Security Corner – Caution With Chain Letters.

Why are chain letters a problem?

The most serious problem is from chain letters that mask viruses or other malicious activity. But even the ones that seem harmless may have negative repercussions if you forward them:

they consume bandwidth or space within the recipient’s inbox
you force people you know to waste time sifting through the messages and possibly taking time to verify the information
you are spreading hype and, often, unnecessary fear and paranoia

What are some types of chain letters?

There are two main types of chain letters:

Hoaxes – Hoaxes attempt to trick or defraud users.

Staying on Top of Your Credit

In this issue, we are talking more about personal security rather than your data. By now, it is almost common knowledge that FreeCreditReport.com is not actually free and that leaves the lingering question of "Why is it so hard to find a free credit report despite the Fair and Accurate Credit Transactions Act of 2003?" Whether you'd like to admit it or not, buying a car and a house without an abundance of cash laying around is much easier done with a good credit score.

Security Corner – USB Flash Drives

USB Flash Drives - Small agents of big security risks

Remember when floppy disks were the main vehicles for transferring data? As virus outbreaks increased, extra precaution was taken when files were opened on unknown floppy disks. An infected file meant a compromised system.

Security Corner – Internet Fraud

Five easy ways to protect your business
from internet fraud.

Many internet hackers prey upon users
who are too complacent or just too busy to keep their guard up. However,
if you do nothing else to protect yourself from online fraud, at least
take care of these simple measures:

1. Install anti-virus software and anti-adware/spyware
software.

Security Corner – Is Your WiFi Secure?

Upgrade to the latest in WiFi security.

If your wireless access point (WAP) is more than 6 months old, it is likely that your WiFi connection is not secure.

It’s easy to breach the original Wireless Protected Access (WPA) standard unless you have a super password with more than 21 characters and words that can’t be found in a dictionary.