Monday, December 15, 2014

Be Careful When Using Wi-Fi

Be Careful When Using Wi-Fi

What's the issue?
Whether you are connecting to Wi-Fi (wireless networking) with your laptop, tablet, or smartphone... whether at home, at work, or in public... be aware that your privacy and security are vulnerable to hackers.

To clarify, Wi-Fi is not used when connecting to your cell provider's data network. It is accessed most commonly from a wireless router at home, work, or in a public setting.

Why care?
Wi-Fi is not a secure transmission medium, even when encrypted. This means information you exchange across the wireless network is not secure--your confidential information. This includes casual websurfing, email use, and e-commerce.

To illustrate, when connecting to Wi-Fi at Starbucks (via the Google network there), you are presented with this snippet from their terms of use: "You understand that This Wi-Fi... is not inherently secure and that wireless communications may not remain private or free of interception or access by others. We will not be liable to you or any other party for any lack of security that may result from your use of This Wi-Fi..."

Google is making it crystal clear that Wi-Fi is not inherently secure and that you are responsible for your own security. This applies anywhere you are using Wi-Fi, especially outside of your home or business network, which hopefully you have already secured--that is, reduced, not eliminated, the risk of hacking by using the best encryption available. 

How to best protect yourself when using Wi-Fi?
Without getting too technical, a best practice is to only use Wi-Fi when connected via a VPN (Virtual Private Network). One program providing this type of protection is Hotspot Shield by AnchorFree. They offer free and paid versions. 

After you install their program, whenever you connect to Wi-Fi, you can run the shield to access the Internet via a secure, encrypted tunnel (VPN). 
You can obtain the Hotspot Shield software here

When should you do it?
Any time you connect to Wi-Fi do so via VPN. If you can't, be very careful about what you do online. For example, avoid banking, shopping, and any sites that require password login. 

Where can you learn more on this topic?
You now know what to do as a user of Wi-Fi. In addition, here are some best practices for setting up Wi-Fi at your home or office.

Who can help?
If this all seems too technical but you are concerned and want to be better protected, you may want to hire an IT consultant. This is an especially good investment if you are responsible for data security in an office environment. 

In Sum
Wi-Fi is wonderful technology. It gives us access to online resources in diverse locations worldwide. However, we must reduce the security risks when using it so we don't get taken advantage of, which is increasingly common.  

Thanks for reading. You're feedback is appreciated!

Aloha, Sam

You can subscribe to email tips by visiting www.kokuadigital.com and entering your name, email, and "add to email" in the request form. 

Saturday, November 15, 2014

Safeguarding Your Smartphone

Safeguarding Your Smartphone

What's the issue?
In a previous post I recommended taking stock of your wallet items that could be exploited for identify theft and other illegal purposes. Now that you've done that chore, let's move onto another commonly carried digital data asset that's targeted by criminals: your smartphone.  

Why care?
Your smartphone--be it an iPhone, Samsung Galaxy, Blackberry, etc.--likely contains or can give access to bank accounts, social security numbers, birth dates, passwords, etc., not to mention emails and private photos. Do you want any of that in the hands of someone you don't trust?

How to protect yourself?
Though this sounds like a major chore (and can be!), but I suggest making an inventory of confidential data on your phone so you know exactly what you stand to lose. The only personal data somewhat safe to keep on your phone in the Contacts program, for example, is names, addresses, and emails. Don't store birth dates and other confidential info. 

For storing confidential data like birth dates, account numbers, passwords, etc., I recommend a program such as LastPass, which you can sync between your phone and their secure website (https://lastpass.com/f?7616566 ). This means in addition using the LastPass app on your phone you can log in from any computer to the website to also access your private info. You can learn more about LastPass on their site.

And though convenient, it's really best not to do any banking on your smartphone. Here's one of many articles explaining the dangers of smartphone banking.

Also be aware that cybercrooks can crack your smartphone's login password, so don't trust that alone to block access. It's best to set up encryption so if someone does steal the phone, it will be more difficult to access the data. Check the website for your phone's vendor for how to encrypt it.

Another option to set up on your phone is remote wiping. You can use this feature in the event you suspect the phone has been stolen. Check with your smartphone vendor's website for instructions to set this up. Be aware after wiping the phone you'll lose any data that's not backed up. 

When should you do it?
Take inventory of the confidential data on your phone as soon as possible. Block out one hour to sit with your phone some place without distractions. Get a pad of paper and jot down your concerns about what's on your phone, then try on your own to whittle down your exposure and beef up security per the suggestions above. 

Where can you learn more on this topic?
This website provides a list of best practices for more secure use of your smartphone.

Who can help?
You can take your phone to the store where you bought it for tutoring and advice on this topic. You can also call your service provider, such as AT&T. Most service providers are keenly aware of cyber theft exploits and can provide the latest tips for protection. 

In Sum
If all this makes you dizzy, it should. It's a bummer we can't be more casual with our digital devices and enjoy them without worry. But that's not the world we live in. However we can be informed and take steps to to reduce security risks, just as we do with our cars, homes, and other possessions. 

Thanks for reading. You're feedback is appreciated!

Aloha, Sam


P.S. You can subscribe to email tips by visiting www.kokuadigital.com and entering your name, email, and "add to email" in the request form. 

Thursday, October 16, 2014

Steps to Take if Your Identity or Credit Cards are Stolen

Steps to Take if Your Identity or Credit Cards are Stolen

Here's a follow up to my post about recording the confidential items in your wallet so you know what you lost in the event of theft.

Below is a very useful reference posted on the Hawaii Better Business Bureau website:

If your ID or credit cards are lost or stolen, immediately notify your credit providers by phone and then notify each of the three credit bureaus to request a “Fraud Alert” be placed on your file. 

Placing this alert tells creditors to follow certain procedures before they open new accounts in your name or make changes to your existing accounts. Posting a Fraud Alert will also make it difficult for you to open instant credit, so be sure to read all information before engaging a Fraud Alert. 

Posting a Fraud Alert also entitles you to free copies of your credit report. When reviewing your credit report, look for inquiries from companies you have not contacted, accounts you did not open, and debts on your accounts that you can’t explain. 

Close any accounts that have been tampered with or established fraudulently. 

Big 3 Credit Bureau contact numbers

www.equifax.com 800-525-6285 

www.experian.com 888-EXPERIAN (397-3742) 

www.transunion.com 800-680-7289

Wednesday, October 15, 2014

Offline Data Security - A Very Good Place to Start

Offline Data Security - A Very Good Place to Start

What's the issue?
All the buzz these days in computer security is about protecting your digital data (computer-generated data) from hackers, which is a very important concern. But confidential digital data that can be exploited online (on the Internet) can actually originate offline. 

Why care?
It can be even easier for a criminal to steal your confidential information offline instead of trying online, and then use that info online to cause you much grief.

Take the contents of your wallet for example. Your identity and your financial assets can be exploited by a crook who obtains the items in your wallet--namely, your drivers license, bank and credit cards, membership cards--then finds a buyer for these items on the Internet. (There is a thriving online market to exploit these assets.)

With the info on your precious plastic cards a cyber (computer) criminal can open new accounts in your name, make purchases, and impersonate you. Depending on the creativity of the cyber thief you could be in for a long struggle to mitigate damage to your identify, reputation, and/or finances.

How to protect yourself?
A good habit is to take stock of the confidential items in your wallet. Photocopy and/or write down all pertinent information on the front and back of each card. Then store this record in your home safe. In the event your wallet goes missing you can refer to this record to notify the appropriate institutions and authorities immediately to stymie criminal activity. 

Also, the fewer items in your wallet the better. And don't carry your Social Security card, account numbers, or passwords in your wallet. Let’s not give the bad guys extra ammunition.

When should you do it?
A monthly check and update of your wallet's contents is best. After you first make the record it only takes about five minutes to note what's been added or removed from your wallet. When done, put the record back in your safe.

Where can you find more info on this topic?
The Better Business Bureau of Hawaii website has some good tips about identity and financial theft. Click here to learn more.

Who can help?
If you are elderly, ask a trusted friend or family member to assist. Seniors are frequently the victims of identity theft and financial scams. You can also ask your bank and credit card companies how they can help protect you in the event of theft.

In Sum
The bottom line is to be wary of theft in the offline and online world, and minimize our information exposure so cyber criminals can't use the latest tricks to their advantage and our anguish.

Thanks for reading. You're feedback is appreciated!

Aloha, Sam

P.S. You can subscribe to emailed computer tips by visiting www.kokuadigital.com and entering your name, email, and "add to email" in the request form.