Safeguarding Your Security and Privacy at Work and at Home

Total Page:16

File Type:pdf, Size:1020Kb

Safeguarding Your Security and Privacy at Work and at Home SECURITY TM SmartNEWSLETTER SAFEGUARDING YOUR SECURITY AND PRIVACY AT WORK AND AT HOME Mobile Phone Do’s and Don’ts Whether using your mobile device for business or pleasure, make security a priority. Now that many organizations are allow- Connect to the Internet using a phone V. Jay LaRosa, senior director of ing employees to use their own mobile via an untrusted wireless hotspot. You’re converged security, architecture, devices for work, keeping those devices not using your own, so you have no idea Automatic Data Processing Inc. secure has become imperative for both who’s listening in on that. It’s so easy for personal and professional reasons. In someone in a car to listen in with a very DO: Set up your mobile device with addition to learning and adhering to simple and cheap device. a PIN and a remote wipe service. Most enterprises require this, but this can your employer’s policies when using Bill Thirsk, vice president of IT and also be done for your personal device your device for work purposes, take CIO, Marist College into account the following tips from with apps like “find my iPhone.” If your security experts: DO: Set the device to auto-lock. This device is ever lost or stolen you want to works in combination with the passcode. make sure it is hard to get into. Richard Greenberg, information If the device is inactive for a few minutes, DON’T: Respond to or click links in security officer, Los Angeles County setting the auto-lock will require the unsolicited text messages. If your pro- Public Health passcode to be entered to gain access to vider will allow you to block text DO: Most obvious, or it should be it again. The timeout should be short; a messages from certain numbers, use obvious, is password protect the phone. minute or two is best. that feature to stop future unwanted This is too often forgotten, resulting in Set the device to auto-wipe after messages from specific numbers. Once potential identity theft. several invalid password attempts. This you respond [to text messages], the Set up the remote wipe capability built will remove all user data. Enabling this people on the other end may barrage into many phones, which is great for feature will effectively prevent unauthor- you with more unwanted messages, peace of mind in case of a lost device. ized use, prevent access to your data or sell your live number. Some phones have this capability; with and block repeated attempts to crack Jailbreak your phone [modify it to others it has to be downloaded. a passcode. avoid limitations placed on it by your Make sure you have access to data DON’T: Leave the phone unattended. carrier]. You are opening yourself up to backup systems from the phone, and It only takes a few seconds for a thief a world of unknowns. If you venture make sure to back up data regularly. If to pick up a phone. You should always outside of the protections that the the only place you have the data is on have your phone with you, even if provider affords, you are putting your the phone, it could be lost permanently. you’re just stepping away for a few device at additional risk from unknown DON’T: Rely on mobile banking. I seconds in a public setting. Keeping vulnerabilities or opening additional would recommend people do their your phone physically secure will go a access that could not normally be banking from a PC they trust. long way toward protecting your data. exploited by an attacker. To purchase an individual subscription, email [email protected] for more information. SUMMER 2013 Security Smart 1 Take Out Cash Safely Preserve and Protect Card skimming at ATMs is an increasingly popular Keep company information out method for stealing money. Know what to watch for of the wrong hands. when you withdraw funds. You are your company’s first line of de- Depositing or withdrawing money ATM you are familiar with so fense against loss of intellectual property. from an ATM is so routine that that you’re more likely to notice Con artists are often very cunning, but your mind might be tempted to if something is amiss. Also, keep you can arm yourself with techniques to wander while you wait for your in mind that ATMs inside banks spot them. First and foremost, you need to bills to come shooting through tend to be safer, and stand-alone, know what information you should never the slot. But letting your guard non-bank-related ATMs are the surrender to outsiders, says Lynn Mattice, down can let unwanted criminals most vulnerable, such as those at managing director of Mattice and Associ- into your bank account. So-called convenience stores. ates, a consultancy specializing in enter- card skimmers work by modifying ➤ Protect your PIN. Skim- prise risk assessment. Here’s what he says the ATM’s hardware or software mers can also try to grab PIN you need to keep to yourself: or adding a separate card reader info by installing hidden cameras ❶ Information affecting the company’s that looks like the real thing. Their somewhere inside the machine, future that has not been made public. This equipment records the data from in the wall or even inside one of could be targets for mergers, acquisition the bank card’s magnetic stripe those racks of innocent-looking or divestiture, as well as new product de- and may also steal a customer’s pamphlets that sit off to the side. velopment or strategic new markets that PIN. This information lets them Get into the habit of covering your the company is developing. create dummy cards that they use PIN with your hand, even when ❷ Market or financial performance to drain the victim’s account. you are alone. Doing so may pre- data that hasn’t been officially released to Card-skimming is surprisingly vent a camera from detecting your the public. common and affects both con- code and may also stop another ❸ Personally identifiable information sumers, who lose their money, and type of nontechnical scam: shoul- about a customer, employee (including banks, who suffer a blow to their der surfing, which occurs when you) or anyone else affiliated with the reputation if one of their machines a person lurks nearby and simply company. is hijacked. watches as you punch in your PIN. ❹ Trade secrets. So how can you protect your- ➤ Avoid overly helpful ❺ Any information beyond what has self from card skimmers? people. Beware the good Sa- been authorized by the company for pub- ➤ Check for fake readers. maritan hanging out near the ATM lic release. What should you do if people Criminals might install fake read- who offers to help. In this scam, ask you for this type of information? Ask ers over the slot where the card is a doctored machine captures the them some questions. “Obtain sufficient swiped that can capture the card card and the victim is perplexed information from the individual making information. Another ruse is plac- as to why the machine is having the request to validate that they have a ing a fake PIN pad over the real problems. A helpful bystander right or a need to know the information,” one that can record PIN informa- will offer to help and ask for the says Mattice. tion as you type it in. person’s PIN. Once he has it, the If you know what to look for, card is as good as his. DID YOU KNOW? you can often spot these devices. ➤ Monitor your accounts. Thirty-five percent of For starters, see if you can wiggle Stay on top of your own financial data breaches the reader. A legit one should be records. Each month, check your in 2012 were the result of negligence sturdy. Criminals also might put bank statement for any withdraw- or human error and 29 percent were up signs that say “No Tampering” als that you didn’t make, and attributable to system glitches, according on machines they themselves have notify your bank immediately if to a recent study. However, malicious tampered with, to discourage any- you find any errors. Reporting attacks remained the single highest one who senses a problem from fraudulent activity quickly ensures cause of breaches, at 37 percent. trying to explore further. the best possible chance that you Source: The eighth annual Ponemon “Global Cost of a Data Breach” study Your best bet is to use an can recover your funds. SUMMER 2013 Security Smart 2 Online Stolen Credit-Card Ring Exposed Vietnam-based conspirators allegedly had data on more than 1.1 million cards. Law enforcement agencies in the United States, Vietnam provided to retailers when shopping online and paying via and the United Kingdom recently disbanded a crime ring credit cards, according to the office of the U.S. attorney for that had allegedly been selling online credit card details the district of New Jersey. since 2007. Data relating to more than 1.1 million cards was ob- The ring, which sold the credit card information through tained through hacking of commercial entities, the United two websites, is said to have caused more than $200 million Kingdom’s Serious Organized Crime Agency said. The peo- in fraudulent charges on credit cards issued in the United ple charged are alleged to have illegally obtained personal States and Europe. information, including purchasers’ names, addresses, credit Charges have been brought in a federal court in card information and Social Security numbers, from victims New Jersey against Duy Hai Truong, 23, of Ho Chi Minh City, in New Jersey, according to U.S.
Recommended publications
  • Your Family Connection
    Homy Your Family Connection Defining Opportunities/Market Research A. Target Customers B. Value Proposition C. Assessing Market Size with TAMSAMSOM D. Competitors & Risks A. Target Customers 1. International Age 18-25 Characteristics Left home, adept to technology & College Students Goal Share daily lives and updates with parents Behaviors & Personalities: College students belong to young adult group who are busy yet determined to maintain school-life balance. They want to stay connected with their friends and family despite physical distance and enjoy sharing activities or events from their daily lives. Typically, they come from a collectivist culture in which family ties are strong and relationship between parents and children are tight-knit. They communicate frequently with their families. Although they value such family interaction, they still want to live independent lives without their parents’ constant attention. 2. Millennial Moms Age 45-55 Characteristics Separated family members most caring unit in a family Goal Casually check on children manage family events Behaviors & Personalities: Millennial moms1 belong to young modern parents who are generally adept with technology. They value happiness and wellbeing of their families. They mostly come from developed regions with a collectivist culture that emphasizes family relationships and believe in supporting their children regardless of any physical separation. Although they would prefer to have frequent communications with their families, they do not want to become a nuisance in their busy lives. They find comfort in knowing their children and husband’s wellbeing and safety. B. Value Proposition 1Millennial moms are described as mothers born between 1978 and 1994, and approximately consist of 22% of the global mother population.
    [Show full text]
  • Internet Resources
    Internet Resources Search Engines Alta Vista – (Now Yahoo) Gseek - www.gseek.com Ask – www.ask.com HotBot - www.hotbot.com/ Baidu - www.baidu.com/ (China) Kngine - www.kngine.com Bing - www.bing.com Lycos - www.lycos.com/ Blekko - blekko.com/ Mamma – www.mamma.com Cluuz - www.cluuz.com Mojeek - www.mojeek.com Deeperweb - www.deeperweb.com Mozbot - www.mozbot.com DuckDuckGo - duckduckgo.com/ Quintura – (Now a children’s Search Engine) Entireweb - www.entireweb.com Spacetime - www.spacetime.com Exalead - www.exalead.com/search/ Teoma – (Now Ask.com) Factbites - www.factbites.com Untabbed - untabbed.com (Google Results) Fagan Finder - www.faganfinder.com WbSrch - wbsrch.com/ Fraze It - fraze.it/ WolframAlpha - www.wolframalpha.com Google - www.google.com/ Yahoo - search.yahoo.com/ Gigablast - www.gigablast.com/ Yandex – www.yandex.com (Russia/CIS in English) Yandex - www.yandex.ru/ (Russia/CIS in Russian) Meta-Search Engines Carrot2 - search.carrot2.org Search.com - www.search.com/ Dogpile - www.dogpile.com/ Scour - www.scour.com/ eTools - www.etools.ch/ (15 Search Engines) Surfwax – www.surfwax.com (RSS Meta-Search) Excite – www.excite.co.uk Webcrawler – www.webcrawler.com Graball – www.graball.com Webfetch - www.webfetch.com/ Ixquick - ixquick.com/ YaBiGo - yabigo.com/ MetaCrawler – www.metacrawler.com Yippy - www.yippy.com/ MetaGer - metager.de/ Yometa - www.yometa.com/ oSkope - oskope.com/ Zapmeta - www.zapmeta.com/ PolyCola - www.polycola.com/ Zoo - www.zoo.com PolyMeta - www.polymeta.com/ Zuula - www.zuula.com/ Web Directories Accoona
    [Show full text]
  • Castilleja School Magazine Fall/Winter 2014
    CASTILLEJA SCHOOL MAGAZINE FALL/WINTER 2014 fall/winter 2014 | 1 contents FALL/WINTER 2014 features departments Cultivating Resilience in Girls: 2 Around the Circle 10 Doing the Math Alumnae 27 Resilience and Athletics 4 Faculty Notes 37 The Importance of Reading 6 for Pleasure: A Discussion Board Update 40 with Students Annual Report 41 The Importance of a 9 Caring Community Class Notes 62 In Memoriam 82 2 | full circle from the head “Human existence is based upon two pillars: compassion and knowledge. Compassion without knowledge is ineffective; knowledge without compassion is inhuman.” —Victor Weisskopf On the first day of school in late August, I shared sisters’, eighth grade big sisters stay attuned to the this quote with students, parents, guardians, and needs of our sixth grade students; junior ringees employees. I invited them to join me in recommitting shower their senior ringers with comforting treats to to one of our core values, and a key element of our ease the stress of the college application process; mission: compassion. and freshmen athletes host “senior night” for their graduating teammates, in thanks for their leadership A Founder’s Day speech given last spring by then- and mentoring. These traditions are part of our senior Cassidy Jensen ’14 was the original inspiration history and have become part of our DNA. for my decision to make compassion our focus this At Castilleja, compassion for one another is year. As you will read in a transcript of her speech practiced daily. on page 9, Cassidy urged us to make sure Castilleja remains known as a place where people are “not just Compassion beyond the Circle is an equally good at what they do, but also good to each other.” important part of our tradition.
    [Show full text]
  • Giant List of Social Networks
    Giant List of Social Networks Connect with different people & make new networks. Get “social“. Decentralize your comms. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor new friend. 1. 9GAG http://9gag.com/tv 2. 23snaps https://www.23snaps.com 3. 500px https://500px.com 4. About.me https://about.me 5. Academia https://www.academia.edu 6. AcFun/AC https://www.acfun.cn 7. Adobe Portfolio https://portfolio.adobe.com 8. Adamant https://adamant.im 9. Afreeca TV https://www.afreecatv.com 10. Airtime https://www.airtime.com 11. Akasha https://akasha.world 12. Album2 https://www.album2.com 13. Alternative.me https://alternative.me 14. Altervista https://altervista.org 15. Ameba https://www.ameba.jp 16. Amikumu https://amikumu.com 17. Amino https://aminoapps.com 18. Ancestry https://www.ancestry.com 19. Anchor https://anchor.fm 20. AncientFaces https://www.ancientfaces.com 21. AngelList https://angel.co 22. Anobii https://www.anobii.com 23. AnonUp http://anonup.com 24. Aparat https://www.aparat.com 25. Apartment List https://www.apartmentlist.com 26. Are.na https://www.are.na 27. Ask https://ask.fm 28. ASmallWorld https://www.asmallworld.com 29. Athlinks https://www.athlinks.com 30. Badoo https://badoo.com 31. Baidu Tieba http://tieba.baidu.com 32. Bandcamp https://bandcamp.com 33. Barnmice http://www.barnmice.com 34. Bearshares https://bearshares.com 35. Befilo https://befilo.com 36. Behance https://www.behance.net 37. BeMyEyes https://www.bemyeyes.com 38. Bibsonomy https://www.bibsonomy.org 39.
    [Show full text]
  • TINYBEANS Group Ltd. (TNY)
    TINYBEANS Group Ltd. (TNY) Investment Highlights Tinybeans (TNY) is a photo journal app that allows parents to organize their children’s memories, milestones, and growth. TNY’s mission is to create happy memories for every family by providing a platform to track their child’s https://tinybeans.com growth and development, at the same time creating a safe and secure social platform where they can share their photos with friends and family. April 23, 2019 ■ Our Thesis: The leader in U.S. social media and social networking service Valuation Coverage company, Facebook, has never seen its clear leadership challenged, and its lead in profitability has been only widening over time. We believe an Interactive Media & Services marketplace with a family and parent focus will Equity Research share a similar path, with TNY enjoying unchallenged leadership and disproportionate scale benefits. ■Key Debates: Will Media & Services competition, in particular traditional Analyst: Quang Ho media companies, launching direct-to-parents services, hamper TNY’s user (518) 256-4267 growth? Will TNY’s business model ultimately prove attractive (pricing power, margins at ultimate scale)? S hould investors now conceive of TNY’s [email protected] market universe as a privacy-enabled child memory sharing platform, a much safer base in coming years, rather than other platforms? Price (US$) ■ Catalysts: The predominant driver of TNY shares, in our experience, has 04/23/2019 been quarterly user growth. $0.48 Getting more engagement, extension and usage. Creating more value for Price Target * $1.81 parents so they could spend more time on the platform in order to boost the 52 week high $0.52 revenue streams; advertising, premium and printing services.
    [Show full text]
  • Alumni at Large
    Colby Magazine Volume 102 Issue 4 Spring 2014 Article 9 April 2014 Alumni at Large Follow this and additional works at: https://digitalcommons.colby.edu/colbymagazine Recommended Citation (2014) "Alumni at Large," Colby Magazine: Vol. 102 : Iss. 4 , Article 9. Available at: https://digitalcommons.colby.edu/colbymagazine/vol102/iss4/9 This Contents is brought to you for free and open access by the Colby College Archives at Digital Commons @ Colby. It has been accepted for inclusion in Colby Magazine by an authorized editor of Digital Commons @ Colby. CATCHING UP | ALUMNI ProfILes Shaken, Not Stirred | Andrew Volk ’05 Behind the Hunt & Alpine Club bar— a bar, and his response was immediate 35 feet of brushed galvanized steel inside and unenthusiastic. “But then I thought, 75 Market Street in Portland’s Old Port— ‘Hey, maybe actually, between the skills Andrew Volk ’05 moves with staccato and what I’ve seen and what I’ve done … assurance. He taps to check if patrons this could actually work.’” need a refill, swings to wash glasses in a It took almost two years to plan, raise hidden sink, and moves his Boston shaker capital, and build out the space, but he with a speed and energy usually reserved opened his doors in September—and for maracas: over the shoulder, down, Portland’s food scene took notice. In back up. A pour through, then tap. You, November the Hunt & Alpine Club sir, have a drink. was featured on eater.com (a national Volk has been tending bar for almost restaurant gossip site) in a roundup of the a decade, since he landed a gig in Glacier 30 hottest cocktail bars in America.
    [Show full text]
  • Castilleja School Magazine Fall/Winter 2013
    CASTILLEJA SCHOOL MAGAZINE FALL/WINTER 2013 fall/winter 2013 | 1 contents FALL/WINTER 2013 features departments The Role of Social and 2 Around the Circle 15 Emotional Learning Alumnae 32 Assessing What’s Important 4 Board Update 43 Global Travel, Individual 6 Transformation Faculty Notes 45 Why Mentoring Matters 8 Annual Report 49 Getting Girls to Thrive in STEM 10 Class Notes 70 A Changing View on 13 In Memoriam 82 Teaching and Learning 2 | full circle from the head Learning to Lead When I began my teaching career, describing a described gender differences in social development, student as “creative” was code for implying she and she shared research on sex-based brain lacked the discipline, perseverance and clarity of differences. She distilled her advice down to the thinking to excel as a scholar and as a role model for “three Cs” that educators, coaches, and mentors her peers. Some thirty years later, in my fourth year must always keep in mind. By fostering their as Head of School, I am now more convinced than competence and ensuring their connectedness, we ever that creative confidence is precisely what it can cultivate the confidence girls need to succeed takes to lead others successfully. and lead in the 21st century. My own personal growth as a leader has been Deak’s findings complement those of Castilleja built on the creative confidence to lean in, to speaker Po Bronson, who co-authored with Ashley acknowledge problems, to identify solutions without Merryman, Top Dog: The Science of Winning and fear of failure, to accept feedback, and then to Losing.
    [Show full text]
  • Digital Death Survey 2018
    The Digital Death Report 2018 =The Digital Death Report explores society's attitudes towards death, technology bereavement and the internet. The report uses data obtained from the Digital Legacy Association's Digital Death Survey and is published and made available online for free, The questions asked in 2018 were altered and updated with the assistance of Dr. Carla Sofka and Siena College. The data collected in 2018 is owned by both the Digital Legacy Association and Siena College Background/aims: Since 2014 the Digital Death Survey has explored societies attitudes and behaviours towards end of life planning, death, dying and bereavement. By understanding attitudes and behaviours we have been able to better inform policy makers, assist those providing end of life care and support the general public . Methods: Annual online ́Digital Death Survey. Data obtained populates the Digital Death Report, Questions addressed • Online accounts the subject uses • Attitudes around death, dying, legacy and bereavement • Practical steps made for ́digital estate ́ (digital assets, online accounts etc) • Plans put in place made for future health care wishes • Other practical steps made (property, physical assets etc). The Digital Death Survey 2018 The Digital Death Survey 2018 questions were altered and updated with the assistance of Dr. Carla Sofka or Siena College. The data collected in 2018 is owned by both the Digital Legacy Association and Siena College Q3 - In general, how do you feel about the role that technology has in our society? Very positive
    [Show full text]
  • Where's Your Data?
    WHERE’S YOUR DATA? Whether your data sits on premise, in a public or CONNECTOR a private cloud, it needs to be audited, searched, managed, and protected. NetGovern connects to PROTOTYPES WE ARE an extensive list of locations allowing searches, WORKING ON OR audits, archiving, and remediation of unstructured INTERESTED IN data through a SINGLE-PANE OF GLASS. Connectors for document CURRENTLY SUPPORTED sharing platforms, network LOCATIONS filers, or cloud storage: ► BitCasa ► Cloud Drive/Amazon Drive ► Evernote ► Google Docs ► Google Drive ► Huddle ► IDrive ► Network File System (NFS) ► Oracle Docs Following the Information Governance best practices that we preach, we always strive to be ► Amazon S3 better. That’s why we are continuously building ► SugarCRM connectors to meet the needs of our customers ► as well as investigating other potential WebDAV connectors. The list below represents prototypes ► Hightail and our interest in future connectors. We publish ► this list so that you can help us choose the next ZohoCRM connectors we will be building. www.netgovern.com Connectors for contacts: ► Google ► Hi5 ► Gmail ► Kodak ► SalesForce ► Myspace ► Yahoo ► Orkut ► ZohoCRM ► Photobucket Connectors for email ► Shutterfly services: ► SkyDrive ► Smugmug ► AOL Mail ► Snapfish ► Comcast ► Walmart ► Gmail ► Webshots ► Generic IMAP ► Hotmail Connectors for stream ► Generic Pop3 services: ► RediffMail ► Twitter ► Sify Mail ► Yahoo Mail Others: ► Elastic Email ► FTP Connectors for photo ► NFS services: Don’t see what you need on this list? ► 23Snaps Let us know at: ► Bebo Photo [email protected] ► Facebook ► Flickr 180 Peel Street, Suite 333 Montreal, QC Canada H3C 2G7 • Toll-free: USA & Canada: 1-866-497-0101 • International: +1 514-392-9220 • Email: [email protected] www.netgovern.com.
    [Show full text]
  • Parent.Co and Notabli.Com Recommendations 12.16.2015 ─
    Parent.co and Notabli.com Recommendations 12.16.2015 ─ Everett Ackerman, Scott Kliczewski, Page Hallock, Hadley Priebe and Khalid Rizvi Champlain College Digital Marketing Metrics and Analytics Professor Elaine Young Burlington, VT 05401 1 Introduction Parent.co is a company of parents dedicated to providing sustainable, thoughtful and modern advice for raising children. Through products such as the online magazine and Notabli, Parent.co is making strides to move ahead of other parent advice companies to position themselves at the top of the parenting products/services industry. Parent.co has the opportunity to be a leader in this industry with their expert advice as well as a safe platform for parents to share pictures of their children without the threat of invasive phishers. To truly take advantage of being a frontrunner of an upcoming industry, Parent.co must modify it’s current online magazine model, update collection of analytical data and improve the connections between their products. Below are some recommendations we have made concerning these aspects of Parent.co. We believe these recommendations will help Parent.co become a leader amongst the digital parenting advice community. 2 Parent.co & Notabli Ecosystem Above you can see the current ecosystem for Parent.co and its subsidiary sites. Since the redesign of Parent.co, about.Parent.co is now the homepage for everything Parent.co. It is the company’s page for introducing employees, showcasing current and new products and leading to each subsidiary site of Parent.co. About.Parent.co leads to each of the other Parent.co sites, in various ways.
    [Show full text]
  • Chapter 3 Your Adoption Planning Questionnaire (APQ) Guide
    Chapter 3 Your Adoption Planning Questionnaire (APQ) Guide 3-1 Please use the following chapter as a guide when completing your Adoption Planning Questionnaire (APQ). You will need to complete the APQ online. To log in to your online account, simply visit www.americanadoptions.com and click "My Account." You will then be directed to the login screen. Your APQ will remain locked until you have read this manual in its entirety and had a consultation with your Adoptive Family Coordinator. Once this has occurred, your APQ will be unlocked so you may proceed. Both partners will need to complete the APQ together, taking time to view the videos and openly discuss your selections. Once you have completed the APQ online, an Adoptive Family Specialist will schedule a phone conference to review your responses with you and answer additional questions. The APQ is an extremely important document. It should only be filled out with full knowledge and understanding of how your selections will affect your exposure to potential birth parents, your waiting times and your adoption experience. We recognize that this may be a daunting task, because we ask you to explore many factors that you may have never previously considered. Topics such as substance use may seem as if you are entering a whole different world, and that can be overwhelming. Your Adoptive Family Specialist is there to talk you through any challenges you face in this process. It is a normal part of the journey, and we want to both support you through it and be realistic and transparent about what your choices mean for your family.
    [Show full text]