View Area Listings
4789 Route 309 | Center Valley, PA 18034
Phone: 610-393-9393 | Office Phone: 610-791-4400 | Fax: 267-354-6225
< Back to Judy Kistler's Blog
April 20, 2017 2:27 am
Spring cleaning may call you to empty those closets, wash the windows and lug mountains of items to the local thrift store. But have you ever considered paying the same attention to your digital spaces?
NCSA has identified our top, trouble-free tips that everyone should follow this spring.
- Keep a clean machine: Ensure all software on internet-connected devices – including PCs, smartphones and tablets – is up to date to reduce risk of infection from malware.
- Lock down your login: Your usernames and passwords are not enough to protect key accounts like email, banking and social media. Begin your spring cleaning by fortifying your online accounts and enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device.
- Declutter your mobile life: Most of us have apps we no longer use and some that need updating. Delete unused apps and keep others current, including the operating system on your mobile device. An added benefit of deleting unused apps is more storage space and longer battery life. Actively manage your location services, Bluetooth, microphone and camera – making sure apps use them appropriately.
- Do a digital file purge: Perform a good, thorough review of your online files. Tend to your digital records, PCs, phones and any device with storage just as you do for paper files. Get started by doing the following:
- Clean up your email: Save only those emails you really need and unsubscribe to email you no longer need/want to receive.
- Back it up: Copy important data to a secure cloud site or another computer or drive where it can be safely stored. Password protect backup drives. Make sure to back up your files before getting rid of a device, too.
- Own your online presence: Review the privacy and security settings on websites you use to be sure that they remain set to your comfort level for sharing. It's OK to limit how and with whom you share information.
- Know what devices to digitally "shred": Computers and mobile phones aren't the only devices that capture and store sensitive, personal data. External hard drives and USBs, tape drives, embedded flash memory, wearables, networking equipment and office tools like copiers, printers and fax machines all contain valuable, personal information.
- Clear out stockpiles: If you have a stash of old hard drives or other devices – even if they're in a locked storage area – information still exists and could be stolen. Don't wait: wipe and/or destroy unneeded hard drives as soon as possible.
- Empty your trash or recycle bin on all devices and be certain to wipe and overwrite: Simply deleting and emptying the trash isn't enough to completely get rid of a file. You must permanently delete old files. Use a program that deletes the data, "wipes" it from your device and then overwrites it by putting random data in place of your information ‒ that then cannot be retrieved.
Source: The National Cyber Security Alliance
Published with permission from RISMedia.
Copyright© 2017 by eWebEngine - A Division of Lone Wolf Real Estate Technologies
Each RE/MAX office is independently owned and operated
RE/MAX 440, PA