Day: October 16, 2017

Tips & Tricks: Bring up the system information window

This is so much quicker than digging this out the traditional way… Just press Windows + Pause/Break and the System Information panel will be ready to go. This might be the only use for the Pause/Break key you will ever find, so enjoy it!

Advertisements

National Cybersecurity Awareness Month Week 3: Today’s Predictions for Tomorrow’s Internet

Smart cities, connected devices, digitized records, as well as smart cars and homes have become a new reality. Week 3 will remind citizens that their sensitive, personal information is the fuel that makes smart devices work. While there are tremendous benefits of this technology, it is critical to understand how to use these cutting-edge innovations in safe and secure ways.

What is the Internet of Things (IoT)?

According to Gartner, the IoT is defined as: ” is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.” More and more of our devices are connected to the Internet, but most users do not really think about the security vulnerabilities. This includes everything from kids toys to appliances. Many companies rush to get their devices to market and do not take into consideration user’s security. For example, CloudPet’s, “The database behind an internet-connected cuddly toy exposed the account information of over 800,000 users, while a database of over 2 million voice recordings of children and their parents was stored in a way which left them easily searchable on the internet.” So, how does this affect you?

 

 

Tech Terms: Android Mobile Security

Mobile security applications for Google’s Android platform help protect Android smartphone and tablet mobile devices from malware threats as well as unauthorized access following accidental loss or theft of the device.

Additional security features frequently offered by Android mobile security apps include securing data on the device, VPN connectivity for protecting data in transit, scanning websites for potential phishing schemes or other fraudulent activity, helping users locate their device if lost or stolen, and more.

Android mobile security applications are available from Google as well as well-known third-party security vendors such as Lookout, Avast, Kaspersky, Symantec and Qihu. 

Source