Upgrading to a new computer soon? Don't make this big mistake

Do you have any old tech piling up and collecting dust? If so, you may be thinking about donating or selling it. This is a good idea, especially since gadget prices are skyrocketing. Many people are in the market for a gently used smartphone or computer rather than spending big bucks for a brand-new one.

However, there is one critical step that many people forget to take before getting rid of their old devices. They fail to delete sensitive data permanently, and that’s a huge mistake.

We’ll walk you through how to erase your info from any gadget brought to you by our sponsor, Dell. Need help to find the best tech solutions for your small business? See how Dell Technologies’ Advisors can assist you for free.

Never hand over personal information by mistake

People have been selling and donating old tech for years. One security researcher determined how many people remembered to delete their personal information before handing over their old devices. You’ll be surprised at just how many did not erase them properly.

Josh Frantz purchased 85 devices from businesses that sold refurbished, donated and used computers. He spent about $600 on desktop and laptop computers, flash drives, memory cards, hard disk drives and a few cell phones.

Frantz posted what he discovered on his rapid7 blog — and it was pretty shocking!

Of the 85 devices he bought, only two were appropriately wiped. Most of the devices still had tons of information on them.

With help from a script he wrote, Frantz found 214,019 images, 148,903 emails and 3,406 documents. From all that, he could see email addresses, dates of birth, Social Security and credit card numbers. Yikes!

Don’t let this happen to you. Before donating or selling a device, you must ensure everything has been appropriately deleted.

If you don’t wipe your device, information can be found later. All those deleted letters, financial documents and compromising photos lurk on the computer. All it takes is a little know-how to recover them.

When a file is deleted, your operating system removes the link to the file and marks the space free. That file will still exist on your hard drive until it’s overwritten by new information.

Continue reading

Tech security: How to wipe your phone or computer if it’s lost or stolen

Selling your old tech can put cash in your pocket, but don’t forget your devices store sensitive data that you don’t want a stranger to access.

Your smart speaker, for example, knows your location and may even store your voice recordings locally. Tap or click here for steps to wipe and deregister your Amazon Echo before selling it.

Continue reading

👊 Protect your personal info: Ensure your online privacy and keep your sensitive data safe from hackers and identity thieves. I use and recommend ExpressVPN. Literally one click and you’re protected. Use my link to get three months free.

This data-stealing phishing attack is a triple malware threat

Cybercriminals are always looking for new ways to spread malware. One of their favorite ways is by hiding malware in Android apps. Tap or click here for three types of Android malware to avoid.

Phishing attacks are another popular way to spread malware and steal sensitive data. There is a new type of phishing attack making the rounds that is difficult to spot.

Continue reading

New phishing scams targeting your bank account

Your personal information is precious to cybercriminals, but they also want to make some hard cash. When they are not selling malware or sensitive data on the Dark Web, many work on financial phishing scams.

While the tactics often vary, the end goal is to steal as much of your money as possible. And it’s not just one bank’s customers who are targeted. Over the last few months, many scams used fraudulent details for almost every bank in the U.S.

Continue reading

Secure your data with Chrome’s new Privacy Guide – Here’s how to use it

Before Google’s Chrome browser hits the magical version number of 100, a few more security issues need addressing. While a recent update adds more features, the new Privacy Guide is most beneficial to Chrome users.

Continue reading

Small business security 101: Do you need a server?

Data is the lifeblood of every business. From your clients’ contact information to your internal documents, proper storage, backups and security is key. 

You need a place to store all that data, and the cloud might not cut it. You may need to upgrade to a physical server.

Continue reading

Zoom finally adds a security feature you need to use now

If any platform has been the MVP during quarantine, it’s Zoom. This service has been the go-to tool for video conferences and meetings for many people while working from home.

Still, while Zoom has skyrocketed in popularity in recent months, it’s also had its fair share of embarrassing security problems. Issues with Zoombombing, malware, and phishing scams have made users and businesses wary of the platform — and rightfully so. Nobody wants a hacker to access an important meeting and hurl racial epithets or profanity. It’s bad for business.

Continue reading

Secure data removal and eraser tool

You don’t leave credit card and bill statements lying around where anyone can get to them. So why would you leave your digital data out for anyone to find? It may be time to get rid of that old computer, or maybe it’s just time to free up some hard drive space. Whatever the reason, that data has got to go.

Continue reading

Bank of America data breach - was your info exposed?

Of all the institutions that could be hit by a data breach, a bank is undoubtedly one of the worst. Not only are they finance hubs for millions of account-holders, but they also contain sensitive data like loan applications, Social Security numbers and taxpayer information.

Continue reading

The big privacy mistake you're making on your phone right now

There are many rules when it comes to protecting yourself online. One of the most important is to have strong, unique passwords for every one of your online accounts.

If you don’t know how to come up with strong passwords, we can help. Tap or click here for 5 new rules to create the best passwords.

Continue reading

Lost your phone? 3 simple ways to track down a lost or stolen Android

Have you noticed how expensive new smartphones can be? If you love the latest and greatest, you can pay about $1,000 for your next Android phone. Buy a new one for every family member and you’re looking at a bill of about $4,000. Yikes!

Continue reading

Update your phone now! Bug lets hackers take over

Kim tells you all the time to keep your internet-enabled devices updated — and for good reason. Updates help preserve your system’s integrity and protect the sensitive data within.

It’s easy to ignore update notifications, but the inconvenience of updating can be the difference between a phone that is safe, secure and works properly, and one that is vulnerable to outside threats or malfunctions. Tap or click to discover the five things you must do to protect your phone from hackers.

Continue reading

3 places to store photos in the cloud

Saving images via hard drives or importing to your computer can be a hassle. If you take a ton of photos, the cloud can store them without the need for extra work. The best part about the cloud is it isn’t designated to any particular provider. It is totally internet-connected and whether you use Apple, Google or Amazon products, it is available for you. Let’s take a look at three popular cloud services so you can decide which one is best for you.

Continue reading