Category: Did You Know?

  • 2 Cyber Security Tips for Keeping Safe Online

    2 Cyber Security Tips for Keeping Safe Online

    For the past dozen years or so, I’ve been writing insurance continuing education (CE) courses about cyber security and keeping safe online. Yes, I designed these courses for insurance licensees but they contain information that’s beneficial and essential for everyone to know.

    There are WAY more than 2 tips available. I’m just limiting myself today. You can bet I’ll be providing more in the future.

    TIP 1: Avoid Current Scams

    Right now, aside from ransomware, two of the biggest cyber security scams everyone is vulnerable to are Quick Response (QR) codes and CAPTCHA verificiation. Both were designed to keep us safe; however bad actors exploit them to take advantage of us.

    Basically, a quick response (QR) code is a form of barcode that stores retrievable data for digital devices to read. If you want the long explanation, AVAST explains it here.

    Are QR codes safe? Most sources say yes, however, bad actors do exploit them. A few years ago, they scammed the City of Austin, Texas and its residents. The bad guys replaced official QR codes on parking meters and defrauded both the city and those who parked. How? Their phony QR codes directed payments to a phony site, where the bad actors stole confidential personal and payment information. As a result, parkers were also fined for illegal parking.

    Here’s a recent article in PCWorld that tells you how to avoid these scams, which are on the rise.

    photo by jensenartofficial on Pixabay

    CAPTCHA is an acronym for technology that allows a website to detect the difference between a human visitor and a software program called a “bot”. You’ve used this tech before. You see 9 images and have to click on all of those with buses, or bicycles, or cars. Other tests require you to type a word or answer a question after having to think about or review an image. IBM explains CAPTCHA here.

    Although most sources say CAPTCHA is viewed as a great security device, it’s not always convenient or as secure as some would like. In addition, there are an increasing number of of phony CAPTCHA scams out there, as Guardio reports.

    photo by https://pixabay.com/users/simon-3/

    Tip 2: understand what makes you vulnerable

    We all believe we’re practicing safe cyber security. None of us expects to fall prey to cybercriminals or their scams. However, certain characteristics can actually make us MORE vulnerable to cybercrime than the average person. The MOST vulnerable people exhibit more than one of the following characteristics:

    • Use a WEAK password
    • Use the same password for most (or all) of their accounts
    • Work from home

    Here’s a list of the major things you want to do to keep safe in the cyber world. They’re also great tools for practicing good cyber security:

    Password

    Use a strong password: one with 16-20 characters. It should also contain a combination of upper and lowercase letters, numbers, and symbols. It should NOT contain:

    • Personal information (like your DOB, address, zip code, last four of Social Security #, etc.)
    • Consecutive numbers or letters (123 or abc)
    • Repated numbers or letters (333, 3030, or zzz)
    • Information others can easily guess (the names of your spouse, kids, or grandkids; your pets names; your favorite sports team, author, or TV show, etc.)

    password manager

    Use a password manager. Here’s a link that explains what a password manager is, how it works, and a few ratings. Sure, there’s a learning curve, but it’s worth it. Also, keep in mind that different password managers offer different features. You can choose one that’s as basic or feature-rich as you’d like.

    multi-factor authentication (mfa)

    Make sure you use multi-factor authentication (MFA), also called 2-factor authentication. Basic account logins require you to provide a user ID and password. (Ironically, the user ID is required to be your email address, which anyone can obtain! How secure is THAT?) Of course, because you know your user ID and password , other people can know them, too. This is where MFA comes in: it requires a third piece of information. This info is either something YOU HAVE or something YOU ARE. The something you have is your smartphone and an authenticator app or text messaging app that receives codes. You’re only able to login to your account after providing your user ID and password IF you also provide the code sent to your phone’s authenticator or messaging app. Of course, another method of authentication is biometrics: thumbprints, facial recognition, retina scans, etc.

    virtual private network (VPN)

    Always use a Virtual Private Network (VPN) if you’re on public WiFi. You should also use it on any network where you’re not sure of the level of security. A VPN camouflages the IP address of your device, its physical location, and encrypts the data you send and receive. Here’s a great article on PCMag that explains what a VPN is, how it works, and offers reviews of companies that provide them. I use two VPNs. One is a basic VPN with my antivirus software (that’s on all my devices). The other is a robust VPN purchased for an annual cost of about $70; I use this one when I travel.

    security updates

    Make sure you update your computer and ALL devices routinely AND when the updates are available. Did you know that you can schedule these updates so they occur when you prefer them to, rather than whenever your computer chooses to install them? Here are two articles that explain how to do this: one from PCMag and another from Tom’s Guide.

    one additional tip

    If you’re going to conduct online research about anything related to cyber security, I have a recommendation. Do NOT visit sites that have a vested interest in or bias about the subject at hand. In other words, don’t ask Microsoft or Apple who makes the best computers. Don’t ask McAfee or Norton who designed the best antivirus software. Also, don’t visit news outlets, as they often sell ads to tech companies and have a vested interest in them.

    I’ve found the following online resources to be helpful and largely objective when looking for tips, advice, etc.:

    As always, share your questions and thoughts.

  • What Do Writing Fiction, Watercolor Painting, and Crystals Have in Common?

    What Do Writing Fiction, Watercolor Painting, and Crystals Have in Common?

    To answer the question, what do writing fiction, watercolor painting, and crystals have in common? the answer is: ME!

    I’m finding myself seeking something different from Social Media these days, something more in line with what matters to me. I know that sounds selfish (because it is) but maybe you feel the same way.

    Now that I’m semi-retired and able to spend more time doing what I love (writing fiction, watercolor painting, and crystals), I find that I prefer to “chat” with people who share the same interests. A flash of inspiration struck, so I’m now prompting conversations on these (and other interesting to me) topics on my blog over at https://lindamchenry.com/blog.

    Feel free to head over and join in the exchange! Some of the conversations appearing soon include:

    • What’s Your Favorite Type of Crystal/Gemstone? (posting at noon on Monday, 2/3)
    • Are You, or Someone You Know, a Highly Sensitive Person? (posting on Friday, 2/7)
    • Are You a Pantser, Plotter, or BOTH? (posting on Monday, 2/10)
    • Sometimes, Do You Just KNOW? (posting on Friday, 2/13)
  • Those Email Messages You’re NOT Receiving…

    Those Email Messages You’re NOT Receiving…

    Here’s a quick little lesson to all of you who keep hearing that other people are sending you emails. And resending them. Then sending them again … and, still, those email messages are not appearing in your Inbox!

    Let me tell you WHY you’re not receiving all those emails. They’re going to your Junk folder (which can also be labelled as Spam, Bulk, or something else). And they may be automatically deleted without you even knowing it.

    Fair Warning

    I am not a tech guru, IT nerd, or expert on technology. I am someone who uses email A LOT and have learned lessons the hard way. I’m sharing what I’ve learned, through my own experiences. I’m also sharing a few resources so you can do your own research about those email messages you’re not receiving … and/or that you don’t want to receive…

    Email Security Settings

    Each email app and software includes its own security settings. These settings offer options about how YOU can handle unwanted email, which is referred to as Junk, Spam, or Bulk messages. They also help you receive the email you WANT to receive!

    In many cases, if YOU don’t adjust your Junk settings, the following may automatically be sent to your Junk folder; messages:

    • Sent from someone who is not in your contact list
    • With attachments and/or hyperlinks
    • Sent as part of a bulk emailing
    • Sent by someone who has not emailed you before, or to whom you have not already sent an email

    Junk Email Settings in Outlook and Other Email Apps/Software

    The following images show you what your Junk options are if you use Outlook. You can find them by going to Home > Junk:

    • The image on the left shows the Junk Options
    • The image on the right shows how you can ADD someone into a Safe Sender’s list, meaning the messages from that individual email address or domain will NOT be sent to your Junk folder

    Here are some articles to show you how to set up your Junk settings in:

    A Final Note about Junk Email Messages

    Junk email settings are a lot easier to control when your email address is proprietary rather than free. For example, my email address is associated with my website domain, so I have complete control over it. If you use Gmail, Yahoo, AOL, or any other free email software, you may not have as much freedom to control the settings.

    Be aware that when you open ANY kind of email account the security settings are the default settings used by that app/software. Those settings may not be to your advantage, depending upon your preferences and whether the app/software is free. I’ve heard of settings that automatically delete all Junk mail after a specified period of time (e.g., 72 hours or one week) if the account owner doesn’t change the settings.

    I hope this info is helpful! Reach out to me if I can be of further assistance.

  • Words Better Left Unsaid: Do You Know What They Are?

    Words Better Left Unsaid: Do You Know What They Are?

    The Words

    I began hosting The Writer’s Voice podcast nearly a year ago. In each episode, I chat with one or more writers about the craft of writing, the process of writing, and books. I also attempt to draw out the true personality of my guests so listeners get a glimpse of the person behind the writer. This week, the podcast’s editor, Mike Royer, suggested that when writers plan what they’re going to say in advance of each episode they should also focus on … words better left unsaid.

    Not only does he edit the audio and video for each podcast and its trailers, he is also a highly auditory person. In other words, he focuses on the music of the words my guests and I speak. According to Mike, attending to the words better left unsaid is the favorite part of his job. He has told me this before. Many times. In many different ways. For some reason, I never got it.

    So, this week, he showed me.

    The Sounds

    Showing versus telling is a concept we writers learn early on in our careers. The concept is pounded into our heads over and over at writing workshops, during conferences, and in how-to books. We also learn to read our work aloud, especially the dialogue, to ensure the rhythm of the words, and the cadence and pacing, sounds right.

    Until recently, I didn’t understand that we writers need to follow these same rules when we appear in public, participate in marketing events, and–yes, host or appear on a podcast. I also learned that showing how not to do something is equally as important as showing how to actually do it.

    The Words Better Left Unsaid

    When you hear the music of words better left unsaid, you’ll understand exactly what I mean … just listen!

    Outtakes 1

    Stay tuned for more outtakes – some of them are really funny!

    If you’d like to learn more about The Writer’s Voice podcast, see past writers who appeared, or find links to listen, watch the YouTube trailers, or request a guest spot, click here.

  • Elder Abuse: Be Silent No More

    Elder Abuse: Be Silent No More

    I’ve conducted a lot of research into the topic of elder abuse. I’ve also developed and written some insurance continuing education courses on the subject as well, as it pertains to financial fraud.

    Here is another person’s take on senior financial exploitation, a despicable form of elder abuse. This account was written by Connie Johnson Hambley.

    https://www.linkedin.com/pulse/uncomfortable-complicity-silence-connie-johnson-hambley