Follow us at
Sapient Coach
  • Blog
  • Services
  • Contact
  • EspaƱol

Technology Security Tips and Hints (Part I)

1/12/2015

0 Comments

 
security Tech Tips Sapient Coach
As of today, we have many technological gadgets around us.  We have them at home, in our offices, automobiles, even as personal dressing accessories. Definitively we live in a technological era in which smart devices allow us to make collaborations,  and to share personal or business data on social networks, such as Facebook®, Twitter®, LinkedIn®, Instagram®, and Google® to name a few.  We also have the never ending clouds on our environment, such as Dropbox®, Box®, AmazonDrive®, GoogleDrive®, and Microsoft OneDrive®, among others.

We have entered into an era in which even baby boomers  interact with mobile devices and high-end technologies, not to mention millennials who were born with their genetic codes already programmed for these technologies.  Even my niece, less than one year old, uses an iPad.  We enjoy technology.  Or at least, marketing departments make us believe it is a high-priority need, and convince us to rush and get the latest gadget.

There is a difference between technology and how we use it.  Sometimes it makes our tasks easier if we know how to use it.  Sometimes we are pleased to use it for the wonderful things we can do with technologies.  Believe it or not, try speaking with Siri® by Apple®, Cortana® by Microsoft®, or GoogleNow® de Google®.  You will faint at how powerful are the technologies of artificial intelligence as seen on movies like Minority Report and Ironman.

Now, aside from the fact that we use these technologies, how do we protect our data (pictures, videos, sounds and other documents) that we load into the technological devices?  Is there any program or application to protect all this information stored in these devices and technologies?  Or do we use the best available security procedures to protect ourselves from misdoings to steal our information by means of direct robbery of  an unprotected device or by malware?

We have received countless requests from individuals who suffered one or various situations that required immediate attention to avoid further damage to their data.  Some want to recover lost or stolen information.  Others need to erase from the Internet some pictures or videos stolen from the cell phones.  On the soft side, others need to recover data accidentally erased after an incorrect installation of a software update.   To avoid becoming a victim of situations like these, lets consider some useful recommendations.  Simple as they may look, use them; they may help you save your job, or a significant personal relationship.
  1. Make it a habit to backup all of your devices contents on a weekly, monthly or yearly date, depending on its volume.  Do it regularly, no excuses.  If possible, make a second backup in another media and store them in different places.
  2. Install operating systems updates regularly in all your devices (cell phones, tablets, laptops, desktops Smart watches, even in your game platforms like Xbox, PS, Wii).
  3. Update regularly your applications and programs.
  4. Change your passwords frequently, preferably every 45 days of at three months intervals.  Do not use your name or last names or those of your relatives.  Do not use your auto plates numbers, birth dates, your pets names even worst, the word “password” or any of it variations.  A good password is one that includes alphanumeric symbols, special characters, and combinations of upper and lower case letters.  use at least eight characters or more.  Consider this example: Th3h@b1Tp@rt#3*.
  5. Be careful with free programs or trial versions of new software.  Do not install hacked programs or applications; you may be risking your data security.  Be careful with your software sources.
  6. A classic one, do not leave your mobile device unattended.  You may lose it to unauthorized persons.
  7. Regarding cell phones and tablets, if you are not using wireless characteristics as Bluetooth or NFC (Near Field Communication) turn off these modes.  These are preferred by hackers to invade your device and steal its content.

Author: Gilberto Crespo, MSCE, CDIA+, CIP
Computer Engineer, Executive and Life Coach
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Gilberto Crespo

    Author

    Dr. Gilberto Crespo is an information security researcher & technology expert.

    He has been working for more than 20 years in the information technology industries, cybersecurity, financial, higher education, and life coaching.  He is also a motivational and leadership speaker.

    View my profile on LinkedIn

    Archives

    June 2022
    January 2021
    May 2019
    April 2018
    March 2018
    July 2017
    May 2017
    February 2017
    September 2016
    July 2016
    April 2016
    March 2016
    January 2016
    December 2015
    November 2015
    August 2015
    June 2015
    May 2015
    February 2015
    January 2015

    Categories

    All
    Android
    Apple
    Business
    Certification
    CloudComputing
    Coaching
    Computers
    Covid19
    Cyber
    Cybersecurity
    Education
    Employment
    Faith
    Goals
    Google
    Hackers
    Heaven
    Homeopathy
    Inspiration
    IOS
    IoT
    Jobs
    Microsoft
    Motivation
    Nature
    Online
    Potions
    Publication
    Remedies
    Research
    Security
    Skies
    Sun
    Technology
    Tips
    Work
    Zombies

    Subscribe to email updates, it's FREE

    *required

Copyright © 2023.  This site is part of Sapient Coach © 2023.  All rights reserved.  All content posted on this site is a commentary or an opinion, and is protected by freedom of expression.  Sapient Coach is not responsible for content written by contributing authors.  The information in this blog is provided for educational and informational purposes only.  It is not intended as a substitute for professional advice of any kind.  Sapient Coach © assumes no responsibility for the use or misuse of this material.  The use of this web site indicates your acceptance of these terms.  All brands, trademarks and service marks mentioned on this site are the property of their respective owners.

Designed by Blig Consulting

BligConsulting.com