Military veterans are prime targets for personally identifiable information (PII). Businesses seek our Post 9/11 GI Bill because it's sure money. Employers see us as tax breaks. For as many benefits as we get between Veterans Affairs (VA) and the GI Bill, plenty others get an interesting bit of benefits from our presence. This is one of many reasons as to why military service members must be careful of how we share our military info.
Don't worry, non-technical folks, as I've done my best to simplify the best security practices, these days sometimes called the "Zero Trust" mindset, that I'll recommend in the key takeaways and video below. The overall solution: verify contacts supposedly from VA medical centers and community-based outpatient clinics (CBOCs).
Amazon Alexa devices, smart doorbells, and Wi-Fi enabled pace-makers have a few notable similarities. First, they simplify and automate redundant, necessary tasks for many Americans' lifestyle, security, and health. Second, they're all available at an affordable price, even after the COVID-19 pandemic. Most importantly, they're extremely portable wireless technologies capable of communicating with common consumer electronics including personal computers (PCs) and smartphones via wireless and cabled connections. That is the glory of “smart devices,” formally known as Internet of Things (IoT) devices.
After reading "It's Time to Stop the Victim Blame Game" on DarkReading.com, I had to rethink some of my personal shopping rules. This part stuck out to me:
First published on March 17, 2015
If you ever get bored, check out “Nonprofit.net/hoax – Don’t Spread That Hoax” for some random trivia, entertainment, myths, IT fun facts, and plenty of useless knowledge.
First published on May 15, 2015
Whenever you sell a computer, don’t simply leave the hard drive with all your data easily recoverable. Ensure you keep the hard drive (HD) as a backup or external drive, wipe it properly so the data can’t be recovered, or destroy it completely with hammers, drills, and other manly stuff. I was on Craigslist earlier searching for a cheap laptop to buy so I can play with Linux. I found a guy looking to sell two laptops for ~$70 simply because his ex-girlfriend changed the log-in passwords. Hard Drives – Keep, wipe, and/or destroy it. But don’t simply give it, and all your information, away for free. Your credit score and mindset will thank you later.
First published on June 18, 2015
I’ll just leave these links here. GO and ROAM may cause paranoia.
First published on July 3, 2015
First published on September 10, 2015
If last weeks post spiked your interest in web security, privacy, and tracking, you should check out http://browserspy.dk/. Simply visit the site and the tabs (tests) on the left will educate you on what information your web browser is sharing.
I’m sure you’ll be surprised.
First published on September 21, 2015
Have you ever been on Facebook or Twitter and seen a short website address provided by a source that’s not completely professionally verified? For example, https://bit.ly/2AvtgLn. Called shortened or tiny URLs, it can save space anywhere, but it also hides the origin of the source.
First published on November 30, 2015
When you’re experiencing computer issues due to a failing hard drive, you have options:
First published on September 19, 2016
Adsense / Google Ads
First published on August 27, 2015
If you’re one of those people that are against privacy intrusion and unwanted tracking of your web browsing, replace Google with DuckDuckGo as your primary Web Search Engine. Simply go to DuckDuckGo.com and select the link at the bottom of the homepage. Read more about safeguarding your online activity below.