security – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Wed, 28 Aug 2024 21:16:14 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png security – iDefend https://www.idefendhome.com 32 32 5 Things to Know Before Installing Smart Cameras https://www.idefendhome.com/blog/devicesecurity/5thingsaboutsmartcameras/ Tue, 06 Aug 2024 21:29:58 +0000 https://www.idefendhome.com/?p=6864 Adding smart cameras to your home can increase your security and safety, but they are not without their risks and concerns. Here are a few things to know before you buy some.

The post 5 Things to Know Before Installing Smart Cameras first appeared on iDefend.

]]>
pexels-introspectivedsgn-7635126
Adding smart cameras to your home can increase your security and safety, but they are not without their risks and concerns. Here are a few things to know before you buy some.

In this article

A popular addition to many smart homes, security cameras that connect to an app on your phone are an important part of many homeowner’s day-to-day security. These devices are relatively simple to install, quick to get online, and then easy to access whenever you need them.

The problems begin to arise when you get into using them without considering some basics first. To help you out, we’ve put together a few tips for you to consider before taking the plunge and decide if smart cameras are right for your family.

Be Aware of Local Laws

Depending on the area in which you live, you might have to fill out some additional forms, or even pay certain fees before you can install security cameras on your home.

The good news is that in most US States, recording in public areas (i.e. the street) is perfectly acceptable. It’s also worth noting that if your camera is recording sound alongside video then it could complicate things for you.

Be sure to double check your local regulations and you should be good. A quick internet search is likely all that you’ll need to perform anyway.

Discuss Plans With Your Family

If you’re going to be adding cameras to your home, be sure to talk with the other people living there. Chances are, everyone would like to know where and when these devices will be recording.

Another thing to consider is guests and others visiting your home. If you’re going to be recording mostly innocuous footage then no big deal. However, if you’re going to have them in less-conspicuous locations it may be courteous to explain to regular friends and visiting family what to expect.

Choose Smart Locations

For external cameras

Perhaps one of the most important aspect of smart cameras is their placement. If you’re using them primarily for home security and surveillance, then positioning them with a good view of all the major entrances to your property is a good idea.

Another angle of security is visibility. Sometimes you’ll want the cameras to be out in the open to deter any would-be wrongdoers. At the same time, there are cases where keeping the devices more discreet will be what you’re after.

A final use for external cameras are doorbell or front door cameras. These are most useful for package drop off and delivery, and can also stop “porch pirates” from making off with your latest Amazon order.

For internal cameras

Cameras inside your home require much more careful consideration where they are placed. Avoiding private areas should go without saying, but there are still some useful areas for the devices.

A popular use for internal cameras are in you children’s rooms such as toddlers or babies. This allows the parents to keep an eye (or ear) on their kids via an app on their phone. This can be wonderful when you want to check in on how they’re doing.

Another common area is the kitchen or living room, areas that typically command a wide view of the home. This can give you increased peace of mind while you’re away, or allow you to keep an eye on housekeepers or pets while on vacation.

Maintenance

Maintaining your cameras, could include things such as: lens cleaning, trimming tree limbs, sweeping up cobwebs, etc. Removing physical obstructions will be crucial for your camera’s functionality and lifespan. If it’s going to be exposed to the weather, make sure it’s a kind designed for heavy outdoor usage.

Storing and deleting footage

You should also keep in mind that the footage your camera collects will need to be stored somewhere. Some models will opt for on-board storage. This physical memory will either need to be downloaded or actually taken out of the camera if it’s a memory card.

If your camera connects to the cloud, then you will only need to worry about the space you’re paying for there.

In both cases, it’s often not worth your time or money to keep really old footage. Unless it’s got some evidence of a crime, or something valuable to you, you’re better off cleaning out old data regularly to ensure your camera has plenty of room to continue recording.

Know the Safety and Privacy Risks

By far the biggest concern with cameras is their proximity to sensitive data. In this case, the data is you and your family, as well as anyone else entering your home.

Regardless of whether the smart camera can record either video, audio, or both, the moment a hacker gets into your system, they could suddenly have all of this data at their fingertips. 

This is where internal cameras are especially risky as they post the greatest access to this type of data. If you’ve got smart cameras inside your home, make sure they are locked down!

Ensure you have strong network security

Wherever you have the data stored, make sure it’s safe. On top of that, if your camera is connected to your home network, make sure you’ve got a strong password, firewall, and have shorn up any access points. This will make it more difficult for a hacker to get inside.

It’s also probably worth your time to have an expert check out your system and review your network security. iDefend Advisors are trained to assist with network security threats and are an excellent resource for you in this area.

The post 5 Things to Know Before Installing Smart Cameras first appeared on iDefend.

]]>
How Reliable Are Video Game Ratings? https://www.idefendhome.com/blog/devicesecurity/videogameratings/ Tue, 11 Jul 2023 17:36:20 +0000 https://www.idefendhome.com/?p=5547 Video game content is all over the board, but is supposedly confined within a strict system of specific ratings. How much do you know about what these ratings mean?

The post How Reliable Are Video Game Ratings? first appeared on iDefend.

]]>
pexels-jeshoots-com-147458-442576
Video game content is all over the board, but is supposedly confined within a strict system of specific ratings. How much do you know about what these ratings mean?

In this article

Much like movies, before publishing, each video game is reviewed and assigned a content rating by the Entertainment Software Rating Board (ESRB). You can use this as a quick tip-off to any offensive or questionable content a game may contain before buying it.

Where Are the Ratings?

It’s usually displayed as a large letter on the front or back cover of a physical game, and will be listed on the main page when purchasing a game online or via the console itself. Unlike movie ratings tucked away on the case, a game’s rating is often displayed prominently on the front cover.

There’s a content overview as well

Not only is the letter rating displayed, but next to this will be a snapshot of the game’s content. It’s typically listed as a handful of items such as: “Mild language,” “Suggestive themes,” “Cartoon violence,” etc. These will tell you what kind of things someone can expect when playing the game.

Rating: E

Rated for everyone

E-rated games have very little to no violence. If there is violence, it’s usually in the form of cartoon, fantasy, or mild violence. Also can include very light/mild language. 

This rating is going to be the most common on games geared toward families and kids, and as such is also one of the broadest categories.

Multiplayer and online capabilities

Many of these games will include online or local multiplayer options. When playing online, most modern games don’t allow voice chat and instead will limit any text-based chatting to preset words, phrases, or emotes (character performing a recognizable action such as “dance” or “wave”).

Additional billing and charges

Even E-rated games can contain additional purchases, downloadable content, and even unlockable items via real money. Often, this will mean the game stores a credit card on it, and if you’re not careful it can quickly rack up charges.

Another common option is virtual or in-game currency which can be purchased with real money. This is a safer option since it typically doesn’t store a credit card on file, but instead will take online codes or redeeming gift cards in order to load the balance.

Rating: E10+

Rated for everyone ages ten and up

Similar to the E-rated games above, these are more aimed toward families as well as slightly older children and pre-teens. Games in this category will likely contain a little more violence, language, and suggestive themes, but will still refrain from anything gory or explicit.

Multiplayer and online capabilities

It’s not uncommon for games at this level to include online gaming and interactions, though the text will still be filtered similarly to those rated E.

Additional billing and charges

Just like E games, many E10+ ones will have additional content that can be purchased with real money. As above, keep an eye on where your card needs to be entered and if the game supports virtual currency.

Rating: T

Rated for teens ages thirteen and up

At some point, most kids will move on from E-rated games and crave something a little more mature. This is where the Teen rating comes into play. Games in this category will have stronger language, more violence, and sensuality potentially tipping into light sexual themes. 

Multiplayer and online capabilities

Games in the T category with online capabilities typically have nearly-unmoderated chat lobbies including options for both text and voice chatting.

It’s also worth noting that many adults play these games as well, meaning that children and teens can converse freely with adults during gameplay. This is a common place for online predators to begin grooming as well as cyberbullying to occur.

Additional billing and charges

A lot of the popular T-rated games are filled with extra purchases, cosmetics (things that change visuals but don’t influence gameplay), and a slew of other things to spend money on.

Be sure you understand and check that your card isn’t saved on file to allow your kids to freely rack up a huge bill.

Rating: M

Rated for Mature audiences ages 17 and up

Potentially the largest and widest category of games in our list are for ones rated M. Like the name implies, this rating is for mature themes, mature language, and often mature sexual content.

That being said, the actual content can vary wildly from game to game, so it’s recommended you also pay attention to the content warnings next to the rating. Titles in this range can be rated M simply for high levels of violence but have absolutely no sexual content.

On the flip side, a game may simulate or even encourage sexual acts, portray nudity, and contain explicit language.

It’s always recommended that you do your research about a game in this category before buying it for a teen.

Multiplayer and online capabilities

Surprisingly, many of the games in this category do not offer online play but are instead intended as single-player games. Those with online multiplayer, however, will almost always have text and voice chatting.

Unfortunately, there’s not a strict standard for filtering or moderating any of these chats, so if you’re a concerned parent, check out our video game safety features included in iDefend.

Additional billing and charges

As with the other categories, these games often include additional purchases.

It’s worth noting for most of the single-player games, however, that the bulk of purchasable content is actually further expansions or modules for the same game, expanding gameplay and the storyline rather than simply throwing money at cosmetic items.

The post How Reliable Are Video Game Ratings? first appeared on iDefend.

]]>
8 Essentials for Securing Your Smart Home and Protecting Your Privacy https://www.idefendhome.com/blog/devicesecurity/8smarthomeessentials/ Thu, 15 Sep 2022 21:19:26 +0000 https://www.idefendhome.com/?p=4970 As you introduce more internet connected smart devices into your home and turn it into a “smart” home, you’re also likely making it an “insecure” home.

The post 8 Essentials for Securing Your Smart Home and Protecting Your Privacy first appeared on iDefend.

]]>
smart-home-cybersecurity
As you introduce more internet connected smart devices into your home and turn it into a “smart” home, you’re also likely making it an “insecure” home.

In this article

Each smart device is a digital entry point to your personal life and your home network. They capture and hold a treasure trove of personal information like your birth date, entertainment habits, medical needs, energy use, diet and sleep patterns, and even crazy things like the layout of your home.

If you own internet-connected devices such as: smart speakers, TVs, thermostats, fridges, security cameras, doorbells, door locks, robot vacuums, etc., your privacy and security is at stake.

What’s the Risk?

In a best-case scenario, the companies behind these data gathering devices will use the information they collect to launch targeted marketing campaigns at you and sell you more stuff. Or perhaps just sell your consumer profile to the highest bidder.

Your home will be vulnerable to hackers

In a worst-case scenario, predators will hack your home network, steal your identity and money from your online bank accounts, or hijack your home security and camera systems to watch you, assault you or burglarize you. Scary, right? Even if you’ve given up on fighting for your privacy, this possibility should wake you up.

How to Secure Your Smart Home

Bottom line, if you’re investing money in the coolest new technology and making yourself a smart home, you must also invest some time, energy, and resources to protect it.

Here are eight ways to re-enforce your home cyber defenses.

1. Secure Your Wi-Fi Router

Your Wi-Fi router is the doorway to your smart home. Creating a safer smart home starts with your router. It’s what connects all your IoT devices and makes them so valuable. Here’s what you can do to set up a secure Wi-Fi router:

  • Change the router’s default name. Don’t stick with your router’s default name, which is usually its make and model. Change it to an unusual name that’s not associated with you or your address. Don’t give away any personal identifiers.
  • Set a strong Wi-Fi password. Set the router’s password to something truly unique. Use complex passwords made up of letters, numbers, and symbols. The longer the better.
  • Use the Highest Level of Encryption. Set your router’s encryption level to the highest level possible (WPA3 is best, but WPA2 is fine).

 

2. Create Separate Wi-Fi Networks

Create a separate Wi-Fi login on your router for your “smart home network”. This is what you connect all your IoT (Internet of Things) devices to, and it’s separate from your primary home Wi-Fi login for your computers and phones.

This means relatives, friends and other guests are not logging into your smart home network, and it’s only accessible by you. If you work from home, you may want to consider creating yet another “work” network login to keep your work separate from everything else.

3. Turn Off Listening Modes

Do you ever feel like someone is eavesdropping on you? If you own a smart speaker or smart phone, your concern is valid. They’re pretty much always listening.

Nearly all voice-activated technology uses microphones that listen for key words and vocal cues. Companies like Apple, Facebook and Google hear all your commands and can potentially pick up conversations if your device thinks it hears a key word. This also true for many smart TVs and a variety of other devices with voice activation and camera features.

If you want to take control of your privacy and keep conversations “behind closed doors,” turn off smart speakers when not in use, and change your phone’s privacy settings to turn off your microphone for everything but phone calls and voice-to-text features.

With your devices no longer listening, you can relax and feel a bit less paranoid about using your tech. You can always turn the microphones back on again if you want to use them. Just make sure you’re careful about what you say when they’re on — and don’t forget to turn them off when you’re finished.

4. Protect Your Home Security System

As crazy as it sounds, an insecure home alarm device can be a major security risk to you and your family! A hacked security system could give predators permission to use or disable your cameras, unlock doors to let a burglar in, or even lock you out of your own home.

Be sure to connect your home alarm system to your segregated smart home Wi-Fi network. Also be sure your security hardware (cameras, locks and panel) stays updated and patched by the manufacturer.

5. Disable Features You Don’t Use

Many IoT devices give you the ability to control them from anywhere with your smart phone. But if you only use your smart home devices when you are home, consider disabling remote access. Likewise, some devices such as smart speakers have Bluetooth connectivity in addition to Wi-Fi. If you don’t use the Bluetooth feature, turn it off.

Smart TVs come with voice control, but this feature often goes unused. It may sound paranoid but an active mic on a TV, if hacked, can also be used to pry on your conversations. Disabling features you don’t use is all about blocking as many entry points as possible.

6. Use Authorized Apps Only

Many smart devices allow homeowners to remotely turn on and off lights, turn on ovens, or open and close garage doors by integrating third-party mobile apps. But apps without secure authorization may allow people other than you to impersonate you and operate your devices if they get their hands on your phone.

Fake or unauthorized apps can be used by hackers to compromise your smart phone, potentially giving them the ability to do things like remotely lock and unlock your front door. Use only authorized apps and platforms to control your smart devices.

7. Keep Your Devices Updated

Smart devices need to be kept updated as the manufacturer releases fixes for security flaws over time. Outdated software and firmware on devices can make it easier for cyber criminals to exploit them.

The best way to protect your devices is to buy from reputable brands that make security a top priority, and where possible set them to update automatically when new software is available. This way, you’ll have the latest security patches that close known loopholes, minimize the risk of malware infections, and keep your smart home running smoothly and safely.

Your home Wi-Fi router and some smart devices may not automatically update. So be sure to do a manual check a few times a year on these devices and install any pending updates.

8. Enable Multi-Factor Authentication (MFA)

Multi-factor authentication is an added layer of security requiring a second form of validation or proof that it’s really you logging into your device. You see this commonly with a one-time pin or verification code sent to your phone or email that you must enter to confirm you are authorized to login.

Most smart devices have the multi-factor authentication feature available by default. Be sure to enable this where you can. For devices that don’t have this feature built into their apps, see if you can enable two-factor authentication (2FA) by using third-party apps such as Google Authenticator.

Take Charge of Your Smart Home

You can purchase the most expensive Wi-Fi routers and smart devices from top brands and yet, at the end of the day, your personal and home cyber defense is in your hands.

Performing a device inventory

Take inventory of what devices you have right now that connect to your home Wi-Fi. If you have old devices that are not receiving security updates and patches from the manufacturer, consider replacing them with newer technology. Do a factory reset on old devices before giving them away.

Choose devices with adjustable privacy settings

Carefully look for smart devices where you are in control of your privacy and security. Be sure you can enable full privacy settings and turn off mics and cameras easily. Or consider whether there are good alternatives for devices that don’t connect to the internet and your home network.

Using the recommendations here as a starting point you can take action now to better protect yourself and your loved ones.

Getting Expert Help

If you don’t have the time or would rather have trusted experts help you maintain a safe and private smart home, you can subscribe to a personal and home cyber protection service such as iDefend that provides you with a complete protection plan for a surprisingly low cost.

The post 8 Essentials for Securing Your Smart Home and Protecting Your Privacy first appeared on iDefend.

]]>
Top 10 Bad Cybersecurity Habits to Break in 2022 https://www.idefendhome.com/blog/devicesecurity/10badhabitstobreakin2022/ Sat, 22 Jan 2022 17:22:57 +0000 https://www.idefendhome.com/?p=5841 We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
old_habits_new_habits-300x200-1
We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

In this article

The new year is a great opportunity to evaluate many areas of your life. With cybercrime surging to all-time highs last year, improving your personal and home cyber protection has never been more important. Take better control of your online security and privacy this year by breaking a few bad cyber habits that may put you at risk.

2021 was a big year for cybercrime

Last year shaped up to be one of the worst years on record for cybercrime and losses from scams. In the first nine months of 2021 alone, 281.5 million people were impacted by data breaches and data leaks (ITRC). Hackers targeted people working from home, resulting in a 300% increase in data breaches with their employers (Verizon).

Over $80m scammed

During a nine month stretch last year, victims were scammed out of $80 million in cryptocurrency investment scams (FTC). And that’s only what’s been reported to the Federal Trade Commission. At the same time in 2021, the elderly in America lost over $1 billion in new cyber scams (IC3).

If by chance you’re not feeling the urgency to find new ways to protect your digital world, consider that more than a third of US identity theft victims last year said they didn’t have enough money to buy food or pay for utilities last year after suffering financial losses due to fraud (ITRC).

Focus on things you can control

While you can’t control things like data breaches with businesses, you can do your part. Here are 10 bad habits to break this year to better protect your privacy and your hard-earned money.

Stop doing these things now:

1. Stop ignoring computer problems

When your computer starts having problems – when applications don’t work, files go missing, or your computer and your internet becomes painfully slow, your computer might be infected with a virus, spyware, or other types of hacker tools. Do not ignore computer problems. Get a security check-up done right away from a trained professional when your computer starts acting up.

2. Stop using outdated software

Don’t ignore security updates to your computer and smart devices. More than 50 new vulnerabilities in operating systems, browsers, and other software on computers and devices are discovered every day. Cybercriminals look for and use these vulnerabilities as a top method of attack. The good news is that by switching on automatic updates and clicking to update when prompted, you can easily keep your computer and your smart devices up to date and protected.

3. Stop not thinking before clicking

Scam emails, known as phishing emails, are possibly the most prolific cyber threats you’ll face today. Attackers try to trick their victims into clicking on malicious links or opening a virus-infected attachment in an email that appears to come from a legitimate company or person. The number one rule is to think before you click. If you weren’t expecting the email, be suspicious.

4. Stop using bad passwords

Using the same password for multiple accounts and easy-to-guess security questions gives hackers a massive advantage. Create strong passwords for your accounts. Try using long phrases you’ll remember as your passwords, the longer the better. Don’t use the same password everywhere. Consider using a password manager to remember your passwords and phrases. And be sure to switch on two-factor authentication (2FA) on any account that offers it.

5. Stop not using security on all devices

Everyone knows you should have good anti-malware protection on your computers. Don’t forget to protect your smart phone and tablets too, especially if you have Android devices. Be sure to download and use highly recommended security apps from Google Play and the Apple App Store.

6. Stop using non-secure websites

Start paying attention to the security of websites you visit. HTTPS sites use encryption to protect your connection to the site. It authenticates the site as genuine and that it’s not a phishing website. Look for the padlock symbol and the “S” in HTTPS at the beginning of the website URL.

7. Stop sharing work and personal

With many of us spending more time working from home and maybe using personal devices for work too, the lines between personal and work on computers and devices have become blurred. Keep work and personal separate. Only use your personal email and passwords for consumer shopping, online banking, etc. Keep children and other family members off computers that you use for work.

8. Stop giving out personal information

Never give out personal information to someone who has called you. Scammers are getting good at convincing people to share their date of birth, account numbers, and other credentials over the phone. Legitimate businesses and government agencies will never ask you for private information by phone. Hang up, look up the company’s phone number yourself and then call them back.

9. Stop not backing up your files

Ransomware attacks continue to happen. Imagine if you were suddenly locked out of your computer with a message left by the hacker demanding $10,000 in bitcoin as a ransom payment to get your computer back. All the data on it, and potentially cloud storage, could be lost forever – including family photos and important work documents.

Be sure you have a cloud backup of all your files or that you regularly back up everything to a portable hard drive and store it separately in a secure location. Wiping your computer and reloading from a backup is often the only way to recover from a ransomware attack.

10. Stop not protecting your smart home

Nearly every home is outfitted with smart gadgets like voice assistants, smart TVs, and security cameras. But these smart devices are also becoming an attractive target for criminals. They can be used to infiltrate your home network, your computers and ultimately, your personal data.

Be sure to change the default passwords that come with the device – such as your home Wi-Fi router. Where possible, edit the privacy settings on devices (like a voice assistant) to not allow it to share your activity and information with the manufacturer (such as Google). Also, watch for software and firmware updates from the product manufacturer that fix potential security flaws as they are discovered. Think twice before purchasing new gadgets or toys that listen to things going on in your home, record video, or otherwise track you.

Here’s to a secure 2022!

In many ways, we are all looking forward to a better year than last year. We have enough to worry about without stressing over attacks on our digital lives. To help make sure it’s a year full of good things, start by improving your personal cybersecurity and privacy today.

 


Staying current with all the right protections can be a daunting task. Fortunately, expert help is available for helping you establish a complete cyber defense plan for you and your loved ones. iDefend is a comprehensive identity theft and cybersecurity program for individuals and families that includes unlimited access to U.S. based cybersecurity experts and advisors to help you protect your digital life.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
Guide to Secure Logins and Passwords https://www.idefendhome.com/blog/onlineprivacy/3tipssecurepasswords/ Sat, 14 Aug 2021 00:37:17 +0000 https://www.idefendhome.com/?p=5745 Your passwords are invaluable. It is the main defense which stands between who is allowed to view the information protected.

The post Guide to Secure Logins and Passwords first appeared on iDefend.

]]>
digital-padlock
Your passwords are invaluable. It is the main defense which stands between who is allowed to view the information protected.

In this article

Like your credit and debit cards, your online accounts have pins and passwords to allow the proper people to use and have access to your property. The slippery slope to a compromised password can lead to much greater threats and trouble down the road. When access is granted to those on the dark web, it can swiftly cascade into a greater attack.

Exposed emails are common

One of the most common types of information exposed on the dark web is email addresses and passwords. Also, keep in mind that websites can be prone to attacks causing them to be hacked. This can cause your email, passwords, name, and other information to potentially be compromised on the dark web. The difficult part is unless your information is being monitored by a service, it is near impossible to discover when such items become compromised.

These attacks, especially since 2020, are far more common, which is why we advise such information to be monitored. Therefore, it is important to protect yourself which such services, as well as following these suggestions below.

1. Make each password unique

Lengthy passwords, with various numbers and symbols can better help protect you. Also, you can capitalize different letters throughout in order to create a more complex password. You can still have a way to tie it to you personally, while still not making it obvious to guess.

For example, if you are a Saints NFL Football fan then a password like: #1Sa1nt$f4n.Dr3wbre3$ would be a strong password to consider. The different characters, random period, and different words helped create a strong password while also keeping it personal to you.

With these steps to create a more complicated password, there is a chance that the password can be exposed online. That is why it is smart to change your password every couple of months. It’s small things like that which can make all the difference in protecting you.

2. Use different passwords

This may be the most frustrating part of the process but it is also one of the most important. This helps lock down each account to a specific password, which can better keep thieves out. In order to best protect yourself, you need a completely different password for each account you have.

The reason for this is if your information for your email and password, for example, is released on the dark web, then those who choose to use it can hop in and look through your email. On top of that, if you use the same email and password on other websites such as Social Media, then they too can input that compromised information and have access to far more data.

The risky part of doing this is forgetting which password goes to which account as well as all the various passwords. There are services out there which help keep track of your passwords and usernames, but the risk with that also is the chance of that service getting hacked and your information compromised (Though that is more rare.) Yet one of the worst things you can do is write your passwords down on a sticky note and place it on your desk.

Security with accounts that contain your personal and confidential information is entirely in your hands. You have the choice to make it as complex or simple as you choose.

3. Multi-factor Authentication

With the world ever evolving there have been extensive measures given to help stop unwanted access to your information. One of these advancements has been Two-Point Authentication. Not all websites or services allow for this feature, but when it does, it’s smart to activate.

This enacts for after your password is put in for another way to verify it is you. That usually includes sending a text to your phone with a specific code. Once you enter that code, you will then be allowed to enter your account. This is helpful because if someone does try to get into your account and has the password, you will receive the text with the code, stopping them from going in further.

Keep in mind that you generally want to stray from Face Authentication. It is better to keep it to where a code is sent to your phone. Even with a code being sent to an email can become compromised if your email and password have been exposed on the dark web. This simple security step may add ten to thirty seconds to your login time, but the safety it adds on protecting your information is invaluable.

How to stay safe

After following all these points there still remains a chance in which your information is compromised. Remember to continue to change your passwords every couple of months to help prevent this. Sometimes when such information is exposed to the dark web it can be an old password which can keep perpetrators locked out.

In the end, following this advice can better help keep your accounts secure. If you do have any questions always feel free to reach out to our iDefend team.

The post Guide to Secure Logins and Passwords first appeared on iDefend.

]]>
Easy Cyber-Safe Summer Travel Tips https://www.idefendhome.com/blog/onlineprivacy/summertraveltips/ Thu, 20 May 2021 18:21:43 +0000 https://www.idefendhome.com/?p=5852 Masks are coming off, holiday travel is opening up, and cyber criminals are ready to seize your personal information and your money as you try to escape. So, while you make your summer vacation plans, be sure you are cyber-safe while traveling and continue to stay protected after you return.

The post Easy Cyber-Safe Summer Travel Tips first appeared on iDefend.

]]>
AdobeStock_206919565-1024x683
Masks are coming off, holiday travel is opening up, and cyber criminals are ready to seize your personal information and your money as you try to escape. So, while you make your summer vacation plans, be sure you are cyber-safe while traveling and continue to stay protected after you return.

In this article

Identity theft and cybercrime continue to rise at epidemic levels, and with a care-free summer of travel and vacations coming, thieves have come up with new schemes and employed a series of cyber-attacks that are now being unleashed upon the unsuspecting public. Here are some of the most important things you can do to stay cyber-safe when you leave home and hit the road.

Tips for mobile devices

When we travel most of us use our mobile phones for nearly everything, such as maps, staying in touch with family and friends, travel reservations, etc. It’s important to remember that your mobile devices constantly send and receive data, and the information on your mobile device is often more valuable than your suitcase or wallet.

Here are a few things you can do to protect yourself by securing your mobile devices:

  • Update your devices: One of the most effective ways to stay cyber-safe is to continuously update your devices. Most updates contain critical security fixes to keep you protected.
  • Use strong passcodes/passwords: Lock your device with a long passcode of 6 or 8 numbers, or better yet with facial recognition. On laptops, a minimum of 8-12 character password is recommended using uppercase and lowercase letters, numbers and special characters.
  • Use caution with Bluetooth: Disable your Bluetooth networking while you are travelling to prevent unwanted connection attempts. When you pair your device with a car, your personal information is stored on the car’s system. It’s best to not pair devices with rental cars, but if you do, make sure you delete any stored data and remove your device from the rental car’s paired device list.
  • Keep track of your devices: Ensure that your devices are kept secure while in public places such as airports, hotels, and restaurants. Devices can be easily stolen, which allows access to very private and sensitive information.
  • Set up “find my phone”: Enabling this feature will allow you to find, remotely wipe data and/or disable the device if it gets into the wrong hands.
  • Make a backup before you go: It’s a smart idea to back up your device and your data files to another device or a cloud storage program service.

Tips when using public Wi-Fi

Using open public Wi-Fi at the airport, hotel or a cafe may be convenient, but public Wi-Fi networks and hotspots are not secure. Anyone using the same Wi-Fi connection can potentially see what you are doing on your device, making it an ideal location for hackers to find their next victim.

  • Ensure your device is set to ask permission before automatically connecting to a wireless network while you are traveling.
  • Only use secured Wi-Fi that requires login credentials and passwords.
  • Use the internet data from your cell phone. Create a Wi-Fi hotspot from your smartphone or consider using a trusted virtual private network (VPN) if you need a more secure connection.
  • Avoid logging into your personal accounts or making transactions while on public or hotel networks.

Tips for sharing on social media

Leave your travel plans off social media and consider posting photos and updates about your trip after your return. Opportunistic criminals that are tracking you on social media might see you are gone and attempt to break in and steal from your home.

Fraudsters may also attempt to contact your friends and family with various email and messaging scam tactics by posing as you and asking for emergency money to be able to get back home. Consider setting your social media accounts to only allow friends to view your posts and content.

Final tip

To reduce your worries and get some peace of mind while traveling, consider enrolling in a complete identity theft and cyber protection service such as iDefend. You should know who to contact on a moment’s notice if you ever have a cyber-safety problem.

Should you lose a wallet, your bank cards get hacked and money stolen, your phone or computer gets hacked, or your identity is stolen while you are away, it’s wise to have a world-class cyber protection service you can contact for immediate expert help. Otherwise, your wonderful vacation may end in a nightmare.

For help setting up your travel cyber-safety plan before you go, contact one of our friendly iDefend Advisors.

The post Easy Cyber-Safe Summer Travel Tips first appeared on iDefend.

]]>
Your Guide to Smart Home Cybersecurity https://www.idefendhome.com/blog/devicesecurity/smarthomecybersecurityguide/ Mon, 05 Apr 2021 02:59:28 +0000 https://www.idefendhome.com/?p=5805 If you're like millions of other people, you've got at least one or two smart home devices laying around. Did you know these devices pose real security risks? What can you do to secure them?

The post Your Guide to Smart Home Cybersecurity first appeared on iDefend.

]]>
026
If you're like millions of other people, you've got at least one or two smart home devices laying around. Did you know these devices pose real security risks? What can you do to secure them?

In this article

The advancement of technology in the past decade has been unprecedented. Our original expectations a smart home would provide where met in some ways and exceeded in others. We can now listen to a song by simply asking for it to be played, monitor our children and property, yet also have smart refrigerators.

With all these grand advancements has come with new threats and challenges with your cyber security. Is your smart device listening in and recording what you say? Have your security cameras been compromised allowing someone to observe your family without your knowledge? These possibilities have been the reality for some, but we will discuss what you can do to better protect yourself from this same fate.

How criminals hack smart homes

There are a few particular ways that thieves can sneak their way into your system such as joining onto your WiFi or finding an exploit through an app’s security on your phone. Smart home devices can unintentionally contain sensitive personal information such as credit card data, date of birth. A hacker can even hijack your device without you realizing, since it will appear to continue functioning normally but be quietly eavesdropping on you from behind the scenes.

Another way your personal information can become unintentionally accessible is through a corporate data breach. Hackers infiltrate a company, steal all their customers’ information, and either use it themselves or expose it on the dark web, selling it to the highest bidder.

Massive data breaches can compromise your credit card information, social security number, and whatever else they can get their hands on. With what was stolen they could simply start opening new credit cards, take out loans under your name, or impersonate you in a number of other sinister ways.

How to secure your WiFi

Whether you realize it or not, your home WiFi might be granting more access to your data than you prefer. By taking a few steps to secure it, you can strengthen this flaw in your security.

  1. Protect your private WiFi. Setting up a guest WiFi on a separate network can better protect your information. At times, though rare, friends or family could use the opportunity of being on your WiFi to compromise data. Creating a separate, guest, network prevents this.
  2. Ensure that your WiFi router has a strong password. A router’s default name often contains product information that a knowledgeable hacker can use to identify and exploit any known vulnerabilities that particular model might have. If your WiFi doesn’t contain a password, then you are allowing any and everyone who is within the routers strength to have direct, free access.
  3. Change your WiFi network’s default name. The default name can include insights that you don’t want to be made public, and a knowledgeable hacker can take what little information is displayed and capitalize on it.
  4. Switch your router to a WPA2 (or better) encryption. Other encryptions may not be as strong, allowing for others to break in easier. This is because your WPA2 network provides an unique encryption key for each wireless client that connects to it. To set this up you can go into your network setting, and you’ll see the option which lists the different kinds of connections. (WPA2, TKIP, WPA, or AES) There you can select which connection, and save that setting. You will need to confirm your network password as well, but once it is saved, your new connection will be active.

 

Understand that if you change your network connection type, or password, then all who are connected to the network will need the new password to get connected to the network again.

Device and app settings

You can control the amount of information that is shared between your smart devices. For example, on your bluetooth device app settings, you can go in and turn off certain data sharing information. One important feature to disable is to disable remote access authorization unless in use. This will create a much smaller window for attacks on your devices which further prevents them to be compromised.

For each smart device that is connected through your phone or WiFi, be sure to check your phone’s settings for the device. You will be able to see all the different options you can switch on or off. Be mindful of what is allowed to be “on” as these settings can be where your private information is more at risk.

Update your smart devices

Another important note is to always be mindful of keeping your devices up to date. Updates can carry vital protection on new security measures. If you’re running older software, cyber criminals can exploit the holes the older software contains into the app and device itself.

When prompted by your phone or device, always update it. If for whatever reason updates are turned off, usually you can manually check for updates and start them yourself; they take only a couple of minutes, but can make a world of difference.

How to enjoy greater peace of mind

Risks with your smart devices and WiFi exist, but the more precautions you take the better you can enjoy them with sound peace of mind. The cyber world is ever-changing as cyber criminals continually evolve to find new ways to exploit your information. Smart devices can be complicated, but managing them properly can create an all around improved experience.

iDefend’s device security support includes unlimited technical support and assistance configuring and managing your smart home. Let us know if we can help and give you the peace of mind you deserve.

The post Your Guide to Smart Home Cybersecurity first appeared on iDefend.

]]>
Upgrade Your iPhone Security in 3 Quick Steps https://www.idefendhome.com/blog/devicesecurity/iossecurity3steps/ Thu, 18 Mar 2021 02:25:59 +0000 https://www.idefendhome.com/?p=5777 Your iPhone or iPad could be a gateway for security risks, identity theft, predators, and other cyber-threats to infiltrate your home and family.

The post Upgrade Your iPhone Security in 3 Quick Steps first appeared on iDefend.

]]>
pexels-pixabay-236086
Your iPhone or iPad could be a gateway for security risks, identity theft, predators, and other cyber-threats to infiltrate your home and family.

In this article

Apple’s premium devices have been around for years, and while their security is famous for being top-notch, there are still plenty of holes you can fill. Sometimes it can be overwhelming and you may not know where to start.

Don’t worry; we’ve got your back! This guide has three quick tips you can utilize to upgrade your security settings in minutes.

First, you’ll need to locate these settings:

Finding the Right Settings

Most likely, your device will allow you to do a search in the Settings. Swipe down from the top of Settings to find the magnifying glass symbol 🔎 (search bar), where you can type the keywords.

Tip: Try searching for things like: “system”, “update”, “software”, “version”, “lock screen”, “passcode”, etc.

Step 1: Download Updates

Ensure your device has downloaded the latest system updates. This is the strongest layer of protection you can have against malware.

Step 2: Screen Lock & Passcode

Having a screen lock, passcode, fingerprint lock, or facial ID will help keep your device physically secure—in case it is lost or stolen.

Step 3: Find my Device

Setting up this function allows you to locate your iPhone or iPad if you misplace it, as well as giving you control to lock-down or erase your personal data if the device is ever lost or stolen.

The post Upgrade Your iPhone Security in 3 Quick Steps first appeared on iDefend.

]]>
Upgrade Your Android Security in 3 Quick Steps https://www.idefendhome.com/blog/devicesecurity/3stepsandroidsecurity/ Wed, 17 Mar 2021 02:35:54 +0000 https://www.idefendhome.com/?p=5787 Your Android smartphone or tablet could be a gateway for security risks, identity theft, predators, and other cyber-threats to infiltrate your home and family.

The post Upgrade Your Android Security in 3 Quick Steps first appeared on iDefend.

]]>
pexels-luckysam-47261
Your Android smartphone or tablet could be a gateway for security risks, identity theft, predators, and other cyber-threats to infiltrate your home and family.

In this article

Android smart devices are the popular alternative to the Apple ecosystem, and millions of people worldwide use one of them as their daily driver. However, being open-source can open up these devices to a myriad of security concerns.

Don’t worry; we’ve got your back! This guide has three quick tips you can utilize to upgrade your security settings in minutes.

First, you’ll need to locate these settings:

Finding the Right Settings

Most likely, your device will allow you to do a search in the Settings. By typing keywords next to the magnifying glass symbol 🔎 (search bar), you can find almost any setting much quicker than digging through sub-menus for them.

Tip: Try searching for things like: “system”, “update”, “software”, “version”, “lock screen”, “passcode”, etc.

Step 1: Download Updates

Ensure your device has downloaded the latest system updates. This is the first and best layer of protection you have against malware.

Step 2: Screen Lock & Passcode

Having a screen lock, passcode, fingerprint lock, or facial ID will help keep your device physically secure in case it is lost or stolen.

Step 3: Antivirus & Security

Besides updates, the best thing you can do to keep your Android secure is to only download apps from within the Google Play Store.

The antivirus program, Google Play Protect, automatically scans your apps for any malware, including scanning anything on the Play Store as well. It is included for free with all modern Android devices.

To learn more about what Google Play Protect offers, and to dive deeper into Android security and maintenance, check out this article.

The post Upgrade Your Android Security in 3 Quick Steps first appeared on iDefend.

]]>
Google Plays Protect With Android App Security https://www.idefendhome.com/blog/devicesecurity/google-plays-protect-with-android-app-security/ Fri, 08 Jan 2021 22:02:17 +0000 https://www.idefendhome.com/?p=4980 If you've got an Android, chances are something has popped up from Google Play Protect. Is Google just playing around or is this feature any good?

The post Google Plays Protect With Android App Security first appeared on iDefend.

]]>
pexels-rubaitulazad-15549070
If you've got an Android, chances are something has popped up from Google Play Protect. Is Google just playing around or is this feature any good?

In this article

Google has long been a major player in the Android phone space. In the decade, they’ve even come out with their own devices, the Google Pixel line. Additionally, almost any app you download will be from the Play Store, another mark of Google’s Android influence.

Within the last couple years, their newest service, Play Protect, has bust onto the scene.

Google Play Protect?

If you’ve ever visited the Play Store to download an application on your android device, chances are you’ve run into Google Play Protect. It’s touted as a guarantee that the app you’re about to get is safe and secure, leaving you with a no-malware-here kind of feeling. As you may have already guessed, this is sadly not always the case.

It’s a layer of protection

Google Play Protect is only one initial layer of protection, but it’s more akin to a low, picket fence surrounding your home than a high cement wall. The truth is, the bad guys don’t just make a few iterations of malware and call it good—sitting back and watching their creations reap them a handsome living. They are constantly improving, changing, and innovating new ways to infect your devices. The once-venerated security of the Play Store is too-often overrated.

While it’s true that Google’s security services do catch a lot of the potential threats lurking on their platform, it’s unfortunately also true that plenty gets by, slipping through the fence slats as easily as an escaped puppy. If you’re not careful, you can easily and unknowingly infect your device simply by installing and running an app on your android device.

It’s still pretty good at what it does

This is not to say that Google’s built-in protection is not without its high points, as it regularly scans for and cleans up plenty of malware. Unfortunately, there’s only one Play Protect pitted against hundreds upon hundreds of malware developers, and that’s always going to be a one-sided battle.

How to Protect Yourself

As an Android user, you should never be relying on one piece of software to completely stop up the cracks.

Fortunately, there are precautions you can take to mitigate and even eliminate risk to yourself. It’s simpler than you think, and only takes a little extra effort to implement. 

Ready for a rapid-fire list? Here’s what we recommend:

List of our recommendations

  • Never install anything from outside the Google Play Store, and especially if it doesn’t have the Google Play Protect certificate.
  • Don’t install any apps without descriptions.
  • Only install applications that have a lot of reviews.
  • Before you download an app, look at the developer information. Look them up online if they’re unfamiliar. Have any doubts? Trust your gut and avoid the app.
  • Do some research; it only takes a few seconds to do an online search and find reviews about any program you’re thinking of downloading.
  • Be wary of in-app ads—they are a popular gateway for infections.
  • Always review the permissions (tap “more info”) you’ll be granting an application. If you don’t like what you see, don’t get it.
  • There are always going to be dozens or even hundreds of nearly-identical apps in function and purpose, so shop around a bit rather than defaulting to the top result.

Catch All That?

It might seem arduous at this point: following a giant checklist every time you need to download a new app onto your device. Of course, you don’t need to follow all (or any) of the steps listed above—they are not mandatory. Rather, think of them as additional precautions you can take to ensure your safety.

You might twist the deadbolt and lock the handle on your front door at night. Heck, you may even have one of those cool chain lock-things like in all the hotels and movies. The point is, each of these is an additional step you can take to add yet another insurance that your door is locked. Our recommendations listed above are just like that.

Note from the author: My personal hack

My personal hack is leaving the store page open after I’ve installed an app. I’ll switch over to try the new application out and if I notice anything out of place, an interface that doesn’t suit me, or any other potential problems, I’ll immediately swipe back over to the play store and uninstall the app all in the same breath.

Leaving the page open instead of immediately closing it is a great way to remind myself to do a little housekeeping.

Say, speaking of housekeeping…

Our Tips for Housekeeping

Regardless of how many of these steps you choose to follow, exercising some amount of additional caution is always beneficial when it comes to cybersecurity. If you have the time to take a few extra seconds or minutes, do it! Your future self will thank you.

You should also consider going through your device regularly. How often is regularly? That’s something you’ll need to determine. For many of us, it’s as often as we remember—which usually ends up being once every month (or three)—and that works great for us! 

The important thing is to find a system that works for you. The good news about iDefend is that we take the heavy-lifting and leave you to enjoy your life without having to worry about your devices.

Why Should I Check My Device?

Depending on how much time you have for your housekeeping session, you can do either a full, partial, or bare-minimum job. We’ll detail these in a moment, but before getting there we feel it’s important to stress the why behind this.

Humans are reactive

Going back to our ever-persistent house example, experts will recommend swapping out your air filters, clearing out the rain gutters, and changing the batteries in your smoke detectors regularly (there’s that word again). The truth is, most of us only do these things when we notice a problem: the furnace begins smoking, gobs of rain come sloshing down, and that timely “change my batteries” chirp barks out at three-in-the-morning.

We are reactive instead of proactive.

Cybersecurity starts small

It’s the same for cybersecurity. Most people will only download an antivirus when their computer starts slowing down, or only call their bank when they notice a fraudulent charge a week after it’s happened. As your cybersecurity experts, we strongly advocate for a proactive approach to your personal data online.

If you’re not getting regular cybersecurity checkups, you should be. The best time to do something is right now, and a free antivirus is a great place to start.

If you still aren’t sure where to start, contact one of our iDefend Advisors and we’ll help get you on track!

What Should I Check?

Again, this will depend on how much time you have, and how thorough you want to be. We’ll start at the bottom and work our way up to the top (which is what you should aim for).

Below, we’ve presented three versions of a checkup you can perform alone or with the help of an iDefend Advisor. Pick the one that suits your needs and timeframe and you’ll be well on your way.

The bare-minimum checkup

Okay, you don’t have a lot of time, we get it. You want to be in and out so you can get back to whatever it is you were doing before you read this article. Here’s what you should do:

  • Check if your device is up-to-date. You’ll find this in the Settings, and it will usually give you the option to postpone any updates since you probably don’t have time to install them right now. Just make sure you get them as soon as you can.
  • Scroll through the apps installed on your device. Remove anything you haven’t used in a while or don’t use at all. You’ll likely run into several built-in applications that you won’t be able to remove. Don’t worry about these.
  • Consider setting up a screen-lock or passcode to access the device. This can be done in Settings, and is a great way to add a powerful first-layer of protection.

 

That’s it. If you only have time to review a couple apps during this, that’s just fine; anything’s better than nothing. Still got some time? Keep reading.

The partial checkup

Now we’re getting somewhere. This one will probably take you about 5-10 minutes. In addition to checking everything in the bare-minimum version, you’ll want to:

  • Download and run a scan with an antivirus app from the Play Store. A free one is going to be just fine for this step. If you need some suggestions, check out our top picks. Feel free to remove the app afterwards if you want to reduce clutter.
  • Head into the Play Store and go to My Apps & Games. You can configure automatic app updates and even remove individual apps directly from here.

 

You’ve reached the conclusion of your mid-range effort. For most users, this level of checkup will be plenty to stay safe on your device. If, however, you’re a power-user or someone who has more time to kill, the full checkup is where you’ll find the satisfaction you’re seeking.

The full checkup

Here’s where the rubber meets the road. Investing a chunk of your time into your cybersecurity will pay off in spades, and this checkup will likely take close to 20 minutes. Follow everything from the previous two checkups and add the following:

  • While you’re in the My Apps & Games section, consider disabling automatic updates. This will require you to be a little more vigilant and exercise more caution than you would otherwise. Doing so, however, will allow you to prioritize keeping only the apps you regularly use up-to-date, and help you save space on your device, something critical for a smartphone.
  • Head over to your Settings and check out the App section. Perhaps the most valuable area in here is the App permissions breakdown. Using this, you can see exactly which apps have access to the various aspects of your device’s security. If you see any red flags here, remove the application in question.
  • Beyond this, we’d also recommend browsing through Settings. Though there aren’t really any more crucial things to look at, becoming more familiar with your device will empower you to feel safe and secure while using it.

 

There. That wasn’t so bad, was it?

Final Notes

When it comes to online privacy and security—including viruses, scam attempts, and identity theft—it’s not a matter of if, but when. Taking the time to proactively review your user-habits, scan your device, and perform a regular security checkup will arm you with the tools you need to take control of your cybersecurity.

If you need any help navigating these all-too-rocky seas, our friendly team is only a phone call away. Here’s to starting the new year off right by prioritizing your cybersecurity and empowering yourself for a new decade teeming with new technology. Thanks for joining us—it’s been a pleasure.

 

The post Google Plays Protect With Android App Security first appeared on iDefend.

]]>