relies on the odds that the randomly-called senior has trouble hearing.
  • The scammer says, “This is your favorite grandson!” Invariably, the victim announces the grandson’s name. The scammer takes it from there, convincing the victim to send money.

Home Repair

  • A man in a worker’s uniform, complete with company logo, appears at your door, offering to do some service. They may actually perform it, but will overcharge and/or not complete it.
  • Others are there only to case your home for a future robbery.
  • A legitimate company does not go door to door.

Cyber Help

  • A call from someone claiming to be from Microsoft or some other tech giant, claiming your computer has a virus, is a scam.
  • The scam includes background noise that sounds like a busy call center.
  • This scam is also conducted via e-mail.

Dating

  • Never give money to someone you met through an online dating service.
  • If they sound and look too good to be true, they probably are. A sudden sob story in which they desperately need money is a cue for you to run for the hills.

Uncle Sam

  • Through a phone call or e-mail, you’re notified you owe back taxes or that a refund is owed to you (and you must pay a fee to get it). SCAM!
  • The crook can make the caller ID look like the IRS.
  • The caller may threaten to have you arrested or pose as a sheriff.
  • If you owe or are owed, the IRS will always snail mail you.

Ugly Baby

  • You’re approached by a woman while you push a stroller. She says your baby/grandchild is ugly.
  • While you react to this, her accomplice pick-pockets your purse.
  • Distraction scams can come in many forms.

Investments

  • A call out of the blue from an “investment advisor” is very likely a scam.
  • Seek financial counseling only from a reputable service.

Identity Theft

  • Never give personal information over the phone unless you called that company (and say, want to purchase something).

POA

Never give power of attorney to someone you know only casually or without a lawyer to review the document.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

The Rising Risks of Tax Identity Theft

What are you doing to prevent tax identity theft? Do you even know what steps to take? You’d better, because this crime has tripled since 2010, says the FTC.

A report on foxbusiness.com describes tax identity theft as the act of stealing someone’s personal information, then the crook files a phony tax return in the victim’s name to get a refund. The victim will never see it in their mailbox. And that’s only the beginning of the victim’s problems.

First, your complaint that you didn’t get your check will fall on deaf ears; the IRS will think they already sent you the check. Remember, the thief posed as YOU. You then must:

  • File a form explaining you’re a victim of tax ID theft.
  • Provide proof that the SSN is yours.
  • Your complaint will be reviewed, delaying your refund for months.
  • But the game’s not over. The thief didn’t report the income you made on the side teaching group fitness classes. You’re now being charged by the IRS with a tax deficiency.
  • The snowball just keeps getting bigger: The thief may have enough information on you to open credit cards in your name and suck dry your bank account.

How to Protect Yourself

  • Guard your personal information. Never give out your Social Security number (job application, yes; sweepstakes contest, no; to someone over the phone, no).
  • Memorize your SSN and keep your SSN card in a locked place at home.
  • Buy a shredder and make a habit of shredding all personal and financial documents.
  • If you do your taxes yourself, your computer should have encryption software. Never use public (non-secure) Wi-Fi for any tax related transactions; cyber thieves could “see” your data transmissions.
  • When it’s time to mail in the return…do it inside the post office, never at a public mailbox or even your home mailbox.
  • If you can’t do your taxes, get them done by a reputable outfit. You may want to go with someone who’s done the taxes for years for one of your family members or close friends.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention.

Eight ways to secure your employees’ mobile devices

Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.

2DWhat does it all mean? Companies must take extra precautions to ensure that sensitive data doesn’t get into the wrong hands.

Protecting your data

Fortunately, there are several steps that a business owner can take to protect the information on employees’ mobile devices. Here are some tips:

  1. Make sure all devices are password protected.
  2. Require all employees to use an “erase data” function after a certain number of failed password attempts.
  3. Make sure all devices used for business purposes have a “wipe” ability. This allows you to wipe the information on the phone remotely in case it is stolen.
  4. Make sure your staff installs any security patches or updates that become available. These are often published due to security vulnerabilities.
  5. Employees should only download software from approved application providers with solid reputations.
  6. Antivirus protection must be a requirement for Androids.
  7. Make sure employees are discerning about the websites they visit and the links they click on. Too many clicks may lead them to a malicious site that could put data at risk. This also applies to e-mail and text messages.
  8. Employees should know that Wi-Fi is not secure. This is especially true of public Wi-Fi connections. To help guard their information, consider using a virtual private network service.

It doesn’t take much to secure the info your staff needs to do their jobs. A few simple strategies can provide a protective shield that will keep your company’s information safe, no matter where employees find themselves.

Consultant Robert Siciliano is an expert in personal privacy, security and identity theft prevention. Learn more about Carbonite’s cloud and hybrid backup solutions for small and midsize businesses. Disclosures.

How Motion Detectors Work

Ever wonder how a motion detector works? How can some inanimate object “know” you’re creeping nearby, even if you’re as quiet as a mouse? This amazing technology can be broken down into several types.

3HActive Ultrasonic

  • When an object moves, it can bounce back ultrasonic waves that are directed towards it. An active ultrasonic sensor does just this: sending out ultrasonic waves, that when converging upon the path of a moving object, will be reflected back. If enough reflection is measured, the alarm will sound.
  • The downside is that dogs and cats can hear in this very high frequency range, and if the alarm is on all the time, it can be unpleasant for them.

Passive Ultrasonic

  • This type is peeled for specific sounds, such as glass shattering.
  • The downside is they cost a pretty penny.
  • Another negative is that, due to their high sensitivity level, can send out false alarms.

Passive Infrared

  • Your body emits heat. A dog’s or cat’s body emits heat. That’s because of the warm blood flowing through mammals. This heat is in the infrared range of the light spectrum, invisible to the human eye. The “PIR” type of sensor has a special kind of material that detects this heat emission. Upon detection, the sensor triggers electrical activity. And of course, this is converted to the sound of an alarm.
  • Minimal energy is used by these inexpensive sensors, which have an indefinite lifespan.
  • If an intruder knows where your PIR unit is placed, he might be able to foil it by walking in a straight line smack towards it, as this linear path will not reflect body heat in an easily detectable way.
  • Another minus is that an animal can trigger it.

Tomographic

  • Tomography is when radio waves are emitted. A moving object will upset them.
  • This type of sensor can detect motion in the next room because it can penetrate walls.
  • The downside is that they cost an arm and a leg.

Microwave

  • Microwave pulses are sent out, and any moving object will reflect these.
  • The downside is that the detection might be outside the specified range, setting off a false alarm.
  • Another negative is that this type is a power guzzler. Because of this, it’s commonly set for on and off cycles. And what if a thief knows when these cycles are off?

Duo

  • Two of the aforementioned types are combined. This helps reduce false alarms.
  • Combining two types of sensors, though, can result in missing a real alarm.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Protect your Home when Traveling

When you go traveling, I’m sure you make a point to protect the various things you bring with you—including your laptop, children, even spouse. But what about something you left behind? Your home? Is that being protected too?

1BBefore Leaving

  • Don’t wait till the last minute to arrange kenneling for your pet.
  • Tidy up the exterior of your house including mowing the lawn. Overgrown grass, unmoved rubbish and dormant toys/tools make a house look unoccupied. If you plan on traveling long enough for the grass to get overgrown, arrange with a trusted adult to mow your lawn.
  • Don’t leave your car outside.
  • Put your snail mail and any paper delivery on vacation hold.
  • Give spare keys to a trusted adult. This person should also know the “safe” word for your security system should they be in contact with the monitoring center.
  • Hopefully you have a reliable neighbor who will promptly remove any flyers in your door or on the knob.
  • Here’s something you probably never thought of: A burglar casing your street on trash pickup day may notice the one house whose trash cans aren’t at the curb. Hmmm…maybe those people are away on vacation? So have a neighbor bring your trash cans out on trash day—with trash in them—and then bring them back in.
  • Get rid of food that may spoil while you’re away.
  • Make sure the locks on your windows and doors work.
  • Set up an automatic timed lighting system. Open curtains or shades enough to reveal this to anyone passing by, but not enough for someone to be able to see your valuables through your windows.
  • Put as many valuables as you can in a fireproof, waterproof safe.
  • To prevent water flooding problems, switch off the water to your dishwasher and washing machine.
  • Make sure all appliances and electronic items are unplugged to avoid fires.
  • Lower the thermostat but no less than 60’.
  • Give the garbage disposal one last run, because if there is food waste in there you may come home to a swarm of fruit flies.
  • Make sure your smoke detectors and home security system work.
  • And don’t forget to turn your alarm system on before you embark on your trip.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.