Star Tribune – Step Up Your Online Security Smarts

Every time a news story hits about online accounts being broken into, it’s a reminder to take a look at just how secure your own accounts are. Katie Humphrey of the Star Tribune explains the different levels of online security you can setup.

In a perfect world, our accounts would be perfectly locked down. But there are some considerations to take into account when setting up your security.

How tight you lock down depends on your patience. “It’s security versus complexity,” said Derek Meister, an agent with Best Buy’s Geek Squad. “How complicated do you want to make that door lock before it becomes a pain for you to go through the door each day?”

Read more here.

WTAM 1100 – Add Security with 2-Step Verification

Play Audio – WTAM 1100 Newsradio – Tech Tuesday – September 16th, 2014

WTAM 1100 Newsradio Cleveland OhioAs we move more of our important information online, from cloud-based storage to web-based email and financial software, the need for additional security around those accounts becomes clear. Relying on a simple username and password won’t cut it in a world where spyware and phishing attacks try to gather as much information about us as possible.

Fortunately, many online services are adding another layer to their security in the form of “2-Step Verification”. Sometimes referred to as “Two Factor Authentication”, this process involves an additional step during the login process to help confirm your identity by requiring “something you know” and “something you have”.

The knowledge part is your existing password. To add something you have, many sites will ask you to sign up your mobile number or download a special app for your smartphone. This allows a security code to be sent to the phone, which is entered after the password.

It sounds complicated, but many of us have been using 2-step verification for decades in the form of ATM cards. The “something you know” is your PIN, and the “something you have” is your ATM card. Just like the ATM process has become second-nature, so too will 2-step verification once you set it up and begin to use it.

For a complete list of services that currently allow 2-step verification, such as Google, PayPal, Facebook and others, visit twofactorauth.org.

WTAM 1100 – Fake FBI Ransomware Comes to Android

Play Audio – WTAM 1100 Newsradio – Tech Tuesday – August 26th, 2014

Fake FBI Warning Ransomware on Android SmartphoneAccording to a recent New York Times article, Android devices are a new target for “ransomware”. These malicious software apps act similarly to the fake FBI virus scams that have been attacking Windows PCs for years.

Fortunately, there’s several actions you can take to help protect your Android smartphone or device from these scammers and their malware apps.

Stick With Trusted App Sources

Android devices generally come setup for downloading apps from a trusted app store, like the Google Play Store. For extra security, you’ll want to avoid changing the settings on your device that allow 3rd party apps to be downloaded from the official app stores.

Sometimes called “sideloading”, allowing apps to be installed from less trustworthy places on the Internet increases your chances of accidently loading malware onto your device.

Keep Updated

Just like your computer, your smartphone’s operating system and apps need to be updated periodically. It’s important to keep watch for system update notifications as they come up. You can also check for system updates by visiting Settings, then About (or About Phone), followed by System Updates.

For app updates, visit the Google Play Store app, then the Play Store icon. Select My Apps to view your downloaded apps and any available updates. You can also touch the Menu button to check the “Auto-update” option to keep that app automatically up to date.

Practice Safe Internet Habits

A common attack method, known as “phishing” on the Internet, isn’t technical, it’s psychological. Scammers will create fake websites, pretending to be your bank or shopping site. They’ll send you emails asking you to sign in and provide your account information, which they’ll then use to access your account on the real sites.

For more information on how to protect yourself, check out this article on how to avoid getting hooked by a phishing scam.

Some malware attacks come in the form of banner ads designed to look like a security warning telling you viruses have been detected. The error will ask you to download and run what it claims is an antivirus app, but is really the scammer’s software waiting to load onto your device.

The same safe Internet habits you follow on your computer work on your mobile devices as well. If you do find yourself falling victim to one of these attempts, here is what to do if you are scammed.

Security Software

The rapid growth in the number of Android devices being used worldwide has made the platfom a growing target for malicious software makers. Keeping your settings in check, your system updated and avoiding unsafe behavior will often be the most powerful ways to protect your device. To help take your protection further, security software makers have made a range of protection products for the Android platform.

The good news is that many of the major security software suites, like Webroot’s SecureAnywhere Internet Security include Android security apps that you can install on your device in addition to their Windows PC or Mac coverage.

If you still have questions on how to best protect your Android device, or need help with a potential malware issue like viruses or spyware, speak to a Geek Squad Agent online at geeksquad.com/chat or at the Geek Squad Precinct located at your nearby Best Buy.

WTAM 1100 – Slow WiFi Frequencies & How Much Cloud Access

 
WTAM 1100 Newsradio Cleveland OhioWe’re always looking at new ways to be more mobile with both our devices and our data. From wireless networking to the Cloud, we like the freedom of going digital without cables.

In this week’s Tech Tuesday segment on WTAM 1100 Newsradio, I spoke to Bill Wills about how your wireless router can slow down in a highly populated area like a large apartment building. Newer routers and devices that support the 5GHz frequency may help in these situations, but here are some additional pokey WiFi tips from USA Today.

We also talked about one consideration that may influence how much data you move to the Cloud, which is accessibility on the go. For more considerations for and against moving everything over to the Cloud, check out this Wall Street Journal debate.