How to Validate your Home Router is not Compromised

How to Validate your Home Router is not Compromised

In this day and age information security is becoming more and more vital. In a world where every week massive targeted hacks compromised an unprecedented amount of data, and ransomware can bring the largest of companies to their knees we must do everything we can to secure our personal home networks. I think in many cases people focus solely on securing their computers giving little to no thought about their router. This is an unfortunate oversight, securing your router the literal gateway connecting your personal network to the raw internet is every bit as essential as securing your personal computer. Home routers are often targeted in cyber-attacks because the majority of people never change the factory settings. It is amazing how many people leave the default device name and password, doing this amounts to inviting criminals into your network. Not only do people not change these credentials but generally the routers you get from your service provider are subpar and have well documented back doors. I know this sounds scary because in all honesty it is, however there are some very simple steps you can take to validate that your home router is not compromised. One of the most important and basic steps you can take in securing your router is to change the administrative credentials. How to do this varies slightly by manufacture and model but is generally an easy process involving logging into a website or sometimes connecting your computer to the router via ethernet. Once logged in its usually as easy as entering and saving more secure credentials. This is of the upmost importance when it...
Mobile Device Guide: How to Encrypt an Android Device

Mobile Device Guide: How to Encrypt an Android Device

This is a guide describing step by step directions on how to encrypt an Android device. There are several reasons to encrypt your smart phone. It keeps your data protected and secure from hackers, law enforcement and anyone else who has no business seeing it. When you think about what we all use our phones for the argument for encryption is amplified. I use my smart phone to do my banking, take all of my pictures, store medical files and important tax information. Beyond that your phone is constantly tracking you, it knows where you are every moment of your life, it knows where you live, where and when you work and go to school. Much like Santa even knows when your sleeping and awake. Every personal text conversation and email you receive is on your phone as well. Encryption is key to keeping all of this personal private data actually personal and private. I love the idea of encryption because strong encryption is mathematically impossible to break. There is not many things so full proof in life. Encryption has become so important all newer Android devices come with encryption on by default. To write this article I had to use that old nexus 5 I rooted because its running an old enough version of Android that it isn’t encrypted by default. As a side note if you are using a rooted device you must first unroot to encrypt. Encryption was not on be default on any version of Android earlier then Android 6.0 Marshmallow. Before you start the encryption process make sure your battery is fully charged and...

CREATE A CYBER-SAFE RESUME FOR ONLINE USE

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Identity theft is a world-wide problem and is growing at an alarming rate.  When searching for a job online, there is the potential of encountering dishonest advertisers and deceptive websites. To ensure your privacy and protect information about you and previous employers from surfacing on the web, consider adding a cyber-safe resume to your file of custom resumes.  By modifying the content of your resume, you will be able to recreate a line of privacy and protection, which will help deter information circulating on the internet. Limited contact information makes it hard for your identity to be stolen.  Remember, your resume can potentially exist on the internet forever.  Cyber-safe resumes are to be used for responding to online job postings.  Following are a few tips which you should take under consideration when posting your resume online. MINIMIZE PERSONAL INFORMATION:  Remove home address, phone numbers and email addresses.  Instead, include an unlisted cell phone number and a generic email address. SUMMARY:  Remove any specific or thorough information that can identify your place of employment. EMPLOYMENT:  Remove your employer’s name and replace it with a nonspecific but accurate description. EDUCATION:  Remove any dates or specific license/certificate numbers from your education segment. Many potential employers may consider your safe plan of action as desirable, because you are protecting their identity under the assumption you are hired.  Take control of your privacy and add the -SAFE in...

HOW TO SETUP AND CONFIGURE WIRELESS NETWORK IN SECURE MANNER

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Wireless networks are setup based on the administrator or end user’s goals, which includes:  speed, range, and security.  Deploying secure wireless networking is an ongoing practice.  Employing encryption to protect wireless network is one of the best manner to protect your wireless network from attacks and interceptions.  Encryption is the process of preventing unauthorize access by changing information or data into a code.  Wireless network users have an option of choosing between three common forms of secure encryption.  These options are: WEP, WPA. And WPA2.  Details regarding these protocols can be accessed through Wireless Encryption Basics.  Passwords are simply one level of security.  Encryption and selecting the right wireless broadband router are also essential when setting up your wireless network.  Another facet of setup of routers that should be considered is location.  Placement of the wireless router near a window means that your wireless signal range reach too far outside the house where it can be easily interception by cybercriminals.  Place your router in the middle of you house so all rooms have the same internet access.  When you leave on vacation, make sure to disable your wireless network, prevent an opportunity for malicious hackers to attempt to gain unauthorized access to your network. Here are great points about securing your wireless network: New technology on routers has wi-fi protected setup which has a WPS button to lock the device during setup. As with any software, check the manufacturer’s website for updates to your firmware. Disable SSID in your wireless setting which will prevent your device showing up is a list of nearby network. Each device on the network...

How to remember only one password and maintain high levels of security with LastPass?

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
A long time ago, computer hackers were considered geeks who sat in their basement or garages and became expert programmers… that is the movie’s version.  In real life, hackers have no single descriptive factor.  Today’s hackers are defined as a person or persons who gain unauthorized access to users’ information for the intent of personal gains or malicious activities… it could be a friend next door, a family member in your home, or a complete stranger thousand miles away in a foreign country.  Years ago, hacking required hours of sitting in front of a computer trying various methods to gain unauthorized access through different levels of security on a computer system or network.  Now, is it as simple as running a program or utilizing a hacker tools which exploit weak points and vulnerabilities and penetrate private information.  Sometimes, hackers take only a passive role and observe network activity, while others take on a more active role and simulate attacks and use confidential information for malicious gains.  Whatever the case, it is an invasion of privacy and breach of security … we are now in the new era of cybersecurity.  With all the worms, viruses, malware, spyware, how can users maintain and secure password credentials and personal information? If you are like me, all passwords are conveniently “remembered” on your personal laptop or computer.  But, if you need to logon to a site using a different computer away from home, you either:  a) reset your password after successfully advancing through a two-factor authentication (for example:  email address associated with account or “what was the name of your first pet?”) or b)...

What are the differences between Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets

There are many different issues that can affect your computer and network. Some of the things that can cause harm to your computer might be done on purpose. These threats are known as malware. There are different forms of malware that can harm your computer; Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets. Adware is any software package that automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. Worm is a standalone malware computer system that replicates itself in order to spread to other computers.Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer’s consent, or that asserts control over a device without the consumer’s knowledge. Trojan is a malicious computer software which is used to hack into a computer by misleading users of its true intent. The term is derived from the Ancient Greece story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth. Rootkit...