Arizona Computer Techs

Local Verrado PC Computer Repair, affordable prices!

Facebook
RSS

AZ Computer Techs wants to ensure that all our customers are well informed users.  Therefore, we are going to start posting some computer terms with tips that you might not have heard of and other security terms to apply to everyday use.  An informed user and is an educated user.

PII

Personally Identifiable Information aka PII

Our first term is PII or Personally Identifiable Information.  When you hear of data breaches on the news (e.g the Target breach in 2013) and the acronym PII is mentioned, they are talking about the following:

“Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. This information can be maintained in either paper, electronic or other media.”

PII is especially valuable to hackers.  With so much PII data floating around, details can easily be cross-correlated, helping criminals quickly put together accurate identity profiles. With just a few pieces of “secret” personal information, thieves can potentially gain access to online accounts and even financial accounts through identity theft.

10 Tips to Prevent PII

  1. Be careful about sharing your social security number.
    The next time you are asked to share your Social Security details, stop and think. Is the person requesting your information from a bank, a credit bureau, or some other entity required to report to the IRS? If not, do not share your information. Identity theft relies on a valid Social Security number—the more organizations that have it, the less protected you are. If you are not sure why a bank or organization is requesting your Social Security number, call them and ask.
  2. Lock down your social media accounts.
    There is an incredible amount of personal information available on social media profiles, including birth date, relationship status, location, schools attended, employment information, and more. Cybercriminals use this information for social engineering purposes: they answer security questions, hack into companies, and launch highly personalized phishing campaigns. Make sure that your Facebook, Twitter, and other social media privacy settings are locked down with two-factor authentication and resist the urge to share private information online.
  3. Be wary of public Wi-Fi.
    Public Wi-Fi can make traveling easier, but be careful about how you use it. It’s pretty easy for criminals to set up a “free Wi-Fi” network, so before joining, confirm the name and password with the staff of the coffee shop or library. A VPN (virtual private network), which encrypts traffic between your device and the VPN server, is one of the best ways to keep your browsing session private. In addition, force your browser to use HTTPS. You can do this through an extension like HTTPS Everywhere. Finally, make sure you log off any services you were signed into and tell your device to “forget” the Wi-Fi network after you conclude your session.
  4. Get creative with security questions.
    The best way to keep bad guys from guessing answers to your security questions is to set up answers that you, and you alone, will know. Some sites allow you to customize your security questions. In this case, use a private memory or milestone—a phrase or word that will mean something to you but is not findable online. If you cannot customize your security answer, lie. You will not be denied access if you answer “what is your mother’s maiden name” incorrectly—just be consistent.
  5. Use strong passwords.
    Strong passwords are essential in protecting your security and identity online. But the characteristics that make passwords strong—twelve characters or more, symbols, numbers, capital letters, etc.—also makes them hard to remember. Here are some tips to help you:
  1. Browse privately.
    While private browsing does not make you entirely anonymous on the internet, it does help protect you online, especially if you are not using your private device. Private browsing deletes cookies, temporary internet files, and browsing history after you close the window. The best way to stay anonymous online is to hide your IP address using a web proxy, a VPN, or Tor, an open network that routes your traffic through a series of servers before sending it to your destination. But remember: it is never a good idea to use public or shared computers to login to sensitive sites like banking and social media.
  2. Watch out for phishing scams.
    Phishing scams are getting extremely advanced—97% of people around the world cannot identify a sophisticated phishing message. There are some key things to watch out for, however, including analyzing the salutation, being wary of attachments, and identifying embedded URLs.  More on phishing attacks later!
  3. Monitor your credit reports and financial activity.
    Review your bank and credit card statements daily for suspicious transactions. Also, scan your credit reports for abnormal activity, such as accounts or credit cards that you did not open along with any unexpected credit checks.
  4. Don’t give up your data easily.
    Be aware of how companies use your data. Take the time to read the fine print in the Terms of Service and Privacy Policy to understand what a company plans to do with the personal details you’re entrusting them with.
  5. Install the latest antivirus software.
    To protect your computer from viruses, spyware, trojans, and other malicious programs, install the latest antivirus software on your device. There are plenty of free as well as paid versions available from trusted companies. According to PCMag.com’s tests, AVG, and Ad-Aware’s free anti-virus programs scored the highest in their malware cleanup and malware blocking tests. Webroot, Norton, and Kaspersky’s anti-virus products are all good paid options.

While you may feel powerless against cybercriminals, taking steps like these can be extremely effective in protecting yourself against fraud.  We are always here to help you establish many of these practices.

 

One Response so far.

  1. Anonymous says:

    Awesome


How to protect your

[caption id="" align="aligncenter" width="500"] Need help on how to protect ...

Cybersecurity Traini

[caption id="attachment_590" align="aligncenter" width="500"] Make sure you educate your kids ...

What is Two-Factor A

[caption id="attachment_587" align="aligncenter" width="580"] Keep your online accounts secure with ...

Email Security Tips

I just passed the CompTIA Security+ exam and let me ...

What is Phishing and

What is phishing? Phishing scams are typically fraudulent email messages appearing ...

    Guarantee

    Guarantee

    If we can't diagnose or fix your issue, we'll refund your money. We will do everything we can to make sure your issue is resolved.

    Microsoft