phone – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Wed, 11 Sep 2024 17:30:19 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png phone – iDefend https://www.idefendhome.com 32 32 Smart Assistants are Getting a Little Too Smart https://www.idefendhome.com/blog/onlineprivacy/smartassistantsgettingtoosmart/ Wed, 11 Sep 2024 17:29:25 +0000 https://www.idefendhome.com/?p=7205 While extremely convenient, smart assistants like Alexa, Siri, and Google may be listening in, learning from, and sometimes even sharing our private conversations. Are these devices getting a bit too smart for their own good? Is it worth the risk of having one? We’ll help you decide.

The post Smart Assistants are Getting a Little Too Smart first appeared on iDefend.

]]>
pexels-jonathanborba-14309815
While extremely convenient, smart assistants like Alexa, Siri, and Google may be listening in, learning from, and sometimes even sharing our private conversations. Are these devices getting a bit too smart for their own good? Is it worth the risk of having one? We’ll help you decide.

In this article

Technology has come a long way, and these days is continually trending toward greater levels of convenience backed by greater levels of automation. By taking user input out of the equation as much as possible, large tech companies appeal to wider and wider audiences.

When it comes to a user’s personal privacy, that’s often an afterthought (if these companies even think of it at all), or an easily-filled pothole on the smooth road to convenience. In the case of smart listening devices, is it worth sacrificing your freedom and privacy for a slice of easy street?

What are Smart Assistants?

Digital assistants can be traced back to the PDAs of the late 90’s and early 00’s. There are likely many older and more experienced folks who would still recognize the name “Palm Pilot”. While many of these devices undoubtedly paved the way for modern smartphones, they are hardly related to the privacy-encroaching tendencies of the plastic rectangles we sport in our pockets today.

Smart listening technology interprets a user’s words into commands for the device to execute. Simply put, saying something as simple as “Set a three minute timer” will immediately start a countdown clock, and after an “Add spring rolls to my shopping cart”, you’ll find yourself ready to check out and cook dinner.

Examples of smart assistants

Yes, most likely your smartphone contains this smart listening technology. You may have never really utilized it, but even something as simple as text-to-speech is taking advantage of this tech. 

In recent years, this same technology has birthed a multitude of smart devices, each with the capability to listen and interpret your commands. The most common of these are what are sometimes called “Smart Assistants”. Popular brands of these devices include: Amazon Alexa, Google Home, Apple’s HomePod, and even something like Microsoft Copilot falls into the mix.

What are the Risks?

See if you’ve ever noticed something like this happen: you’re having a conversation with a friend about some obscure topic. Let’s say kayaks. The only other thing in range of hearing you is your phone. Later, when you’re browsing online, you start seeing ads for kayaks. You’ve never googled “kayaks for sale” or anything like that, and yet here you are suddenly seeing ads for them.

This is a prime example of how the tech on your phone was listening without your consent and influencing what ads were then served to you.

If this alarms you, just wait until you hear about all the things Alexas and their ilk get up to.

Data collection

One of the primary concerns with these devices is how they are constantly harvesting data on their users. Of course, they will claim that none of this makes it past them to advertisers or data miners, but do you really want to trust big tech companies on something like that? 

Another common phrase you’ll see is something akin to “Help us develop new features” or “Improve your user experience”. While you may see some of those benefits, it’s always going to be at your own expense. By agreeing to similar terms you are effectively signing away your privacy and allowing them free reign of your personal life.

What would you do if you got a knock on your door one day and outside is a man or woman with a camera, tape recorder, and notepad. They’ll ask if they can quietly sit in the corner of your family room or perched on your kitchen counter. All they ask is to allow you to take as many pictures, notes, and recordings as they please. “You won’t even notice I’m there,” they promise.

That’s almost exactly what you’re agreeing to by bringing a smart assistant into your home.

Security

Besides the privacy aspect, these devices will have to be hooked up to your wifi network in order to broadcast. This means that if the device was ever hacked or compromised, a cybercriminal now has access to the rest of your home.

On the flip side of that, say one of your other devices gets compromised. A savvy hacker may then be able to take control of your smart speaker, allowing them to harvest and sell everything it hears you say.

Scams

Yes, there are scams linked to using these devices. This one is perhaps one of the most devious of all in that it doesn’t really have anything to do with the actual security or integrity of the device itself. This one relies on scammers setting up fake support websites, phone numbers, and help desks.

Then, when you ask your device to look up a customer support line for your issue, the scammers have ranked their results high enough that it takes those as gospel and spits the info back at you.

A lot of users don’t think twice about the search results their digital assistant brings them, and will happily click on the first option.

How Can I Make My Device Safer?

So, let’s assume you’ve read everything to this point and you still want a smart assistant. Are you just going to have to toss your privacy to the wind?

Luckily, there are some things you can do.

1. Adjust the device’s settings

Each of these smart assistants will have settings (typically accessible via a mobile app) that allow you to disable certain features, limit what kinds of things it can harvest, and even set active hours or schedules.

It’s always worth taking a few minutes to poke around in the device’s settings before you’re ready to actually use it.

2. Secure the network

Depending on how you want the device to interact with your household, you should consider putting it on its own network, or at least segregating it from your more important devices such as personal computers. In this way, even if a hack occurs, you’ll have an extra layer of protection.

3. Unplug it

For physical devices, this is the best thing you can do. As long as the device is unplugged, there’s no way it can listen to you. Sometimes, you may want to just unplug it if you’d rather it not overhear something, or simply to give yourself a break. 

Just be sure to plug it back in when you’re ready to use it!

iDefend Can Help You With Your Smart Devices

Fortunately, iDefend members enjoy access to an expert support team who are always happy to help you lock down your home. With a simple phone call, they’ll be able to assess and develop an action plan to help you get your digital security and privacy up to snuff.

Learn more and get protected today! Try iDefend risk free and save 30%.

The post Smart Assistants are Getting a Little Too Smart first appeared on iDefend.

]]>
Easy Cyber-Safe Summer Travel Tips https://www.idefendhome.com/blog/onlineprivacy/summertraveltips/ Thu, 20 May 2021 18:21:43 +0000 https://www.idefendhome.com/?p=5852 Masks are coming off, holiday travel is opening up, and cyber criminals are ready to seize your personal information and your money as you try to escape. So, while you make your summer vacation plans, be sure you are cyber-safe while traveling and continue to stay protected after you return.

The post Easy Cyber-Safe Summer Travel Tips first appeared on iDefend.

]]>
AdobeStock_206919565-1024x683
Masks are coming off, holiday travel is opening up, and cyber criminals are ready to seize your personal information and your money as you try to escape. So, while you make your summer vacation plans, be sure you are cyber-safe while traveling and continue to stay protected after you return.

In this article

Identity theft and cybercrime continue to rise at epidemic levels, and with a care-free summer of travel and vacations coming, thieves have come up with new schemes and employed a series of cyber-attacks that are now being unleashed upon the unsuspecting public. Here are some of the most important things you can do to stay cyber-safe when you leave home and hit the road.

Tips for mobile devices

When we travel most of us use our mobile phones for nearly everything, such as maps, staying in touch with family and friends, travel reservations, etc. It’s important to remember that your mobile devices constantly send and receive data, and the information on your mobile device is often more valuable than your suitcase or wallet.

Here are a few things you can do to protect yourself by securing your mobile devices:

  • Update your devices: One of the most effective ways to stay cyber-safe is to continuously update your devices. Most updates contain critical security fixes to keep you protected.
  • Use strong passcodes/passwords: Lock your device with a long passcode of 6 or 8 numbers, or better yet with facial recognition. On laptops, a minimum of 8-12 character password is recommended using uppercase and lowercase letters, numbers and special characters.
  • Use caution with Bluetooth: Disable your Bluetooth networking while you are travelling to prevent unwanted connection attempts. When you pair your device with a car, your personal information is stored on the car’s system. It’s best to not pair devices with rental cars, but if you do, make sure you delete any stored data and remove your device from the rental car’s paired device list.
  • Keep track of your devices: Ensure that your devices are kept secure while in public places such as airports, hotels, and restaurants. Devices can be easily stolen, which allows access to very private and sensitive information.
  • Set up “find my phone”: Enabling this feature will allow you to find, remotely wipe data and/or disable the device if it gets into the wrong hands.
  • Make a backup before you go: It’s a smart idea to back up your device and your data files to another device or a cloud storage program service.

Tips when using public Wi-Fi

Using open public Wi-Fi at the airport, hotel or a cafe may be convenient, but public Wi-Fi networks and hotspots are not secure. Anyone using the same Wi-Fi connection can potentially see what you are doing on your device, making it an ideal location for hackers to find their next victim.

  • Ensure your device is set to ask permission before automatically connecting to a wireless network while you are traveling.
  • Only use secured Wi-Fi that requires login credentials and passwords.
  • Use the internet data from your cell phone. Create a Wi-Fi hotspot from your smartphone or consider using a trusted virtual private network (VPN) if you need a more secure connection.
  • Avoid logging into your personal accounts or making transactions while on public or hotel networks.

Tips for sharing on social media

Leave your travel plans off social media and consider posting photos and updates about your trip after your return. Opportunistic criminals that are tracking you on social media might see you are gone and attempt to break in and steal from your home.

Fraudsters may also attempt to contact your friends and family with various email and messaging scam tactics by posing as you and asking for emergency money to be able to get back home. Consider setting your social media accounts to only allow friends to view your posts and content.

Final tip

To reduce your worries and get some peace of mind while traveling, consider enrolling in a complete identity theft and cyber protection service such as iDefend. You should know who to contact on a moment’s notice if you ever have a cyber-safety problem.

Should you lose a wallet, your bank cards get hacked and money stolen, your phone or computer gets hacked, or your identity is stolen while you are away, it’s wise to have a world-class cyber protection service you can contact for immediate expert help. Otherwise, your wonderful vacation may end in a nightmare.

For help setting up your travel cyber-safety plan before you go, contact one of our friendly iDefend Advisors.

The post Easy Cyber-Safe Summer Travel Tips first appeared on iDefend.

]]>
Upgrade Your iPhone Security in 3 Quick Steps https://www.idefendhome.com/blog/devicesecurity/iossecurity3steps/ Thu, 18 Mar 2021 02:25:59 +0000 https://www.idefendhome.com/?p=5777 Your iPhone or iPad could be a gateway for security risks, identity theft, predators, and other cyber-threats to infiltrate your home and family.

The post Upgrade Your iPhone Security in 3 Quick Steps first appeared on iDefend.

]]>
pexels-pixabay-236086
Your iPhone or iPad could be a gateway for security risks, identity theft, predators, and other cyber-threats to infiltrate your home and family.

In this article

Apple’s premium devices have been around for years, and while their security is famous for being top-notch, there are still plenty of holes you can fill. Sometimes it can be overwhelming and you may not know where to start.

Don’t worry; we’ve got your back! This guide has three quick tips you can utilize to upgrade your security settings in minutes.

First, you’ll need to locate these settings:

Finding the Right Settings

Most likely, your device will allow you to do a search in the Settings. Swipe down from the top of Settings to find the magnifying glass symbol 🔎 (search bar), where you can type the keywords.

Tip: Try searching for things like: “system”, “update”, “software”, “version”, “lock screen”, “passcode”, etc.

Step 1: Download Updates

Ensure your device has downloaded the latest system updates. This is the strongest layer of protection you can have against malware.

Step 2: Screen Lock & Passcode

Having a screen lock, passcode, fingerprint lock, or facial ID will help keep your device physically secure—in case it is lost or stolen.

Step 3: Find my Device

Setting up this function allows you to locate your iPhone or iPad if you misplace it, as well as giving you control to lock-down or erase your personal data if the device is ever lost or stolen.

The post Upgrade Your iPhone Security in 3 Quick Steps first appeared on iDefend.

]]>
Upgrade Your Android Security in 3 Quick Steps https://www.idefendhome.com/blog/devicesecurity/3stepsandroidsecurity/ Wed, 17 Mar 2021 02:35:54 +0000 https://www.idefendhome.com/?p=5787 Your Android smartphone or tablet could be a gateway for security risks, identity theft, predators, and other cyber-threats to infiltrate your home and family.

The post Upgrade Your Android Security in 3 Quick Steps first appeared on iDefend.

]]>
pexels-luckysam-47261
Your Android smartphone or tablet could be a gateway for security risks, identity theft, predators, and other cyber-threats to infiltrate your home and family.

In this article

Android smart devices are the popular alternative to the Apple ecosystem, and millions of people worldwide use one of them as their daily driver. However, being open-source can open up these devices to a myriad of security concerns.

Don’t worry; we’ve got your back! This guide has three quick tips you can utilize to upgrade your security settings in minutes.

First, you’ll need to locate these settings:

Finding the Right Settings

Most likely, your device will allow you to do a search in the Settings. By typing keywords next to the magnifying glass symbol 🔎 (search bar), you can find almost any setting much quicker than digging through sub-menus for them.

Tip: Try searching for things like: “system”, “update”, “software”, “version”, “lock screen”, “passcode”, etc.

Step 1: Download Updates

Ensure your device has downloaded the latest system updates. This is the first and best layer of protection you have against malware.

Step 2: Screen Lock & Passcode

Having a screen lock, passcode, fingerprint lock, or facial ID will help keep your device physically secure in case it is lost or stolen.

Step 3: Antivirus & Security

Besides updates, the best thing you can do to keep your Android secure is to only download apps from within the Google Play Store.

The antivirus program, Google Play Protect, automatically scans your apps for any malware, including scanning anything on the Play Store as well. It is included for free with all modern Android devices.

To learn more about what Google Play Protect offers, and to dive deeper into Android security and maintenance, check out this article.

The post Upgrade Your Android Security in 3 Quick Steps first appeared on iDefend.

]]>
Google Plays Protect With Android App Security https://www.idefendhome.com/blog/devicesecurity/google-plays-protect-with-android-app-security/ Fri, 08 Jan 2021 22:02:17 +0000 https://www.idefendhome.com/?p=4980 If you've got an Android, chances are something has popped up from Google Play Protect. Is Google just playing around or is this feature any good?

The post Google Plays Protect With Android App Security first appeared on iDefend.

]]>
pexels-rubaitulazad-15549070
If you've got an Android, chances are something has popped up from Google Play Protect. Is Google just playing around or is this feature any good?

In this article

Google has long been a major player in the Android phone space. In the decade, they’ve even come out with their own devices, the Google Pixel line. Additionally, almost any app you download will be from the Play Store, another mark of Google’s Android influence.

Within the last couple years, their newest service, Play Protect, has bust onto the scene.

Google Play Protect?

If you’ve ever visited the Play Store to download an application on your android device, chances are you’ve run into Google Play Protect. It’s touted as a guarantee that the app you’re about to get is safe and secure, leaving you with a no-malware-here kind of feeling. As you may have already guessed, this is sadly not always the case.

It’s a layer of protection

Google Play Protect is only one initial layer of protection, but it’s more akin to a low, picket fence surrounding your home than a high cement wall. The truth is, the bad guys don’t just make a few iterations of malware and call it good—sitting back and watching their creations reap them a handsome living. They are constantly improving, changing, and innovating new ways to infect your devices. The once-venerated security of the Play Store is too-often overrated.

While it’s true that Google’s security services do catch a lot of the potential threats lurking on their platform, it’s unfortunately also true that plenty gets by, slipping through the fence slats as easily as an escaped puppy. If you’re not careful, you can easily and unknowingly infect your device simply by installing and running an app on your android device.

It’s still pretty good at what it does

This is not to say that Google’s built-in protection is not without its high points, as it regularly scans for and cleans up plenty of malware. Unfortunately, there’s only one Play Protect pitted against hundreds upon hundreds of malware developers, and that’s always going to be a one-sided battle.

How to Protect Yourself

As an Android user, you should never be relying on one piece of software to completely stop up the cracks.

Fortunately, there are precautions you can take to mitigate and even eliminate risk to yourself. It’s simpler than you think, and only takes a little extra effort to implement. 

Ready for a rapid-fire list? Here’s what we recommend:

List of our recommendations

  • Never install anything from outside the Google Play Store, and especially if it doesn’t have the Google Play Protect certificate.
  • Don’t install any apps without descriptions.
  • Only install applications that have a lot of reviews.
  • Before you download an app, look at the developer information. Look them up online if they’re unfamiliar. Have any doubts? Trust your gut and avoid the app.
  • Do some research; it only takes a few seconds to do an online search and find reviews about any program you’re thinking of downloading.
  • Be wary of in-app ads—they are a popular gateway for infections.
  • Always review the permissions (tap “more info”) you’ll be granting an application. If you don’t like what you see, don’t get it.
  • There are always going to be dozens or even hundreds of nearly-identical apps in function and purpose, so shop around a bit rather than defaulting to the top result.

Catch All That?

It might seem arduous at this point: following a giant checklist every time you need to download a new app onto your device. Of course, you don’t need to follow all (or any) of the steps listed above—they are not mandatory. Rather, think of them as additional precautions you can take to ensure your safety.

You might twist the deadbolt and lock the handle on your front door at night. Heck, you may even have one of those cool chain lock-things like in all the hotels and movies. The point is, each of these is an additional step you can take to add yet another insurance that your door is locked. Our recommendations listed above are just like that.

Note from the author: My personal hack

My personal hack is leaving the store page open after I’ve installed an app. I’ll switch over to try the new application out and if I notice anything out of place, an interface that doesn’t suit me, or any other potential problems, I’ll immediately swipe back over to the play store and uninstall the app all in the same breath.

Leaving the page open instead of immediately closing it is a great way to remind myself to do a little housekeeping.

Say, speaking of housekeeping…

Our Tips for Housekeeping

Regardless of how many of these steps you choose to follow, exercising some amount of additional caution is always beneficial when it comes to cybersecurity. If you have the time to take a few extra seconds or minutes, do it! Your future self will thank you.

You should also consider going through your device regularly. How often is regularly? That’s something you’ll need to determine. For many of us, it’s as often as we remember—which usually ends up being once every month (or three)—and that works great for us! 

The important thing is to find a system that works for you. The good news about iDefend is that we take the heavy-lifting and leave you to enjoy your life without having to worry about your devices.

Why Should I Check My Device?

Depending on how much time you have for your housekeeping session, you can do either a full, partial, or bare-minimum job. We’ll detail these in a moment, but before getting there we feel it’s important to stress the why behind this.

Humans are reactive

Going back to our ever-persistent house example, experts will recommend swapping out your air filters, clearing out the rain gutters, and changing the batteries in your smoke detectors regularly (there’s that word again). The truth is, most of us only do these things when we notice a problem: the furnace begins smoking, gobs of rain come sloshing down, and that timely “change my batteries” chirp barks out at three-in-the-morning.

We are reactive instead of proactive.

Cybersecurity starts small

It’s the same for cybersecurity. Most people will only download an antivirus when their computer starts slowing down, or only call their bank when they notice a fraudulent charge a week after it’s happened. As your cybersecurity experts, we strongly advocate for a proactive approach to your personal data online.

If you’re not getting regular cybersecurity checkups, you should be. The best time to do something is right now, and a free antivirus is a great place to start.

If you still aren’t sure where to start, contact one of our iDefend Advisors and we’ll help get you on track!

What Should I Check?

Again, this will depend on how much time you have, and how thorough you want to be. We’ll start at the bottom and work our way up to the top (which is what you should aim for).

Below, we’ve presented three versions of a checkup you can perform alone or with the help of an iDefend Advisor. Pick the one that suits your needs and timeframe and you’ll be well on your way.

The bare-minimum checkup

Okay, you don’t have a lot of time, we get it. You want to be in and out so you can get back to whatever it is you were doing before you read this article. Here’s what you should do:

  • Check if your device is up-to-date. You’ll find this in the Settings, and it will usually give you the option to postpone any updates since you probably don’t have time to install them right now. Just make sure you get them as soon as you can.
  • Scroll through the apps installed on your device. Remove anything you haven’t used in a while or don’t use at all. You’ll likely run into several built-in applications that you won’t be able to remove. Don’t worry about these.
  • Consider setting up a screen-lock or passcode to access the device. This can be done in Settings, and is a great way to add a powerful first-layer of protection.

 

That’s it. If you only have time to review a couple apps during this, that’s just fine; anything’s better than nothing. Still got some time? Keep reading.

The partial checkup

Now we’re getting somewhere. This one will probably take you about 5-10 minutes. In addition to checking everything in the bare-minimum version, you’ll want to:

  • Download and run a scan with an antivirus app from the Play Store. A free one is going to be just fine for this step. If you need some suggestions, check out our top picks. Feel free to remove the app afterwards if you want to reduce clutter.
  • Head into the Play Store and go to My Apps & Games. You can configure automatic app updates and even remove individual apps directly from here.

 

You’ve reached the conclusion of your mid-range effort. For most users, this level of checkup will be plenty to stay safe on your device. If, however, you’re a power-user or someone who has more time to kill, the full checkup is where you’ll find the satisfaction you’re seeking.

The full checkup

Here’s where the rubber meets the road. Investing a chunk of your time into your cybersecurity will pay off in spades, and this checkup will likely take close to 20 minutes. Follow everything from the previous two checkups and add the following:

  • While you’re in the My Apps & Games section, consider disabling automatic updates. This will require you to be a little more vigilant and exercise more caution than you would otherwise. Doing so, however, will allow you to prioritize keeping only the apps you regularly use up-to-date, and help you save space on your device, something critical for a smartphone.
  • Head over to your Settings and check out the App section. Perhaps the most valuable area in here is the App permissions breakdown. Using this, you can see exactly which apps have access to the various aspects of your device’s security. If you see any red flags here, remove the application in question.
  • Beyond this, we’d also recommend browsing through Settings. Though there aren’t really any more crucial things to look at, becoming more familiar with your device will empower you to feel safe and secure while using it.

 

There. That wasn’t so bad, was it?

Final Notes

When it comes to online privacy and security—including viruses, scam attempts, and identity theft—it’s not a matter of if, but when. Taking the time to proactively review your user-habits, scan your device, and perform a regular security checkup will arm you with the tools you need to take control of your cybersecurity.

If you need any help navigating these all-too-rocky seas, our friendly team is only a phone call away. Here’s to starting the new year off right by prioritizing your cybersecurity and empowering yourself for a new decade teeming with new technology. Thanks for joining us—it’s been a pleasure.

 

The post Google Plays Protect With Android App Security first appeared on iDefend.

]]>