Tips to Stay Digitally Safe on Spring Break

Give me a break! In the next month, students will get the week off for spring break—a much needed reward after months of hard work and, for some, gnarly winter weather. Spring break means free time, family vacations, trips with friends, and timeless memories.

7WBut, spring break can pose some risks to your online reputation and your identity. So whether you are going to party it up in the Caribbean or you are taking the kids to Disney World, here are some tips to keep you digitally safe this spring break.

  1. Don’t bring more technology than you have to. Do you really need to bring your laptop, tablet, and smartphone on your beach vacation? The more devices you bring, the more chances for someone to steal or compromise your device and your personal data.
  2. Backup your data. No matter what devices you decide to bring, make sure you back them up before you leave. You don’t know what will happen on your trip, don’t risk your data.
  3. Share when you get home. It’s tempting to share that family picture with Mickey, but it could alert thieves that you aren’t home. Wait until you return home before you share your vacation pictures online.
  4. Review your privacy settings. Just because you aren’t sharing anything from your spring break on social media, doesn’t mean that your friends aren’t. Check up on your privacy settings so you can manage who sees your content, and as best as possible, what others say about you. That embarrassing video of your belly flop doesn’t need to be seen by everyone.
  5. Be careful when using public Wi-Fi. Don’t log on to bank/credit card sites or shop online when using a public Internet connection. You don’t know who else is on your network.
  6. Install security software on all your devices. Use comprehensive security software likeMcAfee LiveSafe™ service to protect your devices no matter where you are.

Have a great spring break!

Robert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! Disclosures.

15 tips to Protect your Digital Life

How much of “you” is stored inside your smartphone? For some of you, the answer will be “My entire life.” And that’s practically true. For many, all sorts of highly private, sensitive information, including photos, are stored in that little device called a smartphone.

7WBut here is a better question: Did you know that “you” can be hacked into or in some other way stolen? And remotely at that? And some hacking methods can be very sly and sneaky. Even if your device is tethered to your waist every second, you still need to protect it from remote thieves. Here’s how to protect your smartphone.

  1. Customize your mobile so that if some smart-azz at a party snatches it, they won’t be able to figure out how to get your information. Use a custom lock screen and ambiguous icons for nameless applications—the dork-head won’t have a clue. Do you really want to have an icon sitting on your screen labeled “Finances,” “Banking Info” or “Hot Pics”? Remove default apps too. This won’t stop a skilled hacker, but it will stop the typical doofus in his tracks.
  2. Avoid public Wi-Fi such as at airports, hotels and coffee houses unless you are using a VPN from Hotspot Shield.
  3. Disable your GPS to keep your location hidden.
  4. Stay clear of unofficial versions of the popular applications. These are often found on 3rd party sites.
  5. If you use Google maps, disable or don’t enter your home address.
  6. If you’re not using the Internet, get offline.
  7. Keep far from applications that require some kind of strange permission.
  8. Don’t save your passwords in your browser, even though this is convenient. Instead use a password manager; this is more secure.
  9. Enable a passcode on your device. If you have an Android, customize your lock screen. For the iPhone, use a longer passcode, not a PIN.
  10. Go through all of your apps to make sure that they don’t have access to personal information that you don’t want them to have access to. Pay close attention to all of those checkboxes you click for the “agreement” portions of installing apps. Every month, audit your apps.
  11. Never save a password in a very private application like that of your bank’s. Having to log in every time is a small fee to pay for the security this brings. Similarly, always log out completely from your e-mail every time you’re done using it.
  12. Use cloud encryption for your personal information. The Android allows encryption for all data on the device.
  13. Keep the phone’s operating system and app software updated. Don’t get lax with this.
  14. Anti-theft software. Enable the remote wipe function. This kind of app will help you locate a lost or stolen smartphone, but don’t delay in setting this up.
  15. Keep a backup of all of your device’s data.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

15 tips to Spring Clean Your Digital Security

As a security analyst for both off-line and online activity, which is personal protection and information security, I’m constantly analyzing my own security situation. This means paying attention to my surroundings, systems in place, the security of my hardware, software and data. One way to get a closer look at all of this and to get refocused, is to remove the clutter, upgrade technologies, and do a Spring Clean. I heavily recommend that you perform the following 15 tasks for tightening up your digital security affecting your overall security position.

7WClean up and secure your digital life:

1. Do away with useless files. Go through all folders, including the recycle bin, and discard files that you no longer use.

2. Organize media. Put music, photos, etc., in appropriately labeled folders. Maybe create a master folder for different kinds of related media.

3. Consolidate desktop icons. Perhaps you can put a few icons into another one if the topic is related: Put the “Muffin” and “Rover” files in one file labeled “Pets.” A desktop cluttered with icons will slow boot-up time. Consider “removing” an icon you hardly use; this won’t delete the program, but will get rid of the shortcut.

4. Uninstall programs you’ll never use. This will speed things up and reduce potential malware targeted software.

5. Review passwords. Update as necessary, making them unique, never the same, and use different characters upper/lower case and numbers. Install a “password manager”. Google it.

6. Make backups of important data on a flash drive or use online storage. Ideally, make a backup of your prized data that exists outside your house. I backup on 3 local drives and in the cloud in two places.

7. Consider reinstalling your operating system. This means gathering all your software and backing up all your data. Do a search on your devices OS and seek out “How to reinstall operating system Windows/Mac (your version)”

8. Mop up your system’s registry. This will clean out temporary files you do not need that have been picked up by your system over time. An accumulation of these files will slow your computer and make it prone to malware infections. CCleaner is a free tool that will do this job.

9. Update Internet security software. Use antivirus, antispyware, antiphishing and a firewall. Get a VPN for when using free wireless internet. Hotspot Shield is perfect. Google it.

10. Defragment your hard drive. For Windows 8 go to Files, then “defrag.” For older systems go to Program Files, Accessories, then System Tools. For the iOS, run its built-in Disk Utility app.

11. Install program updates. Updates include critical security parches: very important. For Windows go to Go to Start, Control Panel, All Programs and Windows Update. Click on “Check for updates” to see if you are up to date. For the iOS, go to the app store, then Updates.

12. Do not forget your mobile device. Update your smartphone, including weeding out unneeded apps. Update your mobile OS to the latest version. Several companies offer security apps that will scan a mobile’s apps. Some apps have features like a remote lock/locate/wipe that will prevent a thief from using your device should you lose it.

13. Social setting cleanup. Have you locked down how your private information on Facebook can be shared? If not, go to Privacy Settings, then Apps, then click “edit” which is next to “Apps others use.” Delete all your “friends” who really aren’t your friends.

14. Home security system. Upgrade this if it is old technology. New wireless home alarms connect to your network and include home automation features too. This includes surveillance cameras, motion detectors, glass break sensors and controlling lights and temperature. Opt for remote monitoring from any device using apps on mobiles and tablets.

15. Declutter your e-mail files. These can get very messy over time. First start with your in-box. What’s been sitting there for ages that you’ll never open? Delete it. Next go to the sent/trash folders and weed out no-longer-needed emails. Also scour through any other e-mail folders. Delete folders you no longer need, and/or trim down ones you still use but contain messages that are now meaningless.

Follow these 15 tips to spring clean your digital security. A freshly cleaned-out digital life will give you peace of mind and enhance your personal security. Taking the time to clean up your digital life will be well-worth it, so do not put it off any longer!

Robert Siciliano is a personal security expert to SecurityOptions.com discussing home security and identity theft on TBS Movie and a Makeover. Disclosures.

Analyze Security to reduce Threats

A deep analysis into security (security analytics programs) unveils some riveting areas that need to be addressed if business users are serious about reducing threats of data breaches.

1DReveal data leaks. Convinced your business is “data leak proof”? See what stones that security analytics turn over. Don’t be surprised if the leaks that are discovered have been ongoing, as this is a common finding. You can’t fix a problem that you don’t know exists.

An evolution of questions. Analytics programs can create questions that the business owner never thought to wonder about. Analytics can reveal trends and make them visible under the business owner’s nose.

Once these questions and trends are out of the closet, decision makers in the organization can have a guideline and even come up with additional questions for how to reduce the risk of threats.

Connections between data sources. Kind of along the same concept described in the previous point, security analytics programs can bring forth associations between sources of data that the IT security team many not have unearthed by itself.

Think of data from different sources being poured into a big funnel, and then what comes out the other end are obvious patterns and associations between all that data, even though it was “poured” from differing sources. When “mixed” together, the data reveals connections among it.

Uncovering these associations is important so that businesses can have a better understanding of disparate segments of their network, various departmental information, etc.

Discovery of operational IT issues. Take the previous points a step further and you get a revelation of patterns and connections in the IT operations realm—associations that can help mitigate problems with workflow and efficiency.

In other words, an issue with IT operations could be something that’s causing a drain on productivity, or, something that’s not creating a problem per se, but can be improved to spark productivity.

Uncover policy violations. Analytics can turn up policy violations you had no idea were occurring. Not all violations are malicious, but once they’re uncovered, they cannot be covered up; the next step is to do something about it.

Robert Siciliano is an Identity Theft Expert to AllClearID. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him knock’em dead in this identity theft prevention video. Disclosures.

6 Ways to Declutter Your Digital Life

It’s the New Year so time for new starts and new resolutions. With a new year upon us, now is a good time to clean out the clutter. Clutter is overwhelming, messy and inefficient and it transcends in both our physical and digital lives.

Here are some tips to help clear the clutter out of your digital world.

4W

1. Backup the Data on Your Devices
You are (hopefully) about to delete lots of stuff.

  • Back up everything you have onto an external drive – make sure this is your files, contacts, browser bookmarks, photos and any other important content you would want
  • Don’t forget to back up your smartphones and tablets as well
  • For extra de-cluttering, set up a secure cloud backup that runs 24/7

2. Organize your Computer

Organize files on your desktop and within desktop files, including consolidating several similar files into one file.

  • Delete duplicate files and ones that you do not need
  • Rename files so you can locate them easier in the future
  • Uninstall programs you never use

3. Clean Up Your Browser

  • Go through your bookmarks and delete the ones you don’t use
  • Clear out your cookies and browsing history
  • Disable or delete any add-ons or plug-ins that you are not using

4. Monitor Your Social Media Accounts

  • Cancel accounts on sites you don’t use—leaving your profile up can make you more vulnerable to cyber attacks
  • Go through your friends and/or follow lists and see if there’s anyone on there that you don’t want updates from any longer

5. Scrub Your Email Inbox

  • Move messages that you want to save into folders
  • Unsubscribe from mailings you never read or are no longer interested in

6. Scrutinize Your Smartphone/Tablet

  • Delete photos, music, texts or other items that you don’t use any longer
  • Remove apps that you don’t use any longer

Happy de-cluttering and Happy New Year!

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  Disclosures.

Managing your Digital Afterlife

Ever thought of who’d get your assets should you meet an untimely death, or even if you’re 99 and sensing that the time to check out is very soon?

10DYou may know whom you want to receive your assets, but do you know for sure that they actually will? After all, policyholders are not required to find out if the benefactor is deceased; they are only responsible for paying the claim when the beneficiary steps forward.

You must ensure that your beneficiary plans are airtight, which means you must do a lot more than just sign a number of papers outlining an estate plan and other instructions pertaining to end of life.

When it’s your time, will your beneficiaries know where to find your instructions? Will you unintentionally leave behind unclaimed policies?

Essentials

  • Make out an original will.
  • Make it clear who will inherit your assets.
  • Make everything else crystal clear as well, since wills are often challenged by family members in court and subject to probate.
  • Don’t wait till you’re sick or old, either; start this process now.

Ownership Proof

Maintain documentation of your ownership of the following:

  • Housing (owner-occupied and rental)
  • Land
  • Vehicles
  • Cemetery plots
  • Savings bonds
  • Stock certificates
  • Corporate or partnership operating agreements
  • Escrow or brokerage mortgage accounts

Inform your family what you own. Otherwise, after you pass, family members will be burdened trying to figure out everything you owned, and this includes scavenging through every piece of mail that comes to your home.

Bank Accounts

  • Provide family members with a list of all bank accounts as well as online log-in information. This way they can alert the bank to your death. An unused account will become a property of the state.
  • Give your family information pertaining to safe-deposit or security boxes.
  • Register your spouse’s name or child’s with your bank.
  • Next, have your spouse and child sign the registration document; they’ll then be able to access your account without having to get a court order.

Health Care

  • Fill out a durable health care power-of-attorney form. This way, a person you designate can make decisions on your health care should you become incapacitated.
  • Make sure the document complies with the federal health information privacy laws; this way medical professionals and insurance companies can communicate with the designee.
  • Consider filling out an Authorization to Release Protected Healthcare Information form.

Taking these steps will prevent family members from having to go to court to get a guardian appointed.

Retirement Accounts and Life Insurance

  • Make sure family members know your policy carrier name, number and agent.
  • Find out if your employer grants life insurance policies, because often, these get missed by financial planners and end up never claimed.

Marriage and Divorce

  • Your spouse must know where you keep your marriage license. If your spouse dies and you don’t know where the license is, you’ll likely need to pay for a new license and prove you were married to your deceased spouse before you can make a claim.
  • Divorced individuals should make known their divorce judgment and decree (or the stipulation agreement if the case was settled out of court). These documents spell out alimony, child support and property settlements, and may also outline division of investment or retirement accounts.

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

6 Ways to erase your Digital Life

You can make yourself “disappear” from the World Wide Web. But be forewarned: Most of the following tactics are irreversible. This includes losing any marketing presence you’ve built up over the years that can bring you business, and it can also result in being unable to restart an eliminated account with the same name or e-mail address.

1PSo before you begin the process of erasing yourself, ask why you wish to disappear in the first place. Are you merely a private person and don’t want your personal information where the whole world can see? Or do you feel threatened in some way (e.g., cyberstalking)?

Re-evaluate your reasons before proceeding. After all, you can create multiple e-mail accounts, for instance, in which one is strictly for business and one is strictly for family. And when registering on any new social media sites or forum boards, you can use a pseudonym. Nevertheless, here are tips on removing your cyber existence.

#1. Delete accounts. Systematically go through every account and delete. To nab every account you’ve ever created, since it’s possible you may not remember some, go through this list:

  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
  • MySpace
  • StumbleUpon
  • Flickr
  • eBay, Amazon, Craigslist
  • PayPal
  • Support forums (medical, parenting, pet ownership, business, etc.)
  • Gaming sites
  • Content sites you’ve written for
  • Freelance job sites
  • The local online newspaper where you’re registered to post comments to articles

 #2. Facebook. Go to Account Settings—Security—Deactivate account. This removes you from visibility, but the account remains just in case you change your mind. To eradicate the account altogether, go to Delete My Account and hit the blue button.

#3. Twitter. Go to Account Settings—Deactivate my account—Okay, fine, deactivate account. “Deactivate” means delete in this case, but you have a 30 day grace period to change your mind.

#4. LinkedIn. Go to Privacy & Settings—Account—Close your account.

#5. Google+.  To remove only your public information, click your name/e-mail address (upper right corner). Go to Account Management—Delete profile and remove related Google+ features—Delete Google+ content.

To remove the entire Google+ account, repeat the above, then hit Delete your entire Google profile. You’ll still be able to use, for instance, your e-mail (gmail), but to eradicate every molecule of Google+ (e.g., mail, calendar), go to your homepage and hit Close account and delete all services and info associated with it.

Mopping up Residue

With the big four gone, now go after smaller accounts. This includes the forum board you registered with 10 years ago for adult acne support but never posted anything. To aid in tracking everything down, use:

  • Account Killer. This tool provides direct links to every account deletion page.
  • Knowem. This tool does a username search on hundreds of social sites.

Then remove personal information from background check sites. This involves more complicated procedures.

#6. Hotspot Shield VPN is a free VPN service that protects your device’s data by ensuring that all web transactions (such as filling out forms, shopping, downloads, etc.) are secured through HTTPS.

With Hotspot Shield, your device basically will be surfing through a protected tunnel away from prying eyes and helps maintain some anonymity on an IP address that in most cases can’t be traced back to your home address or anywhere you’re at or have been.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

Digital wallets will save us!

When you leave your home or apartment in the morning, you might pack up a small bag of whatever you need for the day, which might change daily. But what doesn’t change is the three things you always have, and that’s your keys, mobile device and wallet. They are three essentials we can’t function without.

Fortunately, at least two out of the three are going away. Many locks for homes, businesses and doors are keyless, using a touchpad or buttons. And wallets as we know them are going digital, too. This means all we’ll be left with is our smartphone!

Through near field communications (NFC), smartphones can act as a virtual credit card that makes payments right at the cash register. NFC is much more secure than the traditional plastic cards with the magnetic strip, so the security of NFC is a huge benefit to preventing credit card fraud.

Isis is a mobile payment network comprised of the major mobile networks as a joint venture among the three biggest telecom operators in the United States (AT&T Mobility, T-Mobile USA and Verizon Wireless) to provide consumers and merchants with an open and secure mobile commerce platform. Isis has chosen Gemalto to secure this platform though Gemalto’s Allynis trusted service manager (TSM).

Google is also in the digital wallet game too. No matter if you’re at home or on the go, you can send money to any friend in the U.S. with an email address. It’s easy, fast and free to send directly from your bank account or Google Wallet. Store your loyalty programs in Google Wallet and leave the plastic cards behind, or redeem great offers with Google Wallet from your favorite businesses to save when you shop. For select NFC-enabled devices, you can tap and pay anywhere contactless payments are accepted. Choose to spend your Wallet balance, or add a credit or debit card to fund purchases.

In due time, consumers will be able to rid themselves of their wallets and consolidate all their cards into the mobile devices! I, for one, want this yesterday!

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.