The Digital Joneses

Post image for A New Year Means New Security & a Google Nexus 7-Inch Multi-Tablet Twitter Party Giveaway with Trend Micro – #SecureNewYear

I am hoping that this New Year is already off to a great start for all of you, apart from my plumbing issues and a flu-ridden child, our family has been enjoying 2013 thus far. And as most of the celebrations should have died down by now, here’s one more that you might want to attend.

For the past year, I and several other families across the country have been participating in a program with Trend Micro, a leading global internet content management and threat security firm, called the Digital Joneses. During this year, we completed various security challenges and awareness programs where we learned new ways to protect our family’s technological assets and then shared our knowledge with our readers, friends, family and co-workers via regular articles. This past month, I wrapped the highlights of the program up in my post “13 Security Resolutions for 2013 – Follow Them or Get Hacked!” You can see my other posts from the program here.

Basic CMYK

Well now The Digital Joneses program is ending, and what better way to bring the program to a close than by having a party, a Twitter Giveaway party. And guess what? During this Twitter Party, Trend Micro is GIVING AWAY…not ONE

n7-product-hero

[click to continue…]

{ 0 comments }

Post image for Zombies, Bots and Trojans are Trick or Treating in your Computer!

Did you know that it is basically Halloween each and every day in your computer? That digital doorbell is ringing every time you visit a website, get an email or download an application. How is your computer greeting those Zombies, Bots and Trojans? Are you giving them treats and sending them on their way? Or are they preparing to trick your computer and wreak havoc on all of your personal data?

Fear-factors

If you follow any of my recommendations on protecting your computers, your online identity and your privacy, the Halloween in your computer probably is a pretty boring affair. Those scary visitors come and leave without much activity. They are looking for those easy targets, the computers without security software or anti-virus software. They are testing your strong passwords with brute force attacks and then moving on to people who have weaker passwords. Here’s a tip, if your password appears on the list below, it’s really time to change it to something stronger!

more-stats

Here’s a list of the most used passwords of 2012: [click to continue…]

{ 0 comments }

Post image for 10 Tips & Some Security & Privacy Tools for Setting Up Your Child’s First Smartphone

As part of The Digital Joneses study that I’m working on with other bloggers and with Trend Micro, one of our challenges is “Staying Connected on the Go.” The study itself is one of online protection, privacy and security, using a variety of tools and software as well as tips and best practices provided by Trend Micro. This is the 4th challenge that we are undertaking and you can see some of my other articles from the challenges here.

Basic CMYK

This current challenge outlined some tasks that we needed to do during a 24-hour period but the over-arching theme was to essentially detach from your computer, and do everything that you would normally do on your computer but on a smartphone. The funny thing is, I do this type of challenge each and every day, most typically, on the weekend. Some of the tasks we were asked to do included:

  • Posting pictures to Facebook and set the privacy so that only “Friends” could see them
  • Do some online banking
  • Catch up on emails
  • Watch YouTube videos
  • Share photos with close friends and family
  • Make an online purchase

As you can see, many of these items involve security or privacy. This is something that I don’t take lightly and neither should you. So, using the themes of safety, security and privacy, I elected to slightly modify the challenge to hopefully make it helpful to parents who are thinking about giving their child a smartphone.

[click to continue…]

{ 2 comments }

Post image for Get Those Cleaning Supplies Out & Roll Up Your Sleeves – How to Clean Your Digital Home!

It’s Springtime! Leaves are appearing on the trees, the sun is starting to gain dominance over the rain, and my eyes are teary, not only from the pollen in the air, but also from the fact that I need to start doing my spring cleaning around the house! It’s time to put away the winter clothes, coats and blankets, throw open the windows and air out the house. Guess what? You probably need to do this with your digital home as well.

HTD-cleaning-gift

Wait, what? My “digital” home, you ask? What the heck is that? Well, while we typically live in one place and work in another, we probably have a single “digital home” – a place where you go do all of your digital, online work. This could be a desktop at home or a laptop that you carry around. And your digital house typically extends to your smart phone as well. Basically, it is anywhere you live your digital life.

My digital home, being a bit of a gadget freak, is pretty extensive. This means that I will have a lot more spring cleaning than my wife or kids do. So what that means is I have to be extra diligent and have a plan of attack when I do all of the digital cleaning. And I’m going to map that out at bit further in this article, but first, you might be wondering why you would need to do any type of cleaning in the first place!

key-online-fraud-stats

[click to continue…]

{ 3 comments }

How Internet Security Savvy Are You?

March 6, 2012
Thumbnail image for How Internet Security Savvy Are You?

If you have read any of my articles in the past, I find it extremely important to use technology as a tool to better your life. Some of those “tools” are for entertainment, and others are for security and safety of yourself and your family. Entertainment is obviously fun, as it should be, but security […]

Read the full article →