Categories
Cyber news Cyber Security

Safety tip of the day

How safe are you with your passwords with your internet browser?

Do you practice good password security?

Do you use your web browser to save passwords from websites?

To answers these questions, I’ll share with an experience I had. I won’t share the brand name of this web browser just to stay out of trouble. A friend of mine bought a new computer and asked me to help him with the initial setup. We went through all of the normal configuration of a new laptop and transferred his information from the old laptop to the new one.  After the setup he went through the new laptop to see if anything was missing from the old laptop. Turns out that he didn’t document some login and password information from some websites he uses. I did a little digging and found out that the web browser he was using would ask to save this information from websites. I found this in the settings of the web browser and plain as day, an unsecure folder with an entire list of websites he visited with the user I.D. and password associated with it. I’m no Cyber security expert, If I can locate this, then the criminals won’t have any problem at all. In this folder I found 41 unique websites with all the credentials needed to log in to that website including the ones he was missing.

The fix.

Don’t save any login information in your web browser. I would recommend using a password manager as there are a number of good ones out there and a lot of them will offer a basic account for free. Adding a password manager is adding an extra layer of protection from getting your information stolen, putting your login information behind password protection.

Categories
Cyber news Cyber Security Technology

Is your router ready for an upgrade?

Categories
Cyber news Cyber Security Technology

Google has new tech to track your web browsing – here’s how to stop it

We’ve written on a number of occasions already this month that Google was launching a test of new technology in Google Chrome called FLoC, which stands for Federated Learning of Cohorts. It’s ostensibly meant to let Chrome improve the anonymity of users — which is something Google vowed to do a few weeks ago, via a movie to stop allowing advertisers to track users online with third-party cookies. However, Chrome will do this via FLoC while also still collecting some users’ browsing data for advertising purposes. What struck many people as particularly frustrating is that even though Google said it would test this as part of a limited pilot run before rolling it out fully, the search giant didn’t offer a straightforward way to opt out of the testing.

Categories
Cyber attack Cyber news Cyber Security Phishing Rasomware

As the filing date for tax returns in the United States approaches, IRS/tax scams are popping up

Each year many fall for these scams. The bad guy predate on the old, the young, anyone who may not have strong knowledge of the IRS and how it operates.

Here are just a few of the more popular scams/setups.

Any email from the IRS. The IRS does not email you.
Any phone call from the IRS. The IRS does not call you.
You are getting a refund / what is your tax refund status
False unemployment claims
Your SSN has been cancelled/suspended
You owe back taxes . Pay now or else.
Help by providing relief for this disaster
Please verify your information
Your Tax Transcript
You are a victim of Identity Theft.
Please verify your information.
You have committed a crime. Pay the fine.
Please verify your banking information
Etc. Hundreds more.

The National Cyber Warfare Foundation (https://cwr.dev) sees many alerts and notifications every year.

The IRS provides specific guidance on this issue. Read their web site post: https://lnkd.in/dSRY-Z3 the article also provides links on who to report scams/scammer to. #ncwf

Categories
Cyber attack Cyber news Cyber Security

What is a cyberattack?

If your employees don’t know how #cyberattacks occur, how will they be able to spot them? Here’s a great article that helps break down what happens during an attack, along with some of the most common threats to be aware of

A guide to the different methods cybercriminals use to harm computers and steal data

Cyberattacks are performed by malicious actors with various intentions, though the tools and methods they use are often the same.

  • A cyberattack is an assault on any computer or network, almost always launched from another computer or network.
  • There are a lot of ways malicious actors can launch a cyberattack, including malware, zero-day exploits, and denial-of-service attacks.
  • Here’s a brief overview of cyberattacks and what you need to know about their risk.
  • Visit Insider’s Tech Reference library for more stories.
Categories
Cyber news Cyber Security Technology

Dodge’s 2FA security update for muscle cars will slow thieves to a crawl

Putting a PIN on your Charger or Challenger limits anyone else to idle speed.

Autoblog points out the Security Mode update that the carmaker will soon make available to owners of 2015 or newer Charger and Challenger models equipped with large HEMI V-8 engines. It’s adding two-factor authentication, only instead of sending a push notification to your phone or generating a code, it’s a simple four-digit PIN. Combining something you know with something you have (your car key) is required to make the car unlock its full potential. With the security feature turned on, unless you input the code the engine won’t rev beyond idle speed (675 RPM) where it only has about 2.8 HP and 22 pound-feet of torque.

Categories
Cyber attack Cyber news Cyber Security

Differences Between a Vulnerability Assessment and a Penetration Test

Categories
Cyber news Cyber Security Technology

Use a privacy oriented search engine

Search engines are one of the primary resources used to spy on you. I personally know that search engines have been spying on people since the beginning.
There is a clear privacy leader for search engines: DuckDuckGo (https://duckduckgo.com)
This is a great search engine and they are privacy focused. This protects you online and greatly improves your privacy/cybersecurity posture.
You should switch all of your web browsers to use DuckDuckGo as your search engine. Including:

  • Your desktop
  • Your mobile devices

Switching is easy and it is never too late. You will start benefiting immediately.

Categories
Cyber news Cyber Security Technology

Improving the privacy and security of your web browser

We recommend the following extensions/plugins for you web browser.
uBlock – remove ads and trackers automatically be sure to use the one by Raymond Hill

uBlock Matrix – control exactly what is allowed to see your web activity via explicit authorization per web site. Be sure to use the one by Raymond HillDuck

Duck Go Privacy Essentials – protect your search history online, some ad/tracker blocking

Privacy Badger – block invisible trackers

Decentraleyes – alternative Content Delivery Network to prevent common code libraries from tracking where you go online.


Using these will greatly help protect you online. Nothing is a perfect answer to all the dangers in the Internet world, but this will get you very far down the road.

Categories
Cyber news Cyber Security Training

Home Router Security

Do you work from home and use your home internet to perform work?

How secure are you?

Today we’ll talk about the router.

Do you have a router? Do you know where it is? Have you dusted it off this year?

A router is a must have when it comes to working from home. A router can help to keep you secure when you’re on the internet both for home use or if you’re accessing work related documents or work computers.

If you’re shopping for a router what should you look for? There’s a lot of information out there and depending on the number of devices in your home can help to determine what you need in a router.

Do you have children that use the internet? Make sure that whatever you have or purchase for a router has a guest network capability. A guest network can help separate work and home functions that use the same router. If you want to keep your work more secure than make sure that this is happening in your house. By keeping leisure devices on a separate guest network, you ensure that your work devices are safer.

Do you have home automation, home security, Smart devices, Smart tv’s, Tablets, gaming systems or cell phones? Make sure that they all connect to the guest network. If a cyber criminal would compromise any of these items, they could potentially compromise your work computer if they’re on the same network.

Does your router have a firewall and is it enabled? A firewall adds an additional layer of security to your home network. Most home use routers have built in security capable of providing different services to help you secure your network. A good router will have the capability to block sites from accessing your network and your computers on that network. A good router will also have parental controls that will allow you to control what your children have access to.

If you already own a router, is it updated? Depending on the manufacturer, they will provide firmware updates for your router. Just because your router works doesn’t mean it’s secure. If you happen to own an off-name brand router and the company no longer supports that device, you should upgrade to a more up to date router to ensure that you’re as safe as you can be on the internet. Some routers will actually offer automatic updates, if this is available in your router, enable it.

Router password security: Whether you currently own or are planning to purchase a router, you should make sure that the administrator user i.d. and password are changed from the factory default. Some manufacturers aren’t really secure out of the box and use a default of admin for the user and admin for the password. This isn’t too tough for criminals to figure out and is usually their first attempt at breaking into your router.  Do the same thing for the Wi-Fi settings on your router. If a criminal is within Wi-Fi range they can log in and take over your router and any device attached. Change them and use a password that isn’t easily cracked. Repeat the process one more time for the guest network. When you name your Wi-Fi network and guest network (SSID) don’t use anything that will identify you or where you live.

Connecting to your router. If at all possible, connect using a cable versus the Wi-Fi, by connecting this way you eliminate one avenue of your computer becoming a victim.

VPN: Do you need a VPN? A Virtual Private Network (VPN) is a necessity if you’re working from home. Chances are that you’re connecting to work computers and work documents containing valuable information, sometimes personal data. By using a VPN you’ve just added an additional layer of security.  There are manufacturers that offer VPN services directly through your router and can be setup accordingly.

Hours of activity: One of the easiest ways to minimize your internet security risk is to turn it off. If at all possible, turn your router off during hours of non-use. If your router isn’t on, it can’t be compromised. If you don’t have a need for it to be on, turn it off. If you go on vacation and your router isn’t needed turn it off.

Take inventory, most newer routers offer a way to log into your router, view and manage the devices connecting to your router. Some routers will actually allow you to give each device a name so you can easily identify the devices connecting to your router. If you don’t recognize it, remove it.

Get into a routine of managing your router. You should get into a regular habit of logging into your router and view your settings to ensure that you haven’t been compromised.

Other details of what you should look for in a router. These items aren’t necessarily security items, but might make the difference in what you need in a router. Check to see if either the router you own or are about to purchase has MU-MIMO (Multiple User Multiple Input – Multiple Output) If you have more than one device that connects to the internet through your router you should have this feature. Without Mu-MIMO it’s like have a traffic cop at the top of the on-ramp letting cars go onto the freeway one at a time, with Mu-MIMO you can have multiples accessing at the same time. Do you or your family members stream videos or play online games? If this is the case, you’ll want to look at Maximum download speed of the router. Movies and video games need a fast router the faster the speed the better performance. This will also enhance how well you access remote networks for work as well.

Price: How much should a good router cost? Depending on your needs the price can vary. Just using the scenario of having a couple of laptops and a Smart tv connecting to router, an average price router should cost between $100- $200. Yes, you can spend more, but do you need it? If you don’t do online gaming then probably not. There a lot of nice options on the market and shopping can be intimidating if you don’t know what you’re looking for.

Hopefully this article has got you thinking about your router and security needs. This article isn’t intended to be the only answer to your router questions. The objective of this article was to get you thinking, not put you to sleep. If you have questions feel free to contact us at [email protected]

Below is a link to our checklist