
PASSWORDS
This year, I decided to audit my passwords and start the updating process. We have all become too comfortable with how much of our personal information is out there. As a technology professional who has consulted on the topic, I like to tell people that "a little security goes a long way." Honestly, criminals like soft targets; updating your passwords periodically, not using passwords repeatedly, and ensuring your passwords are a combination of upper- & lower-case letters, numbers, and special characters go a long way. Opt for two-factor authentication whenever you can; this is where you get a phone call, text, or email to confirm your identity. Secure your passwords with a dedicated password manager like Bit Locker, Bit Warden, or 1Password. Password managers can be handy as they will let you know how many of your passwords may be exposed or how many times they are being reused. Using text or email files to secure passwords is a bad practice that leaves you vulnerable to larger data breaches. Most folks are not specifically targeted for hacking but rather easily breached when someone acquires a compromised password online.
EMAIL & ANTI-VIRUS
The most significant threat vector is email; here, a little education can go a long way. Don't just click on unsolicited prompts in emails or texts. I sell and install commercial firewalls like Sonic Wall and Fortinet, I can tell you with confidence that these products don't belong in residential applications.That router you got from Verizon or Optimum is, in most cases, limiting your outward exposure to the internet, but clicking on malicious links or installing trojan apps can compromise both your computer and network.
PHISHING & SPOOFING
Always check the sender's address and make sure the communication is official. If there's a phone number, ensure it corresponds to the provider before first calling. Most banks and institutions will not send sensitive communications via email and text. I have been on the other end of a phone call where I have been asked to provide sensitive information to prove it's me; remember always that it is not your responsibility. You can always hang up and call back if an institution reaches out. Spoofing is when a hacker emulates a legitimate contact's caller ID or email address; this is real, and if your gut gives you pause, it generally means you should listen. Some of our commercial services now offer a sandbox where recipients' emails are downloaded and scanned before being forwarded to the individual. In a corporate environment, this is used with active educational tools to help harden the environment. In the personal environment, I suggest keeping active subscriptions to antivirus handy. It sucks these days as I feel they are always trying to sell you additional services you don't need. Norton has purchased Life Lock and would love to see everyone buy additional subscriptions. Here is my take on antivirus software: the threat environment is constantly evolving, and all personal security software solutions are being continually updated for the latest threats. Windows itself comes with Windows Defender, which, in and of itself, does a really good job of keeping out the treats that used to be so much a part of Windows's everyday life. I have I have researched and read more than a few articles about the actual need for third-party security software, and my position has been to implement them on personal devices whenever possible. This may not be necessary when managing the devices behind a commercial firewall, but having an additional layer of personal security is never a bad idea. Most of these personal security solutions actively scan your hard drive, personal network, and emails for possible threats. You are always prompted when asking to install new software, and the antivirus may check its legitimacy before installing. I also like these solutions as I can manage multiple devices and users from a single account. Group administration is essential when purchasing multiple PCs for your business or the wife and kids.
DATA BACKUP
Finally, a word on Data Backup. No one ever has a plan for this until it has become an issue (to late). Cloud-based apps like Google Docs and One Drive have made Data Backup less critical. I love that I can access my files from anywhere at any time. The problem is that I use more than Word docs and spreadsheets. If you are only using two or three office products, you don't need an alternate backup tool, but if you are editing pictures or videos, you might consider having another solution.
With the addition of solid-state drives (SSD), we didn't need to be concerned with the physical wear of our old spinning disc drives. Let me tell you, SSD drives do have a life span, and generally, when they die, there is no warning or coming back. I have been a Carbonite user for years and sell thier products professionally in my commercial applications.
Like the antivirus solutions, I can manage multiple group implementations of Carbonite. I can use it on various devices and access analytics and data anywhere. Carbonite is a simple "set-it & for-get-it" solution. Install the software and tell it what folders you want to protect. Right-clicking on any folder will show a green check mark or red. A yellow status indicator means a change has been made, but backup is pending. Carbonite backs up any changes made to a file as they happen. It basically mirrors your files to the cloud. Alternately, based on the application, we also sell NAS drives (Network Attached Storage).
NAS drives are more cost-effective when backing up larger data sets. They also provide a handy storage location where you might share community files for use by a group. Unlike Carbonite, these solutions perform a scheduled backup, usually during off hours when the device is not in use. They are suitable for providing repetitive data sets that allow you to go back a month or two based on your recording configuration. These solutions are more tweaky because they require a good technical understanding to implement them properly. I mostly use products from Buffalo and Western Digital and may use them in conjunction with Carbonite as part of a broader backup plan. We might create a hybrid network where power users who require full PC backup use a managed platform where simple workstations are just backing up documents or a few working folders.
For individuals or Families, Carbonite is the way to go. It's simple to implement and easy to manage. I know it's another subscription, but when it comes to your data and peace of mind, remember "Your worth it!!"