Skip to main content

Posts

Five regular checks for Android

Five regular checks for Android By- Aarti Jatan What you need to check regularly to keep your Android smartphone and your data safe and sound. For many, life revolves around the smartphone. One particularly innovative guy  even married his  “digital companion.” Even if your life is balanced differently, it’s safe to say your phone contains a huge amount of personal data and valuable stuff — from photos to games, from contacts to music, and so on. To make sure that you remain in control of your data wealth, some regular maintenance is required — think of it like brushing your teeth, only it’s your phone you need to clean. In this post, we talk about five regular safety and security checks for Android smartphones. 1. Check apps Start with the list of installed apps. Go through it, ruthlessly deleting anything you don’t use. You’ll accomplish several important things. First, the obvious: You’ll free up space on your smartphone and improve performance (memory does not work optimally at cap

How to keep your parents safe, remotely

How to keep your parents safe, remotely By- Aarti Jatan How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them. The  coronavirus pandemic  has trapped huge numbers of people worldwide at home. In this situation, senior citizens find themselves in the most vulnerable position. The virus is more dangerous for them, so isolation must be strict. Younger relatives are presently unable to visit; personal contact carries too great a risk of infection. On top of that, the pandemic has caused a huge chunk of our everyday activities to move online. That, too, can be a problem for many older people, because they tend to feel  less confident  online. Older generations may also find it harder to distinguish spam and phishing from normal e-mails; some are more readily duped and less likely to spot a suspicious site, file, or program. How can you help your parents if you can’t leave your home? First, no one has abolished the telephone.

Raising digital parents

Raising digital parents By- Aarti Jatan Your parents brought you into the digital world. Time to return the favor and raise them right as well. In this post, I’m going to tell you a story about my parents, how they got into technology, and what it required from me. At the end of each section I’ll try to sum up the key points and give some advice to those seeking to bring their parents safely into the world of technology. How I got started with technology I remember the day I bought my first smartphone, i-phone , which sometimes refered to as " i-phone 2G " due to its lack of support for 3G networks. I brought it home and showed it to my parents. My dad tried it and said: It looks nice, but where’s the keypad? He then tried using it and said that he’d rather stick with his Nokia with its trusty number pad. My parents were not digital natives, in fact, they only started using computers in the early 90s. I still remember my dad typing on theirs like he was using a typewriter. O

Security lesson for an Instagram star (and everyone else)

Security lesson for an Instagram star (and everyone else) By- Aarti Jatan   S haring life hacks for a secure digital life. “Why would someone hack me, when there is nothing to gain from it?” Does that thought sound familiar? Now, picture this: You have become an Instagram star with thousands of followers and a degree of social capital, not to mention sponsors and advertisers bombarding you with direct messages. But old habits die hard, and your account security is still on the why-would-someone-hack-me level. That’s where presenter, DJ, and influencer Ashley James found herself, and she admits that she has one password for all of her accounts. In a  recent live broadcast , Ashley together with security guru David Jacoby looked into ways of protecting one’s personal digital space. Luckily, it is not that hard! How to make passwords If you have  one password  for everything, you are easy prey. Just one leak from a service that you have a long-forgotten account with is all it takes for ha

Don't want advertisers to monitor your every search on Facebook ?

Facebook for Windows users: Tight privacy set How to protect your account from getting hacked Set a strong password Enable two-factor authentication Verify the list of trusted devices Enable suspicious activity alerts Choose trusted contacts to help recover your account How to keep corporations out of your business Block face recognition Disable the use of your personal data in advertising Disable integration with questionable sites Restrict the use of information about your off-Facebook activity in advertising. Deny Facebook partners access to your data How to defeat spammers and trolls Limit the ability to comment on your posts Exclude offensive comments from your timeline Block unwanted users Limit the ability to tag you in posts Restrict others from posting on your timeline Limit the ability to send you friend requests How to hide posts from unwanted people Configure visibility of posts Limit access to stories Stop users from sharing your posts in stories How not to expose your per

Thin clients from a security perspective

Thin clients from a security perspective The mass transition to working from home clearly shows the best technologies for a secure and convenient remote environment. The year 2020, with its pandemic and forced self-isolation, has raised a number of fundamentally new questions for businesses. One — has any company ever had to calculate depreciation for employees’ use of home chairs, monitors, and desks before? — has become quite relevant. The greatest burden has fallen on the IT and security departments. The former had little warning they’d have to provide staff with a remote workplace environment, and the latter needed urgently to develop new information security strategies for a world in which the  security perimeter is everywhere . Pessimists predicted the collapse of IT, but that did not happen; for the most part, companies were able to reorganize their operations fairly quickly. However, transitions have varied. Businesses whose employees mainly used laptops even before the pandemi

So, your account was hacked. What now?

 So, your account was hacked. What now? What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled. Finding out one of your accounts has been hacked can be pretty stressful — more so if it’s one you actively use to chat with friends, make purchases, or store files. Instead of reacting emotionally, it’s important at this early stage to focus on minimizing consequences. Rescue your money and data, protect your friends from scammers, regain control of your account — generally, reverse or at least halt the damage. We will tell you what steps to take. If you can’t sign in at all In many cases, users first learn they’ve been hacked by suddenly becoming unable to log in to an account. That’s because in many cases, the first thing hackers do is change the password, locking out the victim and gaining complete control over the stolen account. Don’t panic: You can still do plenty. Take a deep breath. It is important to do everythi