Privacy – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Sun, 25 Aug 2024 00:44:58 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png Privacy – iDefend https://www.idefendhome.com 32 32 5 Things to Know Before Installing Smart Cameras https://www.idefendhome.com/blog/devicesecurity/5thingsaboutsmartcameras/ Tue, 06 Aug 2024 21:29:58 +0000 https://www.idefendhome.com/?p=6864 Adding smart cameras to your home can increase your security and safety, but they are not without their risks and concerns. Here are a few things to know before you buy some.

The post 5 Things to Know Before Installing Smart Cameras first appeared on iDefend.

]]>
pexels-introspectivedsgn-7635126
Adding smart cameras to your home can increase your security and safety, but they are not without their risks and concerns. Here are a few things to know before you buy some.

In this article

A popular addition to many smart homes, security cameras that connect to an app on your phone are an important part of many homeowner’s day-to-day security. These devices are relatively simple to install, quick to get online, and then easy to access whenever you need them.

The problems begin to arise when you get into using them without considering some basics first. To help you out, we’ve put together a few tips for you to consider before taking the plunge and decide if smart cameras are right for your family.

Be Aware of Local Laws

Depending on the area in which you live, you might have to fill out some additional forms, or even pay certain fees before you can install security cameras on your home.

The good news is that in most US States, recording in public areas (i.e. the street) is perfectly acceptable. It’s also worth noting that if your camera is recording sound alongside video then it could complicate things for you.

Be sure to double check your local regulations and you should be good. A quick internet search is likely all that you’ll need to perform anyway.

Discuss Plans With Your Family

If you’re going to be adding cameras to your home, be sure to talk with the other people living there. Chances are, everyone would like to know where and when these devices will be recording.

Another thing to consider is guests and others visiting your home. If you’re going to be recording mostly innocuous footage then no big deal. However, if you’re going to have them in less-conspicuous locations it may be courteous to explain to regular friends and visiting family what to expect.

Choose Smart Locations

For external cameras

Perhaps one of the most important aspect of smart cameras is their placement. If you’re using them primarily for home security and surveillance, then positioning them with a good view of all the major entrances to your property is a good idea.

Another angle of security is visibility. Sometimes you’ll want the cameras to be out in the open to deter any would-be wrongdoers. At the same time, there are cases where keeping the devices more discreet will be what you’re after.

A final use for external cameras are doorbell or front door cameras. These are most useful for package drop off and delivery, and can also stop “porch pirates” from making off with your latest Amazon order.

For internal cameras

Cameras inside your home require much more careful consideration where they are placed. Avoiding private areas should go without saying, but there are still some useful areas for the devices.

A popular use for internal cameras are in you children’s rooms such as toddlers or babies. This allows the parents to keep an eye (or ear) on their kids via an app on their phone. This can be wonderful when you want to check in on how they’re doing.

Another common area is the kitchen or living room, areas that typically command a wide view of the home. This can give you increased peace of mind while you’re away, or allow you to keep an eye on housekeepers or pets while on vacation.

Maintenance

Maintaining your cameras, could include things such as: lens cleaning, trimming tree limbs, sweeping up cobwebs, etc. Removing physical obstructions will be crucial for your camera’s functionality and lifespan. If it’s going to be exposed to the weather, make sure it’s a kind designed for heavy outdoor usage.

Storing and deleting footage

You should also keep in mind that the footage your camera collects will need to be stored somewhere. Some models will opt for on-board storage. This physical memory will either need to be downloaded or actually taken out of the camera if it’s a memory card.

If your camera connects to the cloud, then you will only need to worry about the space you’re paying for there.

In both cases, it’s often not worth your time or money to keep really old footage. Unless it’s got some evidence of a crime, or something valuable to you, you’re better off cleaning out old data regularly to ensure your camera has plenty of room to continue recording.

Know the Safety and Privacy Risks

By far the biggest concern with cameras is their proximity to sensitive data. In this case, the data is you and your family, as well as anyone else entering your home.

Regardless of whether the smart camera can record either video, audio, or both, the moment a hacker gets into your system, they could suddenly have all of this data at their fingertips. 

This is where internal cameras are especially risky as they post the greatest access to this type of data. If you’ve got smart cameras inside your home, make sure they are locked down!

Ensure you have strong network security

Wherever you have the data stored, make sure it’s safe. On top of that, if your camera is connected to your home network, make sure you’ve got a strong password, firewall, and have shorn up any access points. This will make it more difficult for a hacker to get inside.

It’s also probably worth your time to have an expert check out your system and review your network security. iDefend Advisors are trained to assist with network security threats and are an excellent resource for you in this area.

The post 5 Things to Know Before Installing Smart Cameras first appeared on iDefend.

]]>
Amid privacy concerns, Apple’s new AI is coming soon to an iPhone near you. https://www.idefendhome.com/blog/onlineprivacy/openaiapple/ Fri, 14 Jun 2024 17:02:46 +0000 https://www.idefendhome.com/?p=4742 Your next iPhone may know more about you than you do. What is Apple's new AI capable of, and how does Apple reassure its customers that their private life is safe and secure?

The post Amid privacy concerns, Apple’s new AI is coming soon to an iPhone near you. first appeared on iDefend.

]]>
appleai
Your next iPhone may know more about you than you do. What is Apple's new AI capable of, and how does Apple reassure its customers that their private life is safe and secure?

In this article

Artificial intelligence (AI) has taken the tech world by storm. With Microsoft, Google, Amazon, Facebook, Snapchat, and others all integrating a form of AI into their systems, Apple found themselves lagging behind. Now, with Apple’s recent AI announcement, they’ve officially entered the race in a big way. Apple’s home-grown AI, it’s partnership with OpenAI, and its integration with Apple iPhones, computers and other devices is groundbreaking. But it also gives rise to massive personal privacy concerns.

What is Apple’s AI capable of, and how does Apple reassure its customers that their private information is safe and secure? While security and privacy have always been a selling point for Apple products, what will they do with unprecedented access to an unlimited flow of surveillance and collection of personal information from the devices you use every day?

Your privacy… going, going, gone?

Apple promotes its new AI (called Apple Intelligence) as “personal intelligence built into your devices to help you write, express yourself, and get things done effortlessly, every day. All while setting a brand-new standard for privacy in AI.” It’s the first real application of AI as a personal assistant – built into devices you use every day. Naturally, and rightly so, watchdogs for personal privacy and security are alarmed at the risks with this emerging technology.

The cause for concern with the new Apple Intelligence is not just the amount of detail they will learn about you, but who has access to that data. Your phone, and Apple, will potentially know more about you than you do.

Apple Intelligence will be able to scan and interpret all your photos, making it easy to find a photo of concert tickets, driver’s license, recipes, and vacation spots with a simple request. It will be able to identify and recognize your children, spouse, and friends in your photos along with their role in your life. There are concerns about access to photos, videos, and voice where deep-fake videos and voice cloning have popped up across social media and are now used by scammers and online predators.

Siri will be supercharged due to the power OpenAI utilizes. With personal context and access to everyday life activities, Siri will use OpenAI to access calendar events, messages, and other apps to pull together information for your benefit. If you have an appointment for a meeting in the office, and then a piano recital for your daughter an hour after, Siri will plan each out accordingly and access Apple Maps to notify you when you need to leave to get to your next event on time.

If you ask when your mom’s flight is going to land, Siri will pull up the information and notify you exactly when the flight takes off and lands with the information gathered in the email. Then Siri can remind you when it is time to leave to pick her up while also taking live traffic into account. If you forgot what dinner plans you made with your mom, Siri will access your messages and pull up the text to remind you of where and when the dinner reservation is taking place.

As useful as the tools will be, the obvious question here is, if the AI can see and interpret your photos, emails, texts, calendars, and everything else, who has access to all your private information and daily activity? Can you trust them – or the other companies they affiliate with such as OpenAI? Will the government be able to get access to all this data anytime they want?

Clearly, questions about security and privacy remain. We are literally hitting just the tip of the iceberg with what Apple Intelligence will learn about us, and what it will do for us.

Voices of concern

Some of the benefits of this AI integration into your personal life might sound pretty good right now, but there is always a cost associated with such groundbreaking technology. If you’re worried about your privacy and security, you’re not alone. In fact most of the tech world is voicing their concerns about this Apple-AI integration.

Elon Musk has openly stated, “It’s patently absurd that Apple isn’t smart enough to make their own AI yet is somehow capable of ensuring that OpenAI will protect your security and privacy! Apple has no clue what’s actually going on once they hand your data over to Open AI. They’re selling you down the river.” Musk has also gone so far as to consider a ban of Apple devices from his businesses as a security measure with the announced Apple-OpenAI partnership.

Musk voiced concern that Microsoft, which owns half of OpenAI, has disbanded its ethics oversight division. “There is no regulatory oversight of AI, which is a major problem. I’ve been calling for AI safety regulation for over a decade!” Regulation may be the only hope of keeping our information private, but with AI being so new to our world, that may be years out. Of course, it’s highly likely government regulators won’t fully understand this and may cause more harm than good.

Sam Altman, CEO of OpenAI, stated that AI is, “the greatest technology humanity has yet developed” and this uncharted territory is thrilling yet should be carefully walked. Altman continued, “I’m particularly worried that these models could be used for large-scale disinformation. I think people should be happy that we are a little bit scared of this.”

Apple says its AI will “usher in a new era of privacy”. The company says it will ask you for permission to use your private data before both Apple and OpenAI will have access to it, but once you give permission, your information is fair game. Apple claims that data from Apple Intelligence will “mostly stay on your device itself. If it needs to go to the cloud (and access ChatGPT), it will be on Apple’s secure server, not stored by OpenAI.”

Security professionals will be watching closely to see how this and other concerns will play out.

Recommendations

Apple Intelligence is deeply integrated into iOS 18, iPadOS 18, and macOS Sequoia that is due to be released in Fall 2024. It will only be available on iPhone 15 Pro, iPhone 15 Pro Max, and newer iPhone models, plus iPad and Mac computers with M1 and later.

At this point, consider waiting to upgrade to iOS 18 with Apple Intelligence (If you have an iPhone 15 or newer). If you end up having to buy a new iPhone, you may want to consider buying an older model. If you must have the newest iPhone when it’s released later this year, or next year, consider turning off specific Apple Intelligence features you aren’t comfortable with, or disable it altogether.

For the next couple of years while all this new AI technology unfolds, be cautious and don’t give up your privacy rights. Realize that AI is not going away, and that all smart devices including Android will eventually have built-in AI. Be careful about giving Apple or any other tech company permission to use AI to monitor, track, and use you or your family’s personal information.

Whether we like it or not, AI will increasingly play a larger role in our lives. As it unfolds, we must continue to do everything we can to protect our privacy, our freedom, and not allow big tech or government to access, monitor, or control our digital lives.

 

Protecting your family’s online privacy is critical – iDefend can help

Everyone needs a personalized protection and support service for the digital age. iDefend protects your online privacy from data traffickers, scammers, predators, and unwanted surveillance.

Learn more and get protected today with iDefend. Try it risk free and save 30%.

The post Amid privacy concerns, Apple’s new AI is coming soon to an iPhone near you. first appeared on iDefend.

]]>
Big Tech Companies Will Never Call You Directly https://www.idefendhome.com/blog/identityandfinancial/bigtechwillnevercallyou/ Wed, 08 May 2024 22:45:01 +0000 https://www.idefendhome.com/?p=5660 If the guy on the phone tells you he's from Microsoft, he's lying.

The post Big Tech Companies Will Never Call You Directly first appeared on iDefend.

]]>
pexels-moose-photos-170195-1587014
If the guy on the phone tells you he's from Microsoft, he's lying.

In this article

When your phone number is exposed online, you can expect multiple sources to begin calling you in an attempt to compromise personal information. With that comes the danger of random people impersonating companies and services in order to try trick you into giving out personal information.

One of the Most Common Phone Scams

Recently there has been an uptick in phone calls in regards to people calling out and impersonating well-known tech companies and services to gain your trust and allow them to connect onto your computer in order to “fix” the issues. This has become a much higher threat recently, including people claiming they are Apple or Microsoft, even providing realistic-looking identification numbers and saying that their techs have noticed suspicious activity on your computer.

But they say it will be so easy!

At that point, they will explain how your computer has been hacked, but how they can resolve the issue with a swift cleaning. Once you allow them into your computer, they can show you a number of fake sources to appear that there are much more serious problems while also stealing your personal information that is stored on your computer. These threats can appear legitimate and believable, but never allow them onto your computer.

Erroneous credit card charges

Another way they will try to compromise your information would be to inform you that there was a high cost charge on your card, and asking if you were the one who made the purchase. You’ll say no, and they will inform you of the fraud and ask to connect to your computer to show you where it happened and how to resolve it. The tricky thing here is, is that they attempt to use scare tactics to cause you to jump to action. The charge is fake, never existed, but because they said it was a $350 charge, and that they can help you fix it, it’s easy to allow them in.

What You Can Do

The best action to take at this point is to hang up and verify the information on your own. If it is a major corporation, find their direct number and reach out. If it was a legitimate problem, they will have a record of the outgoing call and assist you from there. If not, then you dodged a bigger issue here.

Otherwise, consider taking advantage of iDefend’s unlimited tech support service which can clean and discover any threats, if any, and ensure everything is in order.

Remember: big companies will never call you directly

It’s also worth noting that companies such as Microsoft, Apple, etc. will never call you directly about things like this. Think about it: they have millions (if not billions) of customers. There is no way they could have active monitoring on every single computer and call that person when they “discover” a threat. It’s just not realistic or feasible for these companies to do this, so don’t fall for it.

Compromised phone numbers are common

Also important to remember here is that having a compromised phone number is not itself a serious threat, and is actually pretty common. The risk comes, however, from the information you give out over the phone as this can quickly grow into a real problem. They can be asking for something as simple as confirming credit card information for a billing issue before your package ships or as serious as a person impersonating your bank asking you to give out your social security number. Always be wary of people asking for this information over the phone.

Monitor your information

Having your information monitored through an identity theft monitoring system can better inform you when your number is compromised. Remember, you are the greatest protector of your information. The spam calls will cease over time. Your private information is invaluable and nearly impossible to recover once you’ve given it out. Still, with the proper protection and safety measures set up, you can find that peace of mind.

The post Big Tech Companies Will Never Call You Directly first appeared on iDefend.

]]>
Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes https://www.idefendhome.com/blog/familysafety/snapchatai/ Mon, 22 Apr 2024 20:39:02 +0000 https://www.idefendhome.com/?p=5618 Snapchat, known for its disappearing messages and creative filters, has evolved over the years to slowly incorporate advanced AI features.

The post Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes first appeared on iDefend.

]]>
pexels-shvets-production-7194009
Snapchat, known for its disappearing messages and creative filters, has evolved over the years to slowly incorporate advanced AI features.

In this article

In the digital landscape of today, social media platforms have become integral parts of our daily lives. While these innovations offer convenience and entertainment, they also raise significant concerns, especially when it comes to the safety and well-being of teenagers.

Among these concerns is the omnipresence of Snapchat’s AI, which can be accessed at any time, and the potential dangers it might pose.

Chatbot

One of the most striking aspects of Snapchat’s AI is its chatbot, an interactive feature that allows users to ask questions, seek advice, and engage in conversations. For teenagers, this seemingly harmless function can present a myriad of risks. The allure of a “digital friend” that is always available to chat might lead teens to seek guidance from the AI on sensitive or personal matters.

Whether it’s questions about relationships and sex, mental health, or even more troubling subjects like self-harm, the AI provides immediate answers without the nuance and empathy of a human response.

Teenagers are impressionable

The danger here lies in the misconception that this AI is a reliable source of information and support. Teenagers, who are still developing their critical thinking skills, might take the AI’s responses at face value without questioning its accuracy or understanding its limitations. This can lead to misinformation, misguided decisions, and a lack of human connection when they might need it most.

Privacy Concerns

Furthermore, the constant presence of the Snapchat AI raises privacy concerns. Every interaction with the chatbot is recorded and stored, contributing to the vast data pool that fuels Snapchat’s algorithms.

This data can be used to create targeted advertisements, personalize user experiences, and even predict behaviors. For teenagers, whose online behaviors are still evolving, this data collection can have long-lasting consequences.

You Can’t Remove It

Another alarming aspect is the inability to remove the AI from the app. Unlike traditional chatbots or apps where users can opt out or disable features, Snapchat’s AI is deeply integrated into the platform. The only way to remove it is by subscribing to Snapchat+, the premium version of the app.

This creates a dilemma for parents and teens alike. As a parent, if you don’t want your child to interact with the AI, there is no way to actually hide or get rid of it, giving your child unlimited access.

What to Do as a Parent

As parents navigate the complexities of raising teens in the digital age, understanding these dangers is crucial. Initiating conversations about online safety, critical thinking, and the limitations of AI can empower teens to make informed decisions. Encouraging them to seek human support when needed, whether from trusted adults or professional resources, can provide a balance to the allure of the always-available AI friend.

While Snapchat’s AI offers convenience and entertainment, its potential dangers should not be underestimated. From providing questionable advice to collecting vast amounts of personal data, the implications for teenagers are significant. As we move forward in this digital era, it is essential for parents, educators, and society as a whole to remain vigilant, informed, and proactive in safeguarding the well-being of our teens in the digital realm.

The post Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes first appeared on iDefend.

]]>
The Top 3 Settings to Check on Facebook for Better Online Privacy and Security https://www.idefendhome.com/blog/onlineprivacy/top3facebookprivacysettings/ Sun, 01 Oct 2023 20:05:22 +0000 https://www.idefendhome.com/?p=5727 Facebook is a great place to communicate, share, and reconnect with friends. It is not without its drawbacks, however. One of the biggest things that goes unnoticed is how much of your personal data and identifying information the platform takes about you.

The post The Top 3 Settings to Check on Facebook for Better Online Privacy and Security first appeared on iDefend.

]]>
pexels-andersonguerra-1138735
Facebook is a great place to communicate, share, and reconnect with friends. It is not without its drawbacks, however. One of the biggest things that goes unnoticed is how much of your personal data and identifying information the platform takes about you.

In this article

Facebook (FB) is still one of the most popular social media networks in the world with some sources pointing at over 2.9 billion monthly active users! If you’ve found yourself afloat in this deep-blue sea of social fish, you might now be aware of just how much the platform and its parent company Meta take advantage of your personal information.

We’ve laid out a list of settings you can look for, to help you take control of your privacy on FB. Keep in mind that some of these may change slightly as FB updates their website, but if you have any questions, just contact our support team.

Top 3 settings to check

Once you are logged into your FB account, simply click on your profile and select “Settings”. From there, navigate to each of the following settings. Refer to this guide for our recommendations, or feel free to choose what best matches your needs and preferences.

1. Security and Login

We recommend taking a look at the following sections while you are here:

Where you are logged in

This is perhaps the most important option for you to check, since it shows any device you’ve logged into your FB account from before. Our recommendation would be to sign out of everything, and then sign back into only the devices you actually use and have access to.

Two-factor authentication

This is a recommended security feature on any website where you have sensitive data stored. Turning this on will mean logging in is slightly more inconvenient, but makes it incredibly difficult for anyone to hack into your account, as they’d also need access to whatever you set as your second factor.

Authorized logins

Any device listed here has required you to set up two-factor authentication on it.

Choose 3 to 5 friends to contact if you get locked out

This can be a good option if you are ever locked out of your account. Whoever you designate here can help you recover the login information.

2. Privacy, Timeline and Tagging, Stories, Location, Blocking

There are numerous settings here that allow you to personalize these settings to your liking. There is no “right” way to do this since it’s all up to your personal preference. We recommend reading through these and familiarizing yourself with what kind of information you may be unknowingly sharing.

3. Apps and Websites

This section may surprise you, but don’t panic. It will list any site or app that you have ever allowed permission to use your account details. For example, if an app ever asks you to “Sign in with Facebook”, it will show up here.

We recommend revoking access to anything you don’t use or recognize.

What else can I do?

iDefend offers many services, including a robust arm aimed directly at supporting parents, improving online privacy, and general safety and best practices with social media. It also features social media monitoring services which will automatically notify you when it flags certain suspicious activities on your accounts.

In addition to Facebook, this also works for several other popular platforms. For more information, reach out to one of our iDefend Advisors.

The post The Top 3 Settings to Check on Facebook for Better Online Privacy and Security first appeared on iDefend.

]]>
8 Essentials for Securing Your Smart Home and Protecting Your Privacy https://www.idefendhome.com/blog/devicesecurity/8smarthomeessentials/ Thu, 15 Sep 2022 21:19:26 +0000 https://www.idefendhome.com/?p=4970 As you introduce more internet connected smart devices into your home and turn it into a “smart” home, you’re also likely making it an “insecure” home.

The post 8 Essentials for Securing Your Smart Home and Protecting Your Privacy first appeared on iDefend.

]]>
smart-home-cybersecurity
As you introduce more internet connected smart devices into your home and turn it into a “smart” home, you’re also likely making it an “insecure” home.

In this article

Each smart device is a digital entry point to your personal life and your home network. They capture and hold a treasure trove of personal information like your birth date, entertainment habits, medical needs, energy use, diet and sleep patterns, and even crazy things like the layout of your home.

If you own internet-connected devices such as: smart speakers, TVs, thermostats, fridges, security cameras, doorbells, door locks, robot vacuums, etc., your privacy and security is at stake.

What’s the Risk?

In a best-case scenario, the companies behind these data gathering devices will use the information they collect to launch targeted marketing campaigns at you and sell you more stuff. Or perhaps just sell your consumer profile to the highest bidder.

Your home will be vulnerable to hackers

In a worst-case scenario, predators will hack your home network, steal your identity and money from your online bank accounts, or hijack your home security and camera systems to watch you, assault you or burglarize you. Scary, right? Even if you’ve given up on fighting for your privacy, this possibility should wake you up.

How to Secure Your Smart Home

Bottom line, if you’re investing money in the coolest new technology and making yourself a smart home, you must also invest some time, energy, and resources to protect it.

Here are eight ways to re-enforce your home cyber defenses.

1. Secure Your Wi-Fi Router

Your Wi-Fi router is the doorway to your smart home. Creating a safer smart home starts with your router. It’s what connects all your IoT devices and makes them so valuable. Here’s what you can do to set up a secure Wi-Fi router:

  • Change the router’s default name. Don’t stick with your router’s default name, which is usually its make and model. Change it to an unusual name that’s not associated with you or your address. Don’t give away any personal identifiers.
  • Set a strong Wi-Fi password. Set the router’s password to something truly unique. Use complex passwords made up of letters, numbers, and symbols. The longer the better.
  • Use the Highest Level of Encryption. Set your router’s encryption level to the highest level possible (WPA3 is best, but WPA2 is fine).

 

2. Create Separate Wi-Fi Networks

Create a separate Wi-Fi login on your router for your “smart home network”. This is what you connect all your IoT (Internet of Things) devices to, and it’s separate from your primary home Wi-Fi login for your computers and phones.

This means relatives, friends and other guests are not logging into your smart home network, and it’s only accessible by you. If you work from home, you may want to consider creating yet another “work” network login to keep your work separate from everything else.

3. Turn Off Listening Modes

Do you ever feel like someone is eavesdropping on you? If you own a smart speaker or smart phone, your concern is valid. They’re pretty much always listening.

Nearly all voice-activated technology uses microphones that listen for key words and vocal cues. Companies like Apple, Facebook and Google hear all your commands and can potentially pick up conversations if your device thinks it hears a key word. This also true for many smart TVs and a variety of other devices with voice activation and camera features.

If you want to take control of your privacy and keep conversations “behind closed doors,” turn off smart speakers when not in use, and change your phone’s privacy settings to turn off your microphone for everything but phone calls and voice-to-text features.

With your devices no longer listening, you can relax and feel a bit less paranoid about using your tech. You can always turn the microphones back on again if you want to use them. Just make sure you’re careful about what you say when they’re on — and don’t forget to turn them off when you’re finished.

4. Protect Your Home Security System

As crazy as it sounds, an insecure home alarm device can be a major security risk to you and your family! A hacked security system could give predators permission to use or disable your cameras, unlock doors to let a burglar in, or even lock you out of your own home.

Be sure to connect your home alarm system to your segregated smart home Wi-Fi network. Also be sure your security hardware (cameras, locks and panel) stays updated and patched by the manufacturer.

5. Disable Features You Don’t Use

Many IoT devices give you the ability to control them from anywhere with your smart phone. But if you only use your smart home devices when you are home, consider disabling remote access. Likewise, some devices such as smart speakers have Bluetooth connectivity in addition to Wi-Fi. If you don’t use the Bluetooth feature, turn it off.

Smart TVs come with voice control, but this feature often goes unused. It may sound paranoid but an active mic on a TV, if hacked, can also be used to pry on your conversations. Disabling features you don’t use is all about blocking as many entry points as possible.

6. Use Authorized Apps Only

Many smart devices allow homeowners to remotely turn on and off lights, turn on ovens, or open and close garage doors by integrating third-party mobile apps. But apps without secure authorization may allow people other than you to impersonate you and operate your devices if they get their hands on your phone.

Fake or unauthorized apps can be used by hackers to compromise your smart phone, potentially giving them the ability to do things like remotely lock and unlock your front door. Use only authorized apps and platforms to control your smart devices.

7. Keep Your Devices Updated

Smart devices need to be kept updated as the manufacturer releases fixes for security flaws over time. Outdated software and firmware on devices can make it easier for cyber criminals to exploit them.

The best way to protect your devices is to buy from reputable brands that make security a top priority, and where possible set them to update automatically when new software is available. This way, you’ll have the latest security patches that close known loopholes, minimize the risk of malware infections, and keep your smart home running smoothly and safely.

Your home Wi-Fi router and some smart devices may not automatically update. So be sure to do a manual check a few times a year on these devices and install any pending updates.

8. Enable Multi-Factor Authentication (MFA)

Multi-factor authentication is an added layer of security requiring a second form of validation or proof that it’s really you logging into your device. You see this commonly with a one-time pin or verification code sent to your phone or email that you must enter to confirm you are authorized to login.

Most smart devices have the multi-factor authentication feature available by default. Be sure to enable this where you can. For devices that don’t have this feature built into their apps, see if you can enable two-factor authentication (2FA) by using third-party apps such as Google Authenticator.

Take Charge of Your Smart Home

You can purchase the most expensive Wi-Fi routers and smart devices from top brands and yet, at the end of the day, your personal and home cyber defense is in your hands.

Performing a device inventory

Take inventory of what devices you have right now that connect to your home Wi-Fi. If you have old devices that are not receiving security updates and patches from the manufacturer, consider replacing them with newer technology. Do a factory reset on old devices before giving them away.

Choose devices with adjustable privacy settings

Carefully look for smart devices where you are in control of your privacy and security. Be sure you can enable full privacy settings and turn off mics and cameras easily. Or consider whether there are good alternatives for devices that don’t connect to the internet and your home network.

Using the recommendations here as a starting point you can take action now to better protect yourself and your loved ones.

Getting Expert Help

If you don’t have the time or would rather have trusted experts help you maintain a safe and private smart home, you can subscribe to a personal and home cyber protection service such as iDefend that provides you with a complete protection plan for a surprisingly low cost.

The post 8 Essentials for Securing Your Smart Home and Protecting Your Privacy first appeared on iDefend.

]]>
What to Expect (and to Not Expect) From Using a VPN https://www.idefendhome.com/blog/devicesecurity/expectornotfromvpn/ Wed, 07 Sep 2022 19:53:30 +0000 https://www.idefendhome.com/?p=5715 In this digital age, having a Virtual Private Network (VPN) might seem like a necessary or vital piece to your personal cybersecurity, but is one right for you? We break it down for you in this guide.

The post What to Expect (and to Not Expect) From Using a VPN first appeared on iDefend.

]]>
pexels-stefan-coders-1019774-5146493
In this digital age, having a Virtual Private Network (VPN) might seem like a necessary or vital piece to your personal cybersecurity, but is one right for you? We break it down for you in this guide.

In this article

While using a VPN, there are a few benefits you can expect. On the other hand, there are several popular myths surrounding these apps. As long as you’re aware of this, you’ll go into using a VPN with the proper expectations.

What to Expect

Increased Privacy

Using a VPN will encrypt and protect your data traveling through it. This will help prevent advertisers, your ISP, governments, and other sources from viewing and accessing your browsing habits. This will help limit ads you encounter online from being tailored to you personally, and your browsing history.

Geolocation

Another popular use of a VPN is “region spoofing”, or appearing online that you are in another part of the world. This serves to further protect your personal data, and you may even succeed in accessing content that has been restricted by region.

What not to Expect

Complete Security

VPNs are not antivirus solutions. They will not prevent you from getting infected with viruses and malware. You will still be at risk any time you are browsing dishonest or malicious websites.

Faster Internet

Having your network traffic encrypted and going through the VPN will in many cases affect it such that your internet speeds will suffer as a result. There isn’t much you can do here besides upgrading your bandwidth with your ISP.

Streaming Location Spoofing

Many people attempt to use VPNs to circumvent streaming content restrictions on sites such as Netflix and Hulu. These companies are aware of this and are constantly cracking down on offenders, blocking them from their sites. You may get lucky for a while, but it’s in the company’s business interests to prevent region spoofing.

Should I Get a VPN?

Perhaps the soundest bit of advice when it comes to a VPN is just try it out. There are dozens upon dozens of VPNs out there, and many of these offer some type of free trial period.

It’s also extremely common for VPN companies to offer steep discounts if prepaying for several years at a time.

Even iDefend includes a VPN in its services at no additional charge to our members.

If you have any questions about a VPN, what it does or doesn’t do for you, and if it’s a good fit for your household, give one of our Advisors a call and they’ll be more than happy to go through things with you.

The post What to Expect (and to Not Expect) From Using a VPN first appeared on iDefend.

]]>
How to Quickly Secure Your Google Account https://www.idefendhome.com/blog/onlineprivacy/quicklysecuregoogleaccount/ Sat, 09 Apr 2022 01:32:03 +0000 https://www.idefendhome.com/?p=5753 Your Google account already has robust layers of security, but how well does it respect your privacy?

The post How to Quickly Secure Your Google Account first appeared on iDefend.

]]>
pexels-wdnet-218717
Your Google account already has robust layers of security, but how well does it respect your privacy?

In this article

Google’s offering of dozens of free web apps is what makes it a popular choice among many users. Like any big internet corporation, however, these apps and accounts have access to any personal information you share on there. In this guide we’ll point out some setting you can check on to take control of just what information is shared with them.

Account Settings You Should Check

From your google account, click on your account picture or icon. From there, you should see an option called “Manage your Google Account”. Now, navigate to each setting described below and feel free to implement any of our recommendations. You can also customize this according to your individual needs.

Home

Look for any flags here, including any security issues found. Google has a nice walkthrough process that helps you correct anything they’ll point out to you on here.

Personal Info

Now is a great time to make sure any information you have here is correct, so that you can recover your account more easily in case you lose access to it. You can also control how much or how little you put here.

Data & Personalization

We recommend taking their Privacy Checkup that Google provides. You can also adjust the settings in here according to what you want.

Security

Two-factor identification is a recommended security feature on any website where you have sensitive data stored. Turning this on will mean logging in is slightly more inconvenient, but makes it incredibly difficult for anyone to hack into your account, as they’d also need access to whatever you set as your second factor.

Finally, look through any devices you have listed here and remove any you no longer use or don’t recognize.

The post How to Quickly Secure Your Google Account first appeared on iDefend.

]]>
Easy Cyber-Safe Summer Travel Tips https://www.idefendhome.com/blog/onlineprivacy/summertraveltips/ Thu, 20 May 2021 18:21:43 +0000 https://www.idefendhome.com/?p=5852 Masks are coming off, holiday travel is opening up, and cyber criminals are ready to seize your personal information and your money as you try to escape. So, while you make your summer vacation plans, be sure you are cyber-safe while traveling and continue to stay protected after you return.

The post Easy Cyber-Safe Summer Travel Tips first appeared on iDefend.

]]>
AdobeStock_206919565-1024x683
Masks are coming off, holiday travel is opening up, and cyber criminals are ready to seize your personal information and your money as you try to escape. So, while you make your summer vacation plans, be sure you are cyber-safe while traveling and continue to stay protected after you return.

In this article

Identity theft and cybercrime continue to rise at epidemic levels, and with a care-free summer of travel and vacations coming, thieves have come up with new schemes and employed a series of cyber-attacks that are now being unleashed upon the unsuspecting public. Here are some of the most important things you can do to stay cyber-safe when you leave home and hit the road.

Tips for mobile devices

When we travel most of us use our mobile phones for nearly everything, such as maps, staying in touch with family and friends, travel reservations, etc. It’s important to remember that your mobile devices constantly send and receive data, and the information on your mobile device is often more valuable than your suitcase or wallet.

Here are a few things you can do to protect yourself by securing your mobile devices:

  • Update your devices: One of the most effective ways to stay cyber-safe is to continuously update your devices. Most updates contain critical security fixes to keep you protected.
  • Use strong passcodes/passwords: Lock your device with a long passcode of 6 or 8 numbers, or better yet with facial recognition. On laptops, a minimum of 8-12 character password is recommended using uppercase and lowercase letters, numbers and special characters.
  • Use caution with Bluetooth: Disable your Bluetooth networking while you are travelling to prevent unwanted connection attempts. When you pair your device with a car, your personal information is stored on the car’s system. It’s best to not pair devices with rental cars, but if you do, make sure you delete any stored data and remove your device from the rental car’s paired device list.
  • Keep track of your devices: Ensure that your devices are kept secure while in public places such as airports, hotels, and restaurants. Devices can be easily stolen, which allows access to very private and sensitive information.
  • Set up “find my phone”: Enabling this feature will allow you to find, remotely wipe data and/or disable the device if it gets into the wrong hands.
  • Make a backup before you go: It’s a smart idea to back up your device and your data files to another device or a cloud storage program service.

Tips when using public Wi-Fi

Using open public Wi-Fi at the airport, hotel or a cafe may be convenient, but public Wi-Fi networks and hotspots are not secure. Anyone using the same Wi-Fi connection can potentially see what you are doing on your device, making it an ideal location for hackers to find their next victim.

  • Ensure your device is set to ask permission before automatically connecting to a wireless network while you are traveling.
  • Only use secured Wi-Fi that requires login credentials and passwords.
  • Use the internet data from your cell phone. Create a Wi-Fi hotspot from your smartphone or consider using a trusted virtual private network (VPN) if you need a more secure connection.
  • Avoid logging into your personal accounts or making transactions while on public or hotel networks.

Tips for sharing on social media

Leave your travel plans off social media and consider posting photos and updates about your trip after your return. Opportunistic criminals that are tracking you on social media might see you are gone and attempt to break in and steal from your home.

Fraudsters may also attempt to contact your friends and family with various email and messaging scam tactics by posing as you and asking for emergency money to be able to get back home. Consider setting your social media accounts to only allow friends to view your posts and content.

Final tip

To reduce your worries and get some peace of mind while traveling, consider enrolling in a complete identity theft and cyber protection service such as iDefend. You should know who to contact on a moment’s notice if you ever have a cyber-safety problem.

Should you lose a wallet, your bank cards get hacked and money stolen, your phone or computer gets hacked, or your identity is stolen while you are away, it’s wise to have a world-class cyber protection service you can contact for immediate expert help. Otherwise, your wonderful vacation may end in a nightmare.

For help setting up your travel cyber-safety plan before you go, contact one of our friendly iDefend Advisors.

The post Easy Cyber-Safe Summer Travel Tips first appeared on iDefend.

]]>
Your Guide to Smart Home Cybersecurity https://www.idefendhome.com/blog/devicesecurity/smarthomecybersecurityguide/ Mon, 05 Apr 2021 02:59:28 +0000 https://www.idefendhome.com/?p=5805 If you're like millions of other people, you've got at least one or two smart home devices laying around. Did you know these devices pose real security risks? What can you do to secure them?

The post Your Guide to Smart Home Cybersecurity first appeared on iDefend.

]]>
026
If you're like millions of other people, you've got at least one or two smart home devices laying around. Did you know these devices pose real security risks? What can you do to secure them?

In this article

The advancement of technology in the past decade has been unprecedented. Our original expectations a smart home would provide where met in some ways and exceeded in others. We can now listen to a song by simply asking for it to be played, monitor our children and property, yet also have smart refrigerators.

With all these grand advancements has come with new threats and challenges with your cyber security. Is your smart device listening in and recording what you say? Have your security cameras been compromised allowing someone to observe your family without your knowledge? These possibilities have been the reality for some, but we will discuss what you can do to better protect yourself from this same fate.

How criminals hack smart homes

There are a few particular ways that thieves can sneak their way into your system such as joining onto your WiFi or finding an exploit through an app’s security on your phone. Smart home devices can unintentionally contain sensitive personal information such as credit card data, date of birth. A hacker can even hijack your device without you realizing, since it will appear to continue functioning normally but be quietly eavesdropping on you from behind the scenes.

Another way your personal information can become unintentionally accessible is through a corporate data breach. Hackers infiltrate a company, steal all their customers’ information, and either use it themselves or expose it on the dark web, selling it to the highest bidder.

Massive data breaches can compromise your credit card information, social security number, and whatever else they can get their hands on. With what was stolen they could simply start opening new credit cards, take out loans under your name, or impersonate you in a number of other sinister ways.

How to secure your WiFi

Whether you realize it or not, your home WiFi might be granting more access to your data than you prefer. By taking a few steps to secure it, you can strengthen this flaw in your security.

  1. Protect your private WiFi. Setting up a guest WiFi on a separate network can better protect your information. At times, though rare, friends or family could use the opportunity of being on your WiFi to compromise data. Creating a separate, guest, network prevents this.
  2. Ensure that your WiFi router has a strong password. A router’s default name often contains product information that a knowledgeable hacker can use to identify and exploit any known vulnerabilities that particular model might have. If your WiFi doesn’t contain a password, then you are allowing any and everyone who is within the routers strength to have direct, free access.
  3. Change your WiFi network’s default name. The default name can include insights that you don’t want to be made public, and a knowledgeable hacker can take what little information is displayed and capitalize on it.
  4. Switch your router to a WPA2 (or better) encryption. Other encryptions may not be as strong, allowing for others to break in easier. This is because your WPA2 network provides an unique encryption key for each wireless client that connects to it. To set this up you can go into your network setting, and you’ll see the option which lists the different kinds of connections. (WPA2, TKIP, WPA, or AES) There you can select which connection, and save that setting. You will need to confirm your network password as well, but once it is saved, your new connection will be active.

 

Understand that if you change your network connection type, or password, then all who are connected to the network will need the new password to get connected to the network again.

Device and app settings

You can control the amount of information that is shared between your smart devices. For example, on your bluetooth device app settings, you can go in and turn off certain data sharing information. One important feature to disable is to disable remote access authorization unless in use. This will create a much smaller window for attacks on your devices which further prevents them to be compromised.

For each smart device that is connected through your phone or WiFi, be sure to check your phone’s settings for the device. You will be able to see all the different options you can switch on or off. Be mindful of what is allowed to be “on” as these settings can be where your private information is more at risk.

Update your smart devices

Another important note is to always be mindful of keeping your devices up to date. Updates can carry vital protection on new security measures. If you’re running older software, cyber criminals can exploit the holes the older software contains into the app and device itself.

When prompted by your phone or device, always update it. If for whatever reason updates are turned off, usually you can manually check for updates and start them yourself; they take only a couple of minutes, but can make a world of difference.

How to enjoy greater peace of mind

Risks with your smart devices and WiFi exist, but the more precautions you take the better you can enjoy them with sound peace of mind. The cyber world is ever-changing as cyber criminals continually evolve to find new ways to exploit your information. Smart devices can be complicated, but managing them properly can create an all around improved experience.

iDefend’s device security support includes unlimited technical support and assistance configuring and managing your smart home. Let us know if we can help and give you the peace of mind you deserve.

The post Your Guide to Smart Home Cybersecurity first appeared on iDefend.

]]>