Tag Archive for: Tips

Techie Tips: Hack-proof your family


In this, my first column, I want to take a moment to talk about keeping our families safe.

When I was coming up, my parents had the “Stranger Danger” talk with me. Our kids are born into the world as digital natives, and just like in the “real” world, they need to understand the dangers the digital world can pose.

We’re in a unique place as a society, where even our youngest members are virtually fluent, yet potentially vulnerable to threats they barely comprehend.

The cybersecurity landscape has radically evolved over the last decade. It’s no longer confined to IT departments or specialist firms. Today, it stands at the threshold of every household. Our family homes are no longer just physical structures, they extend into the digital realm.

We speak in hushed tones about cyber threats like ransomware, data breaches, and identity theft. They seem abstract, distant, and more applicable to high-profile corporations than suburban households. But as our lives become more intertwined with digital technologies, the line blurs. Social media profiles, online banking, cloud storage, virtual classrooms—all these facets of our digitized lives contain personal information that could be exploited if left unprotected.

Families must understand that the internet, much like any public space, has its share of threats and risks. Parents would not let their children roam unsupervised in a city they’ve just moved to. Likewise, the same level of caution should be exercised online.

But how can families fortify their digital homes? First and foremost, education is key. Cybersecurity is not a labyrinthine concept reserved for tech aficionados—it is a practice that needs to be adopted by all users.  Simple, crystal-clear ground rules need to be set for our children to keep them S.A.F.E.

S.A.F.E. is a great acronym for cybersecurity.  Let’s go through it together!

Secure your information 

Make sure that you leverage two-factor authentication (2FA) on your digital services. 2FA is something you have (like a cell phone with a code) and something you know (like a password.) This approach will keep your accounts much more secure.

Avoid suspicious links or emails

Phishing attempts and social…

Source…

Expert tips for protecting your tech devices against malware


When a word begins with “mal,” you know it’s bad news. Malodorous. Maleficent. And one that’s woefully underused: malversation. (Look it up; it’s a good one.)

But the most dangerous to our tech lives? Malware. These insidious little programs crawl into our phones, laptops and any other smart device and wreak utter havoc. And unfortunately, it’s everywhere.

Oh yes, everywhere

It’s mostly just random sites spreading this stuff. For example, a malware app called CherryBlos just snuck past the Google Play store’s filters. It got the green light even though it can steal cryptocurrency wallet credentials.

Before you hit that “download now” button

Usually, you can trust the Google Play Store, Apple’s App Store, Amazon apps and all the other official sources. That said, it’s just plain smart to “trust but verify.” All of these are free and most only take minutes, if not seconds:

  1. Keep your devices updated. Don’t put off updating because it’s too inconvenient. These “annoying” updates often contain tighter and better security measures.
  2. Do your research. If an app looks good, Google it before you download it. A few minutes of research could save your phone, data and even your bank account.
  3. Scan the reviews. Tempting as these free or cheap apps are, the proof is in the pudding. Look for any signs of devices behaving strangely after downloading.
  4. Never blindly grant permissions. I get it. Our 2023 attention spans are very limited. Still, the time you take to read exactly what permissions you’re granting is time well spent. 
  5. No jailbreaking. Not only are you voiding any warranties and risking increased freezes and crashing — but you’re also agreeing to a decreased level of cybersecurity. 

You know what they say, “Give a man a fish and he’ll eat for a day. Teach a man to phish and he’ll steal your bank password.”

Bonus: Must-have protection for all your devices

Antivirus is vital in the fight against malware. Always have a trusted antivirus program updated and running on all your devices. We recommend our sponsor, TotalAV. Right now, get an annual plan with TotalAV for only $19 at ProtectWithKim.com….

Source…

Custer County Search and Rescue provide climbing safety tips following rescue


CUSTER COUNTY, CO — Two people were assisted by members of Saguache County Search and Rescue Monday morning after they were separated from their party after climbing a prominent peak in Southern Colorado.

In a Facebook post, Custer County Search and Rescue said it called Saguache County Search and Rescue for a mutual aid response to assist two hikers in the early hours of Monday morning.

According to Custer County Search and Rescue, four hikers were descending from the Crestone Needle when they became separated from each other.

Two of the individuals in the party were able to make it back to their camp at the South Colony Lakes while the other two were separated on the trail.

Custer County Search and Rescue says one of the two stranded hikers was able to activate their Garmin InReach, a GPS and SOS-enabled communication device, to provide Search and Rescue with an accurate location of their position.

At 4:00 a.m. Monday, Saguache County Search and Rescue was able to assemble a team, hike and climb to the stranded hiker’s position. From there, they were able to locate the second stranded hiker.

Custer County Search and Rescue says by 7:30 a.m. both stranded hikers were able to descend safely and reunite with their party.

Custer County Search and Rescue wants to remind you of some important mountain climbing safety tips if you plan on taking on the unforgiving mountains Colorado has to offer.

Plan Your Route

  • Research your routes thoroughly, especially if you plan on ascending and descending different routes.
  • Struggle to descend in the dark? Wait as a group and move at first light.

Be Prepared

  • Have the necessary equipment for your activity.
  • Carry a two-way communication device like Garmin InReach.
  • Have extra food, water, layers, headlamps and batteries.

Research Conditions

  • Currently, conditions of Broken Hand Pass and Crestone Needle require ice axes, helmets and traction devices due to the late spring snow and weather.
  • Much of Colorado’s high country still has snow on mountain peaks which can lead to dangerous hypothermic conditions for those who are unprepared.

____
Watch KOAA News5 on your time, anytime with our free streaming app available for your Roku, FireTV, AppleTV…

Source…

Beware of malware in PDF files: 10 safety tips you should know – Indiatimes.com



Beware of malware in PDF files: 10 safety tips you should know  Indiatimes.com

Source…