Many years ago, we lived and worked in the same town. Everyone knew you and business was conducted because of your reputation. As time went by, people were able to do business across longer distances and, today, we conduct business with people from all around the world.
We don’t personally know the people we are working with and they do not know us. We rely on public key encryption to verify from whom we are receiving information and to whom we are sending information.
It is good to plan for computer failure. It will happen eventually and probably at the worst possible time. The first thing that you need to do is determine what you use your computer for and what information on it you need.
If determining what you use on your computer seems daunting you can back up the entire computer. There are a number of cloud based backup solutions that allow you to do continuous backups for a fee when you are online, some of the better known solutions are IDrive, Carbonite, and CrashPlan.
I recently tried to use a Visa gift card that I received over the holidays. The cashier asked me how much money the card had on it. I responded that I wanted to use the whole card towards my bill.
Over the holidays, many families spend time traveling in their cars. There are number of devices that make can provide entertainment while traveling. The two devices to consider are mobile hotspots and mobile storage devices.
The hacking of Clinton Campaign Chairman John Podesta’s email provided a lesson for us all. It was an amazingly simple phishing email that caused his password to be revealed. An email was sent to Podesta’s gmail account saying someone had used his password to login to his account from the Ukraine and he should change his password. It included a link to change the password.
One of the most difficult aspects of security is uniquely identifying a user and verifying that they are who they claim to be. This is normally down through a username and password. The username uniquely identifies the user and the password verifies that they are that user.