Connect with us

internet safety

Mobile Device Security

Per FTC regulations we are required to disclose that “As an Amazon Associate I earn from qualifying purchases” and other programs at no extra cost to you. Please refer to our Affiliate Disclosure for more information.

Users may use their mobile devices to access email, the internet, GPS navigation, and a variety of other applications. Mobile security, however, has not kept pace with conventional computer security. Firewalls, antivirus, and encryption are used less commonly on web applications such as well as mobile devices.

What is the risk?

• Loss or robbery of equipment. Losing a computer to fail or rob could result in a loss of productivity, loss of data and possible liability under data protection legislation.

• Critical data loss. There can be sensitivity or confidentiality of certain electronic devices such as personal and video images, e-mails, text messages and files.

• Network penetration unauthorized. Since several mobile devices offer a variety of network communication options, secure corporate networks may potentially be attacked.

• Data that has been intercepted or compromised. There are always concerns that sensitive data may be intercepted via taped telephone line or intercepted microwave transmission as many business transactions take place via mobile devices.

• Software that is malicious. Traditional computers are familiar threats to viruses, trojan horses and worms. While mobile devices have not yet become a key goal, security experts are increasingly agreed that mobile devices are targeted.


• Consider the security features when selecting a mobile device and make sure they are enabled.

• Setup and update your smart computer with an anti-virus program.

Do not monitor your connections in emails or text message that are suspicious.

• Think carefully which data you would like to store on your computer.

• Pick and install software carefully.

• Keep physical control of the unit, particularly if you’re in a public or semi-public location.

• Disable non-use interfaces like Bluetooth, infrarot or Wi-Fi.

Wi-Fi networks can be used either with identified hotspots or only in trusted locations with secure Wi-Fi.

• Delete all data contained in a system until it is discarded.

• Do not “jailbreak” or “root” the phone.

Continue Reading

internet safety

Online Banking Safety Tips

Per FTC regulations we are required to disclose that “As an Amazon Associate I earn from qualifying purchases” and other programs at no extra cost to you. Please refer to our Affiliate Disclosure for more information.

Many consumers are now using online banking on a daily basis. It enables you to manage your assets, balance checks, move money, and online payment of accounts. Online banking is an easy way to access the services of your bank. Internet banking support banks take great steps to make sure your sensitive details, web-site protection and money are secure.

If you want to bank online, danger and threats are present, but user awareness will help keep them under control.

How does online banking work?

On your bank’s website or with an agent, you can register and chat with someone who is available by phone 24/7 for questions and who can help you with financial questions. You can issue a temporary PIN, which allows you to access your online banking system. This PIN can also be used online to sign up for the bank. If you sign into the website, your accounts will be listed.

The security link to the bank’s website should be made using SSL technology. SSL is basically the code used for encrypting and decrypting messages from your PC’s web browser to the network at the bank. You secure messages from reading when transferring them across the Internet by encrypting the data. The use of SSL is indicated in the web browser and at the end when you log in using your PIN it is always read https:// instead of http:// “s” search. In the corner of your screen or in the address bar, you can also see a padlock button.

What is the risk?

“Phishing” plans duplicate bank websites and require clients to log in to their accounts are one of the biggest threats. Others send email requesting confidential personal financial details, supposedly from the bank or its employees. The two of them also work in conjunction with an e-mail with a connection to a fake bank website. Both scams are designed to steal consumer IDs and passwords, which give a thief access to financial accounts for the person.

It is necessary to remember that your personal password or ID will never be sent to a bank or called by a bank.

Safety Tips

Pay attention to the web address in the browser window’s address box

Web addresses should always start with “https://” rather than “http.”

• Make sure the correct website address is linked.

• Be sure your browser does not show alerts on site.

• TO make sure the site corner shows the padlock in the bank before logging into the website.

• Maintain up to date anti-virus and anti-spyware applications.

• ALWAYS logout from a device in a public place, e.g. coffee shop

• Do not answer a warning message alleged to be from your bank.

Continue Reading

internet safety

Computer Firewall Safety

Per FTC regulations we are required to disclose that “As an Amazon Associate I earn from qualifying purchases” and other programs at no extra cost to you. Please refer to our Affiliate Disclosure for more information.

Computers today require a firewall as much as they need anti-virus apps. A firewall can be used to keep undesirable forces (viruses, spyware, etc.) from accessing your device. A personal firewall is a piece of software that regulates network traffic and from your PC based on a security policy. F or the information to be allowed on the network, it must have a passphrase and meet certain requirements that are defined by the network’s firewall rules

The firewall blocks it if the information is not allowed to enter. This helps to avoid harm caused by external attacks. Personal firewalls can also have some form of intrusion detection, allowing the program to terminate or block access where an intrusion is suspected.

Personal firewalls, along with anti-virus software and device patches, are essential components of computer protection and maintenance that every computer owner should recognize and use.

How is it working?

When access to the device is demanded (e.g. installing software or receiving emails), the firewall blocks the transmission of information and requests permission and/or clarification from the user. A link attempt would only be allowed if the security policy requires it, or if the user gives specific permission to do so.

Most Personal Firewalls need some kind of training before they are completely configured. This is because they need to understand what applications you are using and which programs you are connecting to the Internet. Generally, Personal Firewall pops up alarms when a program attempts to link to the Internet for the first time. You should be paying attention to these texts, and allowing only legal connections.

Firewall Criticisms

If the system has been infected by Malware, Spyware or similar software, these programs may also exploit the firewall since both programs are operating on the same system. It may be possible to circumvent or even shut down software firewalls in such a way. As a result, personal firewalls operate hand-in-hand with antivirus programs.

The high number of alerts created by such applications may desensitize users to alerts by warning users of behavior that may not be malicious. Always pay attention to the messages generated by your firewall. If in question, choose the action of ‘deny’ or ‘block.’

What am I supposed to look for in a Personal Firewall?

Some of the following common features should be provided by a Personal Firewall:

• Warn the user of unauthorized link attempts and automatically block such connections.
• Allows users to manage can programs may and cannot access the Internet • hide the machine from the Internet by failing to react to unsolicited network traffic • Monitor and regulate both incoming and outgoing Internet traffic and avoid unauthorized connections.
• Provide the user with details about a link attempt application • The firewall can provide an operation log to warn the user of attempted intrusions.

Top Tip

• A Personal Firewall suitable for most users is provided free of charge with Microsoft Windows. It’s turned on by chance. You can replace it with a more sophisticated commercial firewall on your desktop or add a hardware firewall if you wish.
• Commercial grade Personal firewalls also work well with other security devices such as anti-virus scanners.
• If you use a laptop, the Personal Firewall will secure you everywhere you are connected to the Internet.
• Never use two firewalls of software at the same time. Uninstall one completely before adding another one. Use the vendor uninstall utility or, if not usable, use the Windows XP add/remove program tool in the control panel.
• You may use a hardware firewall that includes a wired router, a wireless router or a Broadband gateway.
• Patches & Updates— Just check the website of the manufacturer for patches and updates once your firewall is installed. • Most importantly, pay attention to messages and alerts created by your firewall. If the Firewall has an automatic update feature, turn it on.

Continue Reading

internet safety

Password Security

Per FTC regulations we are required to disclose that “As an Amazon Associate I earn from qualifying purchases” and other programs at no extra cost to you. Please refer to our Affiliate Disclosure for more information.

Your identity is based on your passwords. Let’s be clear about something. It’s all about your identity when it comes to passwords. In our passwords, we have a tendency to expose ourselves. We sometimes choose the name or date of birth of a loved one; use an address, telephone or even a bank PIN number; use a favorite pop star, actor or team of football names. Some people are smart enough not to use personal references, instead opting for a phrase that is too short, a dictionary word, or a name or word spelled backward.

Passwords are used to gain access to a number of different computer services. You must have the magic word every time you connect; you must show you are who you say you are. If anyone else guesses or steals your password, they can impersonate you, giving them access to your files, e-mail, funds, sensitive information, and more. They might alter or delete your files, send threatening or insulting emails in your name, or force you to pay for unwanted services. As a result, one of the most critical cornerstones of information security is the security of your passwords. It cannot be overstated.

PINs (Personal Identification Numbers) (Personal Identity Numbers)

4 digit PINs are the standard method for accessing many of your financial transactions in Ireland. A simple four-digit PIN is needed for credit cards, debit cards (laser), Internet banking, your weekly lottery, and even mobile phones. Your transactions will be safe thanks to a few easy measures.

What is the process of creating a password?

A password is a type of secret authentication data used to limit access to a computer resource. Those that are not given access are kept in the dark about the password, and those who wish to obtain access are checked to see whether they know it and either granted or refused access accordingly.

Passwords have been used since the dawn of time. Sentries stationed at a specific location will ask for a password. They wouldn’t let someone in unless they knew the password. Passwords are now used to monitor access to secure computer operating systems, cell phones, and automated teller machines (ATMs), among other things. Passwords are needed for a variety of tasks by a normal computer user, including logging into accounts, downloading e-mail from servers, accessing files, databases, networks, and web pages, and even reading the morning newspaper online.

Symptoms or Warning Signs that your password has been compromised

• You’ve entered personal information, such as passwords and user names, on a website or responded to an email, but something doesn’t feel correct. Remember that legitimate businesses would never ask for your password or PIN.

• You receive reports about non-delivery or non-payment of products for which you have no responsibility.

• The bill for your credit card/laser card contains an unidentified object. Always double-check your claims.

• You can’t log into a website with your regular password, even if you’ve double- and triple-checked that you’ve entered the right user name and password. It’s possible that a suspect or malicious person has signed in under your name and changed your password.

• The message on your phone answering service has irritated your relatives. Your mobile phone, for example, has a normal default Pin that allows a legitimate or malicious individual to log into your message center and alter your message information. Adjust the default PIN that comes with your phone every time you use it.

What do you avoid doing?

Don’t use passwords that are too easy to guess.

Weak passwords should be avoided at all costs. This translates to:

• Use the Default password or no password at all.

• It will be simple to crack using a popular dictionary term.

• Something that is simple to figure out if you have any prior experience. For instance, favorite football team, birthday, name of spouse, and so on.

• Since “Password” is the most commonly used password, it’s a no-brainer to stop it.

• Never write down a password.

What does a Bad Password entail?

It’s never a good idea to use a password that’s easy to guess.

Anfield – Trafford – Croke Park

Pool – Dubs – the cats – Man Utd.

Pairc a Crocaigh, Gaillimh, Atha Cliath

Uncle Jack – Aunty Phil – Granny Mary

KatieJan04 was born on May 1, 1956, and died on January 2, 2007. (or variations thereof)

Sophia Loren, Paul Newman, and Brad Pitt, to name a few.

PINs (Personal Identification Numbers)

1111, 1234, 6789 1189, 1111

• Never use the same PIN, or your phone or PDA, you got when opening the account.

• Should you never use the same PIN on every account, credit card, phone, laser and so on?

• Never type or hold your PIN in your bag or diary?

• Make sure you don’t easily guess if you decide on a password.

• Changing your password instantly if you think someone else may know your password.

• When you type your password, make sure nobody is near you. When entering it in an ATM or a store, keep your PIN.

• Never let someone else know about your passwords.

• If others can see what you are typing, don’t enter your password or pin. Recall the most harm is caused by a malicious user with a legitimate password.

• For various services and accounts, use various passwords. They have, in particular, a unique banking password.

• Periodically modify your passwords.

• None of login recycle (e.g. password2, password3).

• Do not write down passwords.

• NEVER send in or disclose your password on the phone. No respectable company’s going to ask you to.

What’s a nice password, then? It is a good choice to have a poem line or a song line. Join a punctuation character of two unrelated words. Substitute numbers for vowels.

Some examples are presented here.

• Table3&Cha1r; or Table3&Size1m3

Use the word “I am married with two children John and Mary” that is unique to you. Easy to remember, impossible to guess. • Use a phrase unique to you.

• Is 7 characters tall, or at least. It is harder to guess or to break longer passwords.

• Contains a mix of letters, numbers and symptoms (i.e. ! @) from the top to the bottom $% & $%?).

• Bear in mind that, as you fly, it can be difficult to enter some of these punctuation marks on international keyboards.

• Regularly change your password.

Continue Reading


Skip to content