|
Since the pandemic started in 2020, there have been a record-breaking number of data hacks. While there have been a few instances of insider cyber theft and good old fashion data breaches, many of the cyber thefts that have occurred can be traced to the dark web.
The dark web is the underbelly of the internet where a lot of criminal activity like human trafficking, drug dealing, and the exchange of your personal data takes place. How does your information wind up on the Dark Web? Well, check out these quick tips that will help you find out how your information winds up there and what you can do to protect yourself. The dark web has been around and has stayed under the radar for quite a while. If you want to picture where the dark web fits in in the grand scheme of the internet, think of the structure of an iceberg. Most of you are only familiar with what I will call the Surface Web. Like the tip of an iceberg, it's the portion that's visible. Sites like your email, streaming services, cloud services, and your favorite websites exist there. Believe it or not, your popular sites only take up about 4% of the Internet. Beneath the waves are the deep web and the dark web. The Deep Web makes up about 90% of the Internet and isn't accessible by the average person. This is where much government, academic, and medical information is stored. At the bottom taking up the remaining 6% of the Internet, is the dark web. Information on the Dark Web isn't indexed but can be accessed by using web browsers like Tor making it easy for any criminal to search and find countless data about you, your family, and friends. How Do Criminals Get My Information from the Dark Web? The primary items that hackers look for on the dark web are called "Fullz". This stands for "full package" and it refers to your personal information. It's a collection of your name, social security number, birth date, banking, and credit card numbers as well as other data that can be used to steal your identity. How Does My Information End Up On the Dark Web? The primary method of your information showing up on the dark web is from large-scale data breaches. Information targeted in those breaches is usually, customer and employee data, your email, phone numbers social security numbers, and more such as classified company data to get access to corporate sites and employees. When criminals get their hands on this information, they either sell it to the highest bidder or they use the information to get access to your online accounts or trick you into giving up your personal information in the form of phishing, vishing, and SMShing scams. What's on the internet and the dark web is there forever, which means once your information has been leaked, there’s virtually nothing that you can do about it. That’s why it’s essential to focus on taking preventative measures to mitigate security threats before there’s a problem. With this in mind, it pays to be proactive using the following methods: 1. Find out what information is lurking on the dark web. The website 'haveibeenpwned' can help you find out if your information was leaked in a large-scale data breach. If you visit the website and find out you have been "pwned", make sure you change your passwords to your online accounts. 2. Password managers can help you monitor as well. Password managers not only help keep track of all those complicated passwords, but they also monitor the dark web to see if any of the passwords you're using have appeared on the dark web. It's useful because criminals don't always act immediately if they get your information. There are password managers such as LastPass and 1Password that will keep track of your stuff, but you can also save your password in your favorite browser such as Edge, Safari, or Chrome. 3. ID Theft software plays a big role in helping you stay safe. If you find yourself in a situation where your information such as social security numbers, addresses, and full names leaked on the dark web, you should make the investment. in ID theft software. When criminals get access to this type of information, it can allow them to take out a loan or open a credit card in your name, receive your tax refund or medical treatment they didn't pay for, and damage your finances, credit score, and reputation. There are a lot of companies like LifeLock that can help guard your identity and finances from scams and hackers, as well as assist you if you have become a victim of identity theft. Ignoring cyberthreats and postponing preventive action is no longer an option. It doesn't matter what your financial situation is; you are being targeted by dark web hackers looking to capitalize on your personal information. I hope you can use these tips to prevent your information from being stolen by hackers. If you need further assistance, please reach out to me with any questions you might have. I am always happy to help! Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829.
0 Comments
I travel quite a bit to speak on technology/cyber security and I'm always worried that somebody is watching me with a hidden camera. Call it paranoid or perhaps thinking I'm James Bond when I travel. When you think of hidden cameras, you probably think of the latest spy movies, but because of technology hidden cameras are becoming more common and can be set up by anyone.
These devices can possibly be set up anywhere you stay from your home, rented apartments, hotel rooms, even your office, and that Airbnb you're staying in this spring or summer. In today's Internet-connected world, you never know who might be spying on you and your family. Here are some quick and easy tips to help you find hidden cameras where you're staying as well as other tips to stay safe. I'm by no means a celebrity, but for even the average person you should be worried about Wi-Fi cameras. The good news is that cameras are pretty inexpensive, and they can connect to any Wi-Fi connection which allows anyone who has a smartphone and the camera app to monitor homes and offices. There are property owners who use them to protect from damage or theft which makes Wi-Fi cameras a great thing. On the flip side, you could have an abusive partner a prankster, or an extortionist who will take advantage of this technology. Much like AirTags have been transformed by abusers to track your movements, people will pervert tech to take advantage of you. You might think it's fiction, but a recent survey of Airbnb users showed that 11% of people who have stayed at one have come across a hidden camera. What's even worse, Wi-Fi cameras can be as small as 2 millimeters. How can you detect hidden cameras? Use the old fashion method of physically checking your surroundings. When you stay in a new place put your detective hat on. I always open drawers, look at lamps and paintings just like in the spy movies, and I suggest you do the same any place you stay. Are there holes in the wall? Are there objects pointed at the bed? Strange things in the bathroom that don't belong? If you're looking for that red light identifier of a camera, you won't find it. The purpose of small Wi-Fi cameras is to stay hidden. Use your smartphone. You know you can ditch any special equipment and use your smartphone camera and the built-in flashlight. To use this trick it has to be dark so turn off the lights and close the curtains. Point your smartphone where you think the hidden camera is and you should see a glare on the screen of your smartphone. Sometimes your smartphone won't let you use the flashlight, which means you will have to use a separate flashlight. Also, there are brands of spy cameras that use infrared to record in the dark. If you use your smartphone camera in the dark to find an infrared camera, it should show up as a pulsing dot. What to do if you detect a hidden camera. Truth be told, webcam spying isn't going to occur when you're staying in larger hotel chains. If you find something that looks like a camera, take a photo of it and do an image search to verify it is indeed a camera. If it is indeed a camera, contact the local authorities, the administrator of the place you're staying. Most places have rules against hidden cameras. I know it sounds obvious, but it's best if you leave the property immediately. It's always better to be safe than sorry. I've given you tips to make sure you don't fall victim to a prankster or a landlord who may be filming you without permission. Whenever you're on the road for business or personal, there are more dangers than hidden cameras. Here are some tips to help you stay safe whenever you're in unfamiliar surroundings:
Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com In this cyber-crime environment we are currently in ,it’s more important than ever to keep your data safe and to keep a level of privacy while you surf the web. Using a VPN (Virtual Private Network) is a great tool you can use to stay safe online. It creates a tunnel for your Internet, which means criminals and other prying eyes can't see what you are doing when you're online. With so many VPN companies out there, it can be hard for you to choose which one is right for you. Read on to find out how to choose a VPN that will work best for you.
VPNs have been around for a while, but the discussion about VPNs is appearing in mainstream media because they are being used in Russia to get around some of the restrictions the Russian government is placing on its citizens to prevent access to western media. Also, with many companies switching to a remote workforce, VPNs offer remote workers privacy and security as they can work anywhere in the world and keep company information safe. Do You need a VPN? There are many schools of thought of whether you need a VPN and sometimes that depends on your Internet habits. Here are some things to consider.
1. Beware of 'free' VPNs. Free is everyone's favorite price when it comes to online services, but nothing is really free in life and online. If you decide to use a free VPN service you may be bombarded with ads from other companies. Also, free VPN services won't offer robust security and could easily be compromised. The web browser Opera offers a VPN built into it's interface. It's fairly simple to use and is pretty good. However, it does have some weaknesses and should only be used if you want to keep your searches private if you're looking at social media and email. 2. Where your VPN provider is located matters. Kaspersky is an anti-virus company based out of Russia. Although there isn't any proof they are selling your secrets to Russia, in this day and age would you want to take that risk? Same with your VPN provider. These companies have to comply with the rules of their country ... which means their laws can allow them to share your data. 3. Watch those reviews. Yes, product reviews are good in helping you select hardware and software, but in this Amazon and online review age, not all reviews are honest. Some companies pay people to leave reviews. Check multiple websites for VPN reviews and reach out to your favorite tech expert (like me) to find out the right VPN for you. 4. Check out the privacy policy. When you use a VPN, all of your traffic is routed through their servers to help keep your information safe and secure. If you're using your office VPN, that just means the folks in IT can see your information. If you're using VPN services from another company, they can see where you're going. All VPN providers need to keep a log of sites you're visiting, but they aren't supposed to share that information unless the authorities come to see your online activities. No one likes reading the terms of service, but when you're working with a VPN provider that's supposed to keep your information safe, you need to. 5. Will the VPN work with all of your devices. If you're like me, you work off multiple devices. I'm writing this article from a MacBook Air, but next month I could write my blog post from my Dell 2-1 laptop, my MacBook Mini, or my Dell desktop. You get the picture. Most VPNs support Windows, Mac, Android, Linux, and iOS, but not all of them do. Check to see see how many devices you can connect to at once. Some VPNs allow unlimited devices, while others only let you connect a limited number. 6. Get good customer service. Look for a VPN with reliable 24/7 customer service. VPN service is reliable, but you know that tech challenges appear from time to time so work with a company that will get back to you in a short amount of time. If your head is spinning after reading all of this information, check out my favorites for VPN services.
Although the internet has made your life easier, there are definitely risks involved in surfing the web. There are many threats you face daily, such as spam emails, hijacked websites, and compromised social media accounts which can cause identity theft and a loss of money.
With all of the dangers on the internet, you're probably wondering if now is the time to invest in cyber insurance. Depending on your situation and risks, it could be a good idea to look into it. Check out this post to see if you need to get cyber insurance for yourself and your family. What is cyber insurance? Cyber insurance, also known as cybersecurity insurance, has been around since 2017 was first created to cover the millions of dollars of damage companies suffer due to hacks and data breaches. Not long after, cyber insurance was created for individuals. Most cyber insurance policies will cover damages and expenses related to cybercrime, including:
Your policy could also cover the expense of recovering from ID theft or the loss of data that could occur in a data breach. There are so many different cyber threats that it’s impossible to list them all here, but most cyber threats should be covered under a fully-featured personal cyber insurance policy. How does cyber insurance work? Most insurance providers offer personal cyber coverage as an addition to your homeowner's or renters' policy. You can also purchase it as a stand-alone policy. There are limits to cyber insurance. Many policies will only cover a total amount of damages per year and there is a limit to the number of damages that are covered for a particular event. For example, you may only get $30,000 for ID theft. Finally, there is a deductible you will need to pay for out of pocket. Why would you consider cyber insurance? According to the Pew Research Center, nearly two-thirds of Americans have been exposed to data theft. If you've been under attack by online thieves, you understand the expense that is involved in recovering from a cyber-attack. It can take countless hours and thousands of dollars trying to re-establish your credit rating and reissue official documents such as social security numbers and your driver's license. Also, if you have tweens and teens, the risk of cybercrime increases as there are many social media and gaming sites they visit on a daily basis that can expose your family to dangerous threats. Also, your children are more likely to fall for phishing, vishing, or smishing scheme. Stopping cyberattacks is always your best bet. Cyber insurance offers some good protection but isn't enough to keep you and your family protected. 99% of cybercrime requires user interaction which means as long as you don't click on strange links in emails, text messages and stop sharing your personal information on social media and those weird phone calls that come in, you will stay safe from most threats. If you follow these six simple tips, you can avoid the vast majority of cyber threats:
Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Tax season is in full swing which means scammers are on the lookout for you, your tax information, and your refund. When you file your taxes online, it allows you to quickly get your taxes completed and the fast track to a quick refund. The downside to when you file online, it puts a big bullseye on your back, making it easier for crooks to track you with tax-related scams.
Want to stay safe? Check out these quick and easy tips to help you avoid criminals and scams this tax season. There are many tax scams that criminals use to trick you. Check out these scams and tips to avoid them: 1. IRS phishing scams. IRS scams occur constantly and are one of the many forms of a phishing scam. IRS scams are so prevalent that the IRS is in the process of considering having tax preparers upload a headshot to decrease scams. With an IRS scam, you will receive an “urgent alert” via email or phone call from someone claiming to be from the IRS. There are many tactics they use to trick you such as: You owe a large amount of money; You’re due a large sum of lottery money, tax refund, or inheritance; The IRS needs you to update your online profile. In all of these cases look for generic greetings (instead of your name), poor grammar or typos, and conflicting web addresses. The IRS doesn’t initiate contact with you via email, text, or social media. They will never email you regarding any amount owed, or due. They will contact you via the U.S. Postal Service. 2. Social media tax scams. If you're like most people on social media, you're sharing a lot of personal details that scammers can use to take advantage of you. Criminals can use your personal information to get secure details about your life which can lead them to the dark web to see if your social security number or other information is there. 3. Fraudulent tax returns filed in your name. Tax-related identity theft happens when criminals steal your personal information, which can include your Social Security number, address, birth date, and other information, and use it to file an income tax return in your name. The sole purpose of this is so that crooks can steal your tax return. Have you had this happen? Check out the following signs: The IRS notifies you that an online account has been created in your name at IRS.gov and you know that you never signed up for such an account. You file your taxes by mail. The IRS then sends you a letter stating that a tax return has already been filed with your Social Security number. You try to file your return online only to have the IRS reject it, saying that a tax return connected to your Social Security number has already been filed. 4. W-2 phishing scams. In a W-2 phishing campaign, criminals pose as someone high up your company or organization. Then they send emails to you and other people in your organization asking for copies of W-2 forms, which include all the personal information you need to file a tax return. Sometimes these scams can occur if you accidentally send your W-2 via email and a criminal gets access to it. Don’t respond to emails, calls, or texts asking for your information. Never send W-2 or other tax information electronically without first verifying with your boss in person or on the phone that they actually sent the request in the first place. While it might seem like a hassle, it’s worth it to spend a few minutes verifying than spend years trying to undo any damage. More Tips to Stay Safe: The IRS will not call you demanding immediate payment through a prepaid debit card, gift card, or wire transfer. If you do owe the IRS money, they will first mail you a bill, and you will never pay the IRS through prepaid debit cards, gift cards, or wire transfers. Scammers like to use these forms of payment because they are difficult to track. The IRS will never threaten to have you arrested. The IRS will never demand payment without allowing you to question or appeal what you owe. The IRS will never ask you to give them your credit or debit card numbers over the phone. The IRS will never suddenly call you about an unexpected refund for you. Avoid falling prey to IRS scams by keeping your information and identity safe. Watch what you share on social media, avoid sharing your phone number with unknown people and keep your email private. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts can help you with any IT needs you might have. Reach out to us at www.callintegralnow.com or phone at 888.256.0829. With Russia hammering Ukraine with cyber-attacks, there's a good chance Russia could set its sights on the U.S. Private and state-sponsored cyberattacks from Russia targeting the U.S. government and businesses have increased during the pandemic, including the Solarwinds attack and the Colonial Pipeline attack last year. With the conflict, here are some of the U.S. cyber-attacks that could occur.
Truth be told, most of you won't have to worry about cyber-attacks from Russia other than the standard attacks that occur in your everyday lives. If Russia attacks the US in a cyberwar, they will target our military, our government, our infrastructure (gas, power, and water companies), and our financial institutions. Although 99% of cyber-attacks require you to click on a link or volunteer your information, you still need to be aware of some of the attacks that could occur in the future as they may affect some of the services you use in your daily life. Here are the type of attacks you might see: WIPER attacks. This new form of cyberattack is simple. Infect a computer and wipe all of the data. This could be devastating to financial institutions and infrastructure computers. With information wiped from computers and networks, it could cause a total loss of information, and infrastructure failure could send a city or a state back to the Stone Age. Ransomware Attacks. Ransomware attacks are dangerous because they encrypt data and demand a high ransom to get the data. Ransomware attacks normally just encrypt files so they aren't accessible. With new Ransomware attacks, criminals will not only lock your files but will threaten to release them on the web as well. DDOS. Direct denial of services attacks occurs when criminals sent bots and other malicious programs to block internet traffic to your websites and email servers. These attacks are dangerous because they can disrupt business operations and in the case of public works or banks and other financial institutions, bring them to a screeching halt. Phishing, Vishing, and Phishing. Phishing attacks come in the form of email, voice, and text and are the primary way criminals attack computers and devices. Phishing attacks occur when cyber crooks pretend to be a person of authority and are devastating when people fall for these attacks and give out valuable information such as passwords and other private data that could be used to bring down a business or government institutions. In this day of remote work, it's easy for a criminal to target remote workers to get inside information. Remember the Twitter hack of 2020? It occurred because a remote worker gave sensitive data to a criminal posing as an IT staff member at Twitter. Fakes News and Alerts. Social media is the breeding ground for creating fake information and fake alerts. Russian bots, fake social media accounts can be used to spread misinformation and also be used to cause cyber-attacks on individual and business accounts. Charity Scams. Whenever there is a local or global crisis, you can always count on charity scams to pop up. It's easy for anyone to set up a GoFundMe or a social media post asking for financial support for victims of a traumatic event. Always verify charities before you send them money. With cybercrime, it's hard to know where Russian government hackers are and if they are lurking within critical systems in the U.S. and how much damage they can cause. Most organizations in the US are prepared for cyberwarfare, but it's always good to know what attacks could occur to give you a better understanding of what can happen and what things you need to watch out for. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. ![]() by Burton Kelso, The Tech Expert New Year's Day always celebrates out with the old and in with the new and that's a refreshing thought as you begin to think of getting rid of old habits and starting up new habits. When it comes to your tech devices, it's another story as your tech devices. Tech never lasts forever as big tech companies are always looking for ways to push shiny devices in your face and as a result, it means your favorite tech gadgets will no longer be supported. Worried about what's going away? Check out these devices and technologies that may become obsolete and disappear this year.
BlackBerry. I know many of you probably think Blackberry has been obsolete for years, but there is a small community of people who have been hanging onto an older BlackBerry phone running BlackBerry OS. If you have used a Blackberry for years, that changes because BlackBerry is ending support for legacy services for BlackBerry OS and BlackBerry PlayBook OS. eReaders. eReader sales have been in a steady decline for the past several years. With the emergence of eReader apps and larger screens for smartphones and tablets, people are satisfied with using one device to handle most of their technical tasks rather than having a single device for each tech chore. Dashboard mounted GPS Devices. GPS isn't going anywhere. It better not because I would never find any destination. Think about it, when was the last time you saw someone with a TomTom or Garmin mounted to their dash? When making a journey from point A to Point B, your in-dash GPS or smartphone is your device of choice. 3G connectivity. Like it or not, 5G connectivity is taking over in 2022. 4G will still be around, but 3G will be no more. Many tech devices such as smartphones, tablets, medical devices will be affected by this change. Check with your device provider to see if your device will work without 3G. Wired audio devices. The emergence of Bluetooth has pretty much spelled the end of devices that use headphones and connected speakers. It's also made its way into automobiles which helps create an environment that helps you keep your tech connected to your car keeping you safe. With smartphones no longer being manufactured with headphone jacks and more wireless products showing up on shelves, it won't be long before wired headphones and speakers are gone. USB-A ports. USB C is becoming the standard USB port on tech devices. It doesn't matter if you have a Windows or Mac laptop or an Android phone, the USB C is the go-to port. Also, the industry is begging for all tech devices to have one charging port. Once Apple makes an iPhone with a USB port, old-school USB ports will be gone like the Dodo Bird. External Hard Drives Physical Storage. I'm sure you have an external hard drive or thumb drive laying around your house collecting dust. Cloud storage of your documents, photos, and videos on platforms like Google Docs, iCloud, or Microsoft Office 360 gives you peace of mind that you can access your devices anywhere in the world as well as not worrying about losing your USB Flash Drives or external hard drives. Point-and-Shoot Digital Cameras. Smartphone cameras are so advanced, that many professional photographers and video creators are ditching their digital cameras for their smartphones. When was the last time you took your point-and-shoot camera on a family vacation? Passwords. Thanks to fingerprint, eye, and facial scanning passwords could be phased out this year. Most tech devices such as Windows and Macintosh computers, as well as smartphones and tablets, use biometric recognition to authenticate your identity and enter passwords on your behalf. Also, the traditional use of passwords will go away with sites and devices requiring you to enter passphrases instead. Keep in mind that just because a device becomes obsolete doesn't always mean that you will no longer be able to use those gadgets. Some devices can have a limited life. For example, for those tech devices that won't work on 3G, you may be able to connect those devices to Wi-Fi and get limited use from them. However, for most devices it will mean you need to recycle those outdated devices responsibility It also means that you won't get help from the manufacture like you would a device that is supported. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. You may not be aware of this, but starting early 2022, 3G service will no longer be available. Cell providers are planning to shut down the old network to make room for 5G service which provides higher speeds and greater reliability.
The shutdown affects more than your mobile phone. This will disable systems in older tablets, vehicles, home alarm systems, and medical alert devices. This means you will no longer have access to 911, phone calls, and text messaging as well as the ability to connect to mobile hotspots, unlock your car or have that medical device call for help. Not sure what to do? Check out these tips to help you stay connected to the services you need. When is it happening? AT&T is the first provider shutting down as it will pull the plug on 3G in February. T-Mobile will shut down Sprint 3G networks on March 31. T-Mobile’s own 3G networks will be gone by July 1. Finally, Verizon will end service on December 31, 2022. You're probably breathing a sigh of relief if you didn't see your carrier listed here, but that doesn't mean you won't be affected. Many small carriers use the 3G networks of the big three cellular networks, so you will need to check with your cell provider to see how you're affected. This also means you need to check with your medical devices, tablets, smartwatches, home security systems, and other products that still depend on the 3G network. What can I do? Your first step is to check with your cell provider. Depending on who you use, you may have already received a letter letting you know that your devices will be retired. If your device is no longer supported, you will need to upgrade to a newer device to ensure that you can stay connected to the network. You may think that this is the same process as when we switched from analog to digital over the air TV service, but unlike that process where you just need to get a digital antenna, there is no way to upgrade some devices to work on 5G. Some devices only need a software update to enable VoLTE (HD Voice). Call your provider to check whether your device is 4G LTE (with VoLTE or HD Voice). This can be done by checking the phone’s settings or user manual. You can even do a search online to determine whether you need to purchase a new device or install a software update. What can I do with my older devices? Some devices like e-Readers, smartphones, and tablets may continue to serve you as mini-computers by connecting them to your home or office Wi-Fi. They can get a new life if you allow younger members and older members of your family if they want to download and play apps. Other devices will have to be retired permanently by taking them to your favorite recycling company. With the obsolesce of these devices, you couldn't even list them on Facebook or Craigslist as they will be no use to anyone. Want to ask me a tech question? Send it to burton@callintegralnow.com. I love technology. I've read all of the manuals and I'm serious about making technology fun and easy to use for everyone. Need computer or technology help? If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. Our team of friendly tech experts can help you with any IT needs you might have. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. ![]() by Burton Kelso, The Technology Expert Happy New Year everyone! With the new year, I'm sure you want to make positive changes in your life. With resolutions, we always tend to focus on improving our relationships, finances, and health.
With technology playing a big role in our lives, you need to consider changes to your digital life as well. The good news is that you don't have to be a technology expert to resolve to get better with the tech in your life. Not sure where to start? Well, I've put together a list of tech resolutions that will help you get more from the technology you use at home and work. 1. Get Serious About Cyber Security. Cybercrime was huge in 2021 and it's only going to get worse in 2022. First, understand that all of your devices have the protection you need against threats on the internet. As long as you keep your devices up to date, you are protected. Most of the scams and viruses require user interaction in order to cause problems, so be cautious of websites you visit and emails that show up in your inbox. If your information was leaked in a data breach, make sure you take action immediately, by changing your passwords for your online accounts. If you don't, your accounts can become susceptible to 'credential stuffing' which is where criminals use your information leaked in data breaches to take over your online accounts. 2. Be Kind To Your Data. If you love your data, you will want to make sure you are backing up your precious data automatically ... to the cloud. External hard drives are great, but if you're like most people you don't hook them up to your devices all of the time to perform a backup. Cloud backup offers the ability to have your device information saved as a backup as soon as you create it on your device. 3. Keep Your Devices and Accounts Secure. You want to make sure your computers and smart devices are password protected and your accounts have different passwords. If you haven't enabled 2-factor authentication for your online accounts, you need to do it immediately. This way, if your accounts are compromised, criminals can't get access to your information. 4. Show Your Devices Some Love. Upgrade to Windows 10. Microsoft is ending support for Windows 7 this month. If you have a Mac, you need to update to High Sierra, Mojave or Catalina. Make sure your smartphone, tablets and your smart home devices have the latest security updates installed to keep you safe from all of the bad things and people on the Internet. 5. Unclutter your Devices and get Rid of Old Tech. Yes, you spent money on those devices, but when they are obsolete it's time to get rid of them. Take them to your favorite recycling center or give them away to someone who can still use them. Some places like Amazon offer trade-ins on old technology. While you're trashing your old tech, delete those old programs and files to keep your devices clutter-free. 6. Set Boundaries with Yourself and Your Family. Don't let your digital life take over your real life. Modern technology is designed to keep you and your family plugged in so you become addicted to your devices. Most adults have the brainpower to switch off technology, but if you have younger members in your household, it can be hard for their brains to disconnect. Choose times and areas in your house where technology use isn't allowed. Life is short, make sure you're making the most out of it. If you follow these tech resolutions for the new year, you should have a worry-free and enjoyable digital lifestyle for yourself and your family. Want to ask me a tech question? Send it to burton@callintegralnow.com. If you prefer to connect with me on social media, you can find me on Facebook, Instagram, LinkedIn, and Twitter and watch great tech tip videos on our YouTube channel. I love technology. I've read all of the manuals and I want to make technology fun and exciting for you. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. My team of friendly tech experts is always standing by to answer your questions and help make your technology useful and fun. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. Let's face it, we all love our smart devices and most of you probably can't imagine a minute without them. I'm even guilty of it, but we all need to unplug sometimes and take a break from technology, especially during the holidays.
It's important to capture those special moments, but you don't have to post every photo on every social media site to show how your holiday was. This holiday season, focus on putting your phones down and interacting with the people around you. Need help? Here are 6 ways you can unplug and recharge this holiday season. 1.No Devices at Mealtime. Designate all mealtimes as periods where devices are put away and face-to-face conversation can be had. That's how our grandparents used to do it! 2. Discuss and write down goals. Let your kids be a part of setting the goals and sharing their input. Schedule (limited) time that both the kids and parents can use technology. 3. Stick to your guns. Like every good goal, it needs to be enforced. Parents, let your kids know you are serious and set tech time limits. Your kids can help keep you in line as well. 4. Use technology together. If you must have access to the Internet and use technology, use it together. Look for games and activities on apps that everyone can play together. 5. Don't check it if there isn't a notification. Kids watch and learn from their parents. If you are constantly checking your phone, your kids will too. Think before you check; use downtime to improve family time rather than your relationship with friends and coworkers. 6. Go old-fashioned style. Challenge each other to have fun offline. Play versions of your favorite games that don't require technology. Get creative! Want to ask me a tech question? Send it to burton@callintegralnow.com. If you prefer to connect with me on social media, you can find me on Facebook, Instagram, LinkedIn, and Twitter and watch great tech tip videos on our YouTube channel. I love technology. I've read all of the manuals and I want to make technology fun and exciting for you. If you need on-site or remote tech support for your Windows\Macintosh, computers, laptops, Android/Apple smartphone, tablets, printers, routers, smart home devices, and anything that connects to the Internet, please feel free to contact my team at Integral. My team of friendly tech experts is always standing by to answer your questions and help make your technology useful and fun. Reach out to us a www.callintegralnow.com or phone at 888.256.0829. |
Categories
All
Archives
May 2022
|
Grain Valley NewsGrain Valley News is a free community news source published weekly online. |
Contact Us |