Ransomware is a special type of malware. Once it infected your computer, it encrypts all of your files and demands you pay a ransome if you want your files back. Be suspicious of any emails trying to trick you into…
Shopping Online
When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more…
Forwarding Emails
When you forward an email to others or copy new people to an email thread, review all the content in the entire email and make sure the information contained in it is suitable for everyone. It is very easy to…
Secure Your Home Wi-Fi Network
Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their…
Ask Slashdot: How Should I Furnish (And Secure) My Work-From-Home Office?
“If someone gave you a big chunk of change to build a small one- or two-room office, what would you do?” asks long-time Slashdot reader darkpixel2k, as he plans to build a small office out in his backyard. My plan…
Detecting Fraud
Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised.
Lock Your Mobile Devices
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.
Never Give Your Password Over the Phone
Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your…
Patch and Update
One of the most effective ways you can protect your computer at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.
Social Media Postings
Be careful: the more information you post online about yourself, the easier it is for a cyber attacker to target you and create custom attacks against you or your organization.