top of page
  • boomboo9

Information security: keep your devices and info safe

Updated: Mar 17, 2021

*Info Provided from Norton security*

1. Create strong passwords and change them often. Never save passwords on your device. Yes, it’s convenient. Yes, it saves time. If you need to safely store passwords, look into a secure password manager. Criminals are getting smarter and need just one chink in the armor to get into the system to rob you blind. 2. Be conscious of privacy settings. Most apps offer privacy settings for users. This gives you the freedom to know how much and what kind of information is shared. Always choose the least amount of data sharing.

3. Obtain reliable security for your phone. Phones need as much protection as any other device, if not more. There are many security providers that offer free services. These can be risky as they mine data from your phone. Always go for a well-known service provider.

4. Back up your data via reliable hardware or software. Backing up data is often overlooked, but remains a very important aspect of data protection. Ransomware is a type of attack where hackers hold your data hostage for a ransom. There are cloud-based services that offer backup, or you can opt for Norton Security Premium, which includes backup capabilities. 5. Anti-theft your device. If your gadget is lost or stolen, tracking apps will help you find it. But how do you protect your confidential data before it gets into the wrong hands? Many apps are available that will reset your device if lost or stolen.

6. Be careful what you do with your phone, and use a password. Entering a password every time you want to use your phone may be tedious, but it’s also the first line of defense if your phone gets lost or stolen. Additionally, when you consider the vast amount of malware, Trojans and worms finding sneaky ways to get into your device, it is better to stay protected with a security system that does the work for you. Install an application that will prompt privacy risks, intrusive behavior of apps, excessive battery drainage and data plan usage. 7. Watch out for Bluetooth vulnerabilities. Bluetooth technology offers incredible convenience. It also opens doors for security weaknesses. Make sure you turn off your Bluetooth when you are not using it. While there are options to place your Bluetooth activity in an invisible or undetectable mode, there are some malicious apps that can change that mode and expose your device to threats. That’s one more reason to have a security system in place. 8. Keep your operating system up to date. “A hindrance” is what many people call operating system updates. They are annoying and sometimes time-consuming but are very important. Besides improving the functionality of the device, updates and patches contain critical security updates. Make it a point to update as soon as possible. 9. Beware of public Wi-Fi. Most home Wi-Fi connections are encrypted. Some public Wi-Fi connections are not. This means you’re at risk of people monitoring your online activity. Sometimes, malware from someone else’s device can infect your device. Ensure you’ve turned on your firewall, and have up-to-date malware protection, or you could run into problems.Delete data that you no longer use. 10. Close down any online service that you no longer use. There are many social networks that come and go. If you have signed up for any of these, they may have a wealth of your personal information that you willingly gave. But eventually when these services disappear, they take with them your information that can be sold as an asset.

If you need help keeping your information secure, please contact us and we can go over several security measures and implement a security plan for your devices and information.

5 views0 comments

Recent Posts

See All

Need a windows application that does a specific need?

We are here to help. We design, code, and test our applications that are specifically designed and used for our clients. We can build from the ground up or work within existing applications to meet yo


Post: Blog2_Post
bottom of page