Security 14 – The Cost of a Security Breach

Your Target experience was marred by the fact your credit card information got hacked. Who pays for this? How much does it really cost? On today’s episode we talk about the monetary value of a data breach, and the huge cost it costs to secure the data. Both Chaim and Tom shares experience in using credit monitoring services.

Security 13 – Phish, Phishing, and Spear Phishing

We go back to basics and discuss what to watch out for with internet scams.  This could sound like a whole bunch of common sense to most people, but please, share this with your friends and family who you think could fall for it.  Remind them, there is no Prince of Nigeria that knows who you are.  There is no Windows PC call center.  And if you run anti-virus, remember, you need to keep it up to date.

Security 12 – [Explicit] NSA Gets the iOS7 Treatment (Part 3 of Many)

We had a great show for you, but once again, news that couldn’t wait popped up. Once again we talk about what is going on with the NSA revelations. The big news is that iOS devices could potentially have malware that sends the data back to Utah. While only a physical attack, remote attacks ‘are coming soon.’

Next, your new laptop may have been intercepted by the NSA while in transit. Hardware modifications to send back data could have been installed.

Finally, we don’t know what is safe anymore.  We do know that most devices have some sort of back door.

Show Notes:
iPhone Access | Daily Dot
Laptop Hijacking | The Verge
NSA Back Doors | Der Spiegel


Security 11 – Two Factor Authentication

Two factor authentication is the next tool in our arsenal of being secure. After you have changed your passwords, now take the next step to secure it. While each service requires a different set up, the big names all use Google Authenticator. We think once you get this procedure in your workflow, you will be happy knowing you are really safe online.

Word of Warning: Please give yourself enough time to set this up. The first time is scary. Once you set it up, losing your second factor or your password will make your life extremely difficult. Remember you are trying to prevent impostors from accessing your information.

Show Notes:
Google Authenticator | Play | iTunes | Windows Phone
ubico | Yubikey
astPass | Set Up 2FA
Google Accounts | Set Up
ist of Sites with 2FA | Evan Hahn

Security 10 – Home Sweet Secure Home

The migration home is generally a good time for everyone. You get to spend time with your family and friends; unless you know the computer. If you are good with the computer, you know this is the time of year where everyone asks you to quickly look at their computer, and fix their printer. On today’s show we present to you some stuff you can do on your travels back home. This may cost you some money, but at the end of the day you will be happy with the time you will save.

Show Notes:
First step – Backup:
Two Backup Hard Drives – One to setup with a backup service, and one for you to have. Any USB external hard drive will do.
Dropbox: Online backup for important need to have files.
Carbonite – Offsite, Online Backup

Second Step – Software
Patches – Windows Update
Windows Security Essentials
Ninite – Free, Ad Free Programs

Third Step – Remote Desktop