Write-ups on specific subjects regarding the technical world we live in. I tend to defer to the writings and teachings of other tech experts and influencers, but if there's something I think I can contribute, you'll find it here. Occasionally I'll post links to this content on Nextdoor, as PTSAs (public technical service announcements), to help spread the word about important matters.
If your personal information wasn't stolen as part of one of the recent data breaches, it's only a matter of time. It's not a question of if your information will be leaked on the dark web, but when. Government and corporate data breaches are now commonplace. And, phone, email, and text scams are not going away anytime soon. It's up to us to safeguard our data so that the most sensitive information isn't stolen. And if it ever is, we have protections in place to prevent those bad actors from using it to our detriment. As artificial intelligence becomes more significant, it's even more urgent for us to be vigilant when using our tech. This is the world we live in. It's up to us to prevent becoming victims and to help others do the same. The more proactive you are, the better. But at least take advantage of the free tools available today.
Things to Do...
Credit Security Freeze (3 Bureaus)
Free service that prevents anyone from obtaining a credit report to open an account in your name for a loan or credit line. You must request a freeze from all three bureaus.
Learn:
Credit Health Monitoring (Credit Wise)
Free service that provides active credit monitoring, targeted advice, tools, and alerts to protect your credit health. Also includes dark web monitoring and alerts.
Contact Vulnerability Check (Have I Been Pwned)
Free tool that allows you to check if your personal contact info has been leaked in a data breach. Free monitoring service also available.
Dark Web Monitoring (Google Account)
Free service that actively scans the dark web for any personal information leaked by data breaches, sends alerts, and provides helpful advice.
Google Search Monitoring and Data Removal
Free service that actively scans for personal contact information found on the web, sends alerts, and helps facilitate data remove requests.
Password Manager
Free and paid cross-platform service that allows you to save passwords, IDs, certificates, important documents, and more in an encrypted vault. If you use Apple or Android devices exclusively, use the free managers available.
Learn:
MFA (Authentication App or Passkeys when available)
Free tools that add an extra layer of protection to your login credentials for any supported site or app. Text message authentication is not the best option, but is better than using passwords alone.
https://www.iphonelife.com/
content/how-to-set-icloud- passkeys https://support.google.com/
android/answer/14124480?hl=en& ref_topic=7340889
Learn:
Ad Block Browser Extension (Adblock Plus)
Free tool that allows you to block annoying advertisements when browsing the web. Installs as an extension in most web browsers.
Email Aliases
Create and use a secondary email address, encrypted email, and/or disposable address or alias instead of your primary address to reduce the amount of spam received.
Learn:
Social Security Freeze (Social Security Administration)
Free government service that allows you to freeze access to your social security number. Prevents someone from using your SSN in an ID theft scenario.
Phone: 800-772-1213
Learn:
Personal Data Removal (Incogni)
Paid, automated subscription service that actively protects your identity by scanning the web and removing personal information.
Comprehensive Protection Service (Aura)
Paid subscription service that combines many of these tools, and more, to actively safeguard your personal information and help in the event of ID theft.
VPN (Built-in or ProtonVPN)
Free tool that helps prevent you from being hacked on public wifi, masks your location when streaming foreign content, provides outside internet access in restricted countries, and facilitates secure remote login to work servers.
Learn:
Encrypted Messaging (WhatsApp, Signal)
Free apps that help keep your conversations private. Right now, this is entirely dependent on all parties using the same app and settings. These are the most popular and secure at the moment.
Learn:
McAfee or Norton Anti Virus
While once these were the stars of online protection, they are now regarded as expensive bloatware and are unnecessary today. They can actually do more harm than good.
Learn:
Both Windows and Macs have adequate built-in antivirus and malware protection, so alternatives are not needed. But if you must, try these for redundancy.
Suspicious, Unknown, Junk Emails
Unexpected emails should always be treated with suspicion. Don't click or open them. Many legitimate looking messages are actually fakes, attempting to rob you of personal information or money.
Learn:
- https://www.cisa.gov/news-
events/news/avoiding-social- engineering-and-phishing- attacks - https://kb.ucdavis.edu/?id=
0838
I get spam and junk emails daily at my secondary email address. Many are phishing attempts trying to steal money or personal information. The following screenshot shows a sample of emails received over a few weeks. The ones circled in red are some of the most prevelant scams.
Calls from Unknown Callers
Most unknown calls should be blocked or screened to avoid potential ID theft and financial scams. Only answer if you are expecting a call. If it's anyone else, hang up. Many scammers are only looking to record your voice for nepharious purposes.Learn:
Enable your phone's included unknown call blocking and call screening features or use the service provided by your cell phone provider. Third party apps are available but may not be very reliable.
https://support.google.com/phoneapp/answer/3459196?hl=en
Unofficial Apps
Unless you know what you're doing, only download and install apps from official app stores like Apple App Store and Google Play Store or direct from the creator's official website.
If you use an Apple, Android, or Windows device to search the web, send emails or messages, take photos, use Face ID, talk to Google Assistant or Siri, etc., you have been using some form of AI already. As more advanced capabilities roll out, an even more personal profile about you will be made and potentially stored. Although the intent is to help make our lives easier, if your data is ever hacked and misused, it can be personally devastating. That said, AI is not something to be afraid of. There are safeguards in place and we can choose to disable certain features. When the choice is taken from us, then we can worry.
Learn:
If you'd rather use more privacy focused AI tools, there are other options besides those built into your devices. One of the simplest and most popular, is Brave.
I'd be happy to help guide or assist you in implementing these tools. Or, if you suspect your computer has been compromised with malware, schedule an appointment with me to assess, clean, optimize and secure your system to prevent future attacks. Just click the 'BOOK NOW' button at the top of this page. Services provided in-home to residents of the NE San Antonio area and surrounding communities.
#privacy #cybersecurity #security #dataprotection #technology #hacking #datasecurity #infosec #tech #informationsecurity #hacker #cybercrime #cybersecurityawareness #data #dataprivacy #malware #cyberattack #internet #cyber #ethicalhacking #gdpr #encryption #hackers #databreach #phishing #ransomware #blockchain #programming #protection #safety #cryptocurrency #vpn #ai #cybersecuritytraining #computer #informationtechnology #it #news #hack #cybersecuritynews #socialmedia #socialengineering #baiting #scareware #pretexting #spearphishing #smishing
To better serve my local community, my service area is limited to a few miles from my home in Wortham Oaks on the far NE side of San Antonio. The current boundaries are from N Hwy. 281 to Green Mountain Road and from TPC Parkway to NE Loop 1604.
© 2024 SavvyGabe.com All Rights Reserved.
Some content is used with permission or considered fair use. SavvyGabe.com is in no way sponsored by any company, affiliate, or subsidiary referenced herein.