![]() |
![]() |
Internet Security Information |
|
![]() |
![]() |
Protect Your Little Black Book
The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Does she give it back, or does she explore it? If she gave it back, we wouldn't have a movie, now would we? Stacy then proceeds to identify his ex-girlfriends and contact them. Let the games begin. Could this really happen? Of course it could. Most PDA's contain a plethora of information about a person and their activities, their digital footprints. People store contact information, appointments, meetings and midnight rendezvous'. They store passwords, login ID's and PIN numbers. They have photos of people they know and sometimes in awkward circumstances. It's a lot to have to explain. The courts are only beginning to grapple with how to handle the content in a PDA. One person's little black book can be very incriminating indeed. For the rest of us, we have nothing as exotic; however, we are all in danger of exposure and threat. Identify theft has become one of the largest white-collar crimes. There is enough information in the average PDA for someone to take over your life. So, what's the solution? Give up your PDA? No. You face the same problem with the typical day planner. It has all of the same information, it's just not as accessible. In fact, a PDA has certain advantages over a planner. You can password protect some of the data. You can even encrypt data. Most importantly, you have a backup. The data is safely stored on your computer and archived on external media if you have taken the proper steps. That duplication of data also means an identity thief has more ways to get to it. So, what can you do? Well, the first concern is to make sure that you backup your data. Synchronize your PDA at least daily. I synchronize my Treo 600 2-3 times each day, usually when I arrive at my office or leave it. Backing up your data means that you should be creating a copy on tape, CD, zip disk, flash ROM or other external media and storing it offsite. If you are not, you are asking for trouble and your business is at risk. If your PDA is ever stolen, you will need to restore that data on a new PDA. Next, you need to minimize the amount of data someone can actually access. Let's face it, if a hacker really wants to get your data, they will succeed. However, not every criminal is a super hacker. Sometimes you just want to keep your information from prying eyes. Just because you labeled something as private in your PDA doesn't mean someone else can't read it. It depends on what application you synchronize with. If you sync with Outlook, records that are private on your PDA may be public in Outlook. The best way to protect passwords and PIN numbers is to store them in a password application that encrypts the data. The best applications have both a PDA application and a desktop application that allows access to the information from either system. The trouble is converting that data from whatever format it's in currently. I've struggled with this one myself. There is no easy method I've found so far. Just set aside time to copy and paste the data into the password application. It might take a few hours to get that information into a secure application. If you're worried about someone viewing your schedule, the best approach is to archive your past history periodically. Outlook has settings that allow you to specify to how often calendar events will be archived. This will wipe the history from your PDA also. Archives are usually stored in an external file that can be accessed later. If you have incriminating photos, delete them. If you want a copy, save it on external media like tape, CD and flash ROM. For contacts, you can archive them or simply move the record to an external file. Outlook allows you to create a .pst file that you can use to save email, calendar, address, tasks, or other information. Once you move a record, it will be removed from your PDA. And, don't forget to delete the cookies and memory cache on your PDA's web browser. Remember that website you checked out last week? Is that something you want everyone else to know about? I don't think so. Don't forget physical security; keep an eye on your PDA. It's possible to take steps to protect your data and remove your digital footprints. Protect your little black book and it will protect you. Rick Cooper, The PDA Pro, is the PDA Coach for productivity anytime, anywhere. He is a national speaker on business productivity and sales. Rick is President of StratAchieve, a company specializing in coaching services to improve productivity and increase revenues. For more information, visit his website at www.thepdapro.com or call (800) 677-6708.
|
![]() |
![]() |
![]() |
RELATED ARTICLES
Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internet is quick, convenient and is probably safer than you think. However, you still need to be aware that it is essential to vigorously protect your privacy and financial information when making purchases online. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. But how many people do that in their excitement to take their new computer out of the box and hook it and see what it will do? Sans Internet Storm Center says those people will have their computer infected with adware or worse in less than 20 minutes! Virgin computers online are an easy target, open to attack. When that person soon realizes their brand new computer is sick, first comes the shock, then the anger, then the question; how do I fix it? If the new computer owner is lucky they can fix it fairly cheaply. It might involve a lot of time listening to elevator music while you're in the hold queue?. either way it's no fun. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions of every kind. Obviously, you're infected! From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. You finally find it at presents4aunties.com. The site looks a little rough on the edges, weird colors and such. But they have that gift you know will make Aunt Bess add you to her will. You purchase the gift, log off and head to bed. Tired but happy. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. You may not see it, but almost all of your company's information is in digital form somewhere in the system. These assets are critical because they describe everything about you; your products, customers, strategies, finances, and your future. They might be in a database, protected by data-center security controls, but more often than not, these assets reside on desktops, laptops, home computers, and more importantly in email or on some form of mobile computing device. We have been counting on our firewall to provide protection, but it has been estimated that at least fifty percent of any given organization's information is in email, traveling through the insecure cyberspace of the Internet. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Victim? In many cases add the word "willing." The media's point of view and how they choose to portray these occurrences always makes me chuckle. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet." How To Give Away Your Personal Information Identity Theft and Your Personal Information -------------------------------------------- Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Online services such as Internet banking save time and money. However, from the depths of its vast expanse have come the dregs of society intent on preying on the new, the naïve, and the less informed. Mall Protection The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc. Don?t Become An Identity Fraud Statistic! "You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!" Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U.S. Bank Corporation that I received contains the subject "U.S. Bank Fraud Verification Process" and in the body of the mail it says "We recently reviewed your account, and suspect that your U.S. Bank Internet Banking account may have been accessed by an unauthorized third party. Protecting the security of your account and of the U.S. Bank network is our primary concern. Therefore, as a preventative measure, we have temporarily limited access to sensitive account features. To restore your account access, please take the following steps to ensure that your account has not been compromised:". It continues with a link to a webpage, which looks very similar to original web page of the bank. Spyware ? Your Web Browser is the Culprit! My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26 Jul 2005 19:20:51 -0800 Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Phishing: An Interesting Twist On A Common Scam After Two Security Assessments I Must Be Secure, Right? --------------------------------------- Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. When the final report came in, your company was given a clean bill of health. At first, you felt relieved, and confident in your security measures. Shortly thereafter, your relief turned to concern. "Is it really possible that we are completely secure?" Given you're skepticism, you decide to get one more opinion. ![]() |
home | site map |
Copyright © 2005 web.adsense.business.free.fr |