Every time a news story hits about online accounts being broken into, it’s a reminder to take a look at just how secure your own accounts are. Katie Humphrey of the Star Tribune explains the different levels of online security you can setup.
In a perfect world, our accounts would be perfectly locked down. But there are some considerations to take into account when setting up your security.
How tight you lock down depends on your patience. “It’s security versus complexity,” said Derek Meister, an agent with Best Buy’s Geek Squad. “How complicated do you want to make that door lock before it becomes a pain for you to go through the door each day?”
Play Audio – WTAM 1100 Newsradio – Tech Tuesday – September 16th, 2014
As we move more of our important information online, from cloud-based storage to web-based email and financial software, the need for additional security around those accounts becomes clear. Relying on a simple username and password won’t cut it in a world where spyware and phishing attacks try to gather as much information about us as possible.
Fortunately, many online services are adding another layer to their security in the form of “2-Step Verification”. Sometimes referred to as “Two Factor Authentication”, this process involves an additional step during the login process to help confirm your identity by requiring “something you know” and “something you have”.
The knowledge part is your existing password. To add something you have, many sites will ask you to sign up your mobile number or download a special app for your smartphone. This allows a security code to be sent to the phone, which is entered after the password.
It sounds complicated, but many of us have been using 2-step verification for decades in the form of ATM cards. The “something you know” is your PIN, and the “something you have” is your ATM card. Just like the ATM process has become second-nature, so too will 2-step verification once you set it up and begin to use it.
For a complete list of services that currently allow 2-step verification, such as Google, PayPal, Facebook and others, visit twofactorauth.org.
Play Audio – WTAM 1100 Newsradio – Tech Tuesday – August 26th, 2014
According to a recent New York Times article, Android devices are a new target for “ransomware”. These malicious software apps act similarly to the fake FBI virus scams that have been attacking Windows PCs for years.
Fortunately, there’s several actions you can take to help protect your Android smartphone or device from these scammers and their malware apps.
Stick With Trusted App Sources
Android devices generally come setup for downloading apps from a trusted app store, like the Google Play Store. For extra security, you’ll want to avoid changing the settings on your device that allow 3rd party apps to be downloaded from the official app stores.
Sometimes called “sideloading”, allowing apps to be installed from less trustworthy places on the Internet increases your chances of accidently loading malware onto your device.
Keep Updated
Just like your computer, your smartphone’s operating system and apps need to be updated periodically. It’s important to keep watch for system update notifications as they come up. You can also check for system updates by visiting Settings, then About (or About Phone), followed by System Updates.
For app updates, visit the Google Play Store app, then the Play Store icon. Select My Apps to view your downloaded apps and any available updates. You can also touch the Menu button to check the “Auto-update” option to keep that app automatically up to date.
Practice Safe Internet Habits
A common attack method, known as “phishing” on the Internet, isn’t technical, it’s psychological. Scammers will create fake websites, pretending to be your bank or shopping site. They’ll send you emails asking you to sign in and provide your account information, which they’ll then use to access your account on the real sites.
Some malware attacks come in the form of banner ads designed to look like a security warning telling you viruses have been detected. The error will ask you to download and run what it claims is an antivirus app, but is really the scammer’s software waiting to load onto your device.
The same safe Internet habits you follow on your computer work on your mobile devices as well. If you do find yourself falling victim to one of these attempts, here is what to do if you are scammed.
Security Software
The rapid growth in the number of Android devices being used worldwide has made the platfom a growing target for malicious software makers. Keeping your settings in check, your system updated and avoiding unsafe behavior will often be the most powerful ways to protect your device. To help take your protection further, security software makers have made a range of protection products for the Android platform.
The good news is that many of the major security software suites, like Webroot’s SecureAnywhere Internet Security include Android security apps that you can install on your device in addition to their Windows PC or Mac coverage.
If you still have questions on how to best protect your Android device, or need help with a potential malware issue like viruses or spyware, speak to a Geek Squad Agent online at geeksquad.com/chat or at the Geek Squad Precinct located at your nearby Best Buy.
Quick tip for Magellan GPS owners: If you are getting a “Server Busy” error with the Magellan Content Manager software on your PC or Mac, the reason may be your password.
I discovered that the software does not like non-alphanumeric characters like “%” or “@” that security conscious users will add to their passwords. Change your password on the magellangps.com to only have alphanumeric characters (A-Z and 0-9) and it will launch right into your account.
This week, I spoke to Bill Wills on WTAM 1100 Newsradio about how the national wireless carriers are going to enable the use of “text-to-911” to allow 911 emergencies to be reported through the standard text messaging system on your mobile phone.
I also brought up the continuing threat of phone scammers pretending to be your tech support company. The Geek Squad Blog has more details on this ongoing attempt to fool the public into giving criminals access to their systems.