5 dumb tech security mistakes you’re making

You might think you have a solid cybersecurity plan. You use strong passwords and defensive measures like VPNs and firewalls. But even the strongest shield gets dented from time to time.

It’s hard to remember all the settings you’ve adjusted and the passwords you’ve made over the years. Let this be your reminder to go in and make a few quick changes to protect yourself.

1. Using the same PIN for your phone lock screen as your bank

You don’t want to remember a bunch of codes. They’re easy to forget, so you keep it simple and reuse the same PIN.

Don’t give in to temptation! It could lead you to financial ruin. Say you’re relaxing in the coffee shop, and you open your phone. Someone standing behind you could notice your code, write it down and start using it to access your bank account within minutes.

To protect yourself, use different PINs. If you’re struggling to remember them all, consider a password manager.

2. You keep Bluetooth on 24/7

Bluetooth is a short-range wireless radio technology that works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data.

As with a Wi-Fi network or other connection, Bluetooth has vulnerabilities. Hackers and scammers must be close to you to use Bluetooth to hijack your phone — but in just about any public space, you’re arm’s length from strangers.

There are a couple of ways to disable Bluetooth on your iPhone. Go to Settings > Bluetooth and switch it off. You can also swipe down from the top right of your screen to open the Control Center and tap the Bluetooth icon.

The same steps work for Android phones: Go to Settings > Connected Devices > Connection Preferences > Bluetooth and switch it off. (Note: Steps vary based on your phone’s model. Look or search for Bluetooth if these steps don’t match your phone.)

3. Leaving your Wi-Fi network or router unprotected

Continue reading

Tech security tip: Totally normal things that put you in danger

When was the last time you changed your usernames? Do any of them contain any information that makes it easy to identify you? If so, you need to change that. Here are five username mistakes to avoid, along with simple fixes.

Continue reading

8 tech security products everyone should own

Technology can make life better, but it can also expose personal information and destroy your privacy. While you should be aware of the dangers of hackers, the very manufacturers who make your products also collect data. To protect yourself from digital threats, you’ll need each tech security product on this list.

Continue reading

Tech security tip: How to remove malware from your phone or computer

Anyone who regularly browses the internet needs antivirus software. Think of it as a life jacket. It’s there to keep you safe in case of an emergency.

And when malware strikes at your defenses, it’s code red. You’re afraid that you’ll lose everything, your emotions are high and you might not be in the right state of mind to find a good solution. That’s why preventative measures make a world of difference.

Continue reading

Tech security: How to wipe your phone or computer if it’s lost or stolen

Selling your old tech can put cash in your pocket, but don’t forget your devices store sensitive data that you don’t want a stranger to access.

Your smart speaker, for example, knows your location and may even store your voice recordings locally. Tap or click here for steps to wipe and deregister your Amazon Echo before selling it.

Continue reading

7 ways someone can hack your phone

Any American without a mobile device is in the minority. Only 3% of Americans don’t own a cellphone, the Pew Research Center says. Mobile devices play a central role in our daily tasks, as conduits for alarms, messaging, navigation and even grocery shopping.

Continue reading

Check your phone! 24 apps that contain the dangerous Joker malware

Earlier last month, nasty malware was making the rounds, giving hackers access to all kinds of personal information. Called Joker, it was embedded into several Android apps and overwrote the operating system’s notifications.

Continue reading

Tech security tip: How to delete private data for good

Moving a file to the trash on your PC or Mac gets rid of it for good, right? Not so fast.

These files can be seen by others later, and they could be slowing down your machine. Tap or click for my favorite tricks to speed up an older computer.

Continue reading