What If Your Computer or Phone is Lost, Stolen or Just Breaks?


Computer Security Tip of the Week

Scott Aurnou – Backing up your electronic data is fairly easy to do and can be done a number of ways. If your computer, phone, tablet, camera, etc. is lost, stolen, just stops working or there’s even a natural disaster – and you haven’t backed up your files correctly – everything, including your documents, spreadsheets, presentations & other work product, messages, pictures, video clips, etc. will be gone forever. Before that happens, learn more about backing up your files here.

Websites referenced in this video include:
Apple iCloud: https://www.icloud.com/
Microsoft SkyDrive: https://skydrive.live.com/

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , ,
Posted in Laptops & Desktops, Security Tip of the Week, Smartphones & Tablets

Custom Software is the Devil! (Only a Slight Exaggeration…)

Laptop DevilBy Scott Aurnou

Custom software (sometimes referred to as ‘bespoke software’ or ‘tailor-made software’) is computer software that has been developed specifically to do something that an ‘off the shelf’ program presumably cannot do. While this may sound like a good idea, in the vast majority of circumstances, a custom-made solution really isn’t necessary and will do a lot more harm than good. To a large extent, this is because of updating – a normal and beneficial aspect of using computer software. Updates are put in place to improve a given program’s performance, add features or make it more secure. Why would this be a problem when using custom software? Well…

Standard commercially-available software is generally updated for free; custom software isn’t. A given piece of software does not exist in a vacuum. It often functions alongside other pre-existing software and will need to work within a computer’s operating system (which is also software), in any event. That other software will invariably be updated from time to time and it’s increasingly likely that the custom software will stop working properly as the successive updates are installed. Before long, the company buying that custom software is faced with a choice of deliberately not updating the operating system and other programs – and you should always update – or paying extra to ‘fix’ the custom software so that it will keep working. This is a choice that will never go away.
Read more ›

Tagged with: , , ,
Posted in Laptops & Desktops, Network Security

Anyone Can Use Your Phone or Tablet & View Your Files, Unless…


Computer Security Tip of the Week

Scott Aurnou – If your mobile device is lost, stolen, or even ‘borrowed,’ anyone holding your smartphone or tablet can do whatever they want with it – including impersonating you and accessing your contacts and other files – unless you take this one simple step…

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , ,
Posted in Privacy Issues, Security Tip of the Week, Smartphones & Tablets

Security Expert Chat: 5 Questions for Sophos’s Paul Ducklin

Paul Ducklin is one of the world’s leading security experts. He joined Sophos (a leading IT security vendor) in 1995 and has held numerous senior technical roles there in the years since. He is also a regular contributor to Sophos’s award-winning Naked Security blog. Currently based in Australia, Paul won the inaugural AusCERT Director’s Award for Individual Excellence in Information Security in 2009. Despite a very busy schedule, Paul has been kind enough to answer a few questions for The Security Advocate:

What do you think is the most commonly overlooked security or privacy issue?

I’m tempted to put on my best Franklin Delano Roosevelt accent here, and say something like, “The thing most overlooked in security is security itself.”

But since I need to zoom in on one issue, I’ll say, “Geolocation.”

GeolocationEver since modern mobile phones burst onto the scene in the 1980s, we’ve known that someone – the cellular network operator, at least – knows roughly where we are whenever our devices are turned on. That’s the *quid pro quo* for having a phone in your pocket that can accept incoming calls.

These days, however, we’re sharing our location much more widely, and often much more precisely.

Modern “always-on” phones and tablets can pinpoint your position through a mixture of cell tower data, GPS and nearby Wi-Fi networks.

Operating systems like iOS and Android unashamedly urge you to share this information with Apple or Google, and with app-makers, and more, in return for “improving” your online experience with information relevant to your location.

It works, of course: you don’t want to know where to eat out in Sydney while you’re on a business trip to San Franscisco.

So, perhaps sharing your location data, at an intimate level of detail, with any and all of application developers, mobile phone companies, device makers and operating system vendors is worth it.

Aye, there’s the rub: *IS* it worth it?

To answer that question, of course, you have to recognise the downsides, weigh them up, and carry out what amounts to a personal risk assessment.

And that’s something I suspect that many of us have overlooked.

[Some relevant articles on Naked Security:]
Michael Dell’s daughter all at sea on social networks – how do your kids measure up?
Twitter + location = WeKnowYourHouse
‘Girls Around Me’ stalking app developer and Foursquare negotiate API access

Read more ›

Tagged with: , , , , , , , , , , ,
Posted in Network Security, Smartphones & Tablets

Is That ‘Windows Tech Support’ Call a Scam?


Computer Security Tip of the Week

Scott Aurnou – If you receive an unsolicited phone call from someone claiming to be from ‘Windows Tech Support’ or something like it, you can be sure of one thing: it’s a scam. Learn more about it here.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Security Tip of the Week