Blog Post

Staying Safe

BeckyStrause

This post is not to instill fear into anyone, but to bring awareness.  Recently I read an article about how Mat Honan, senior writer at Wired , got seriously hacked.  He said, “In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.”

That happening to someone as tech-savy as Mr. Honan proves that many of us could be susceptible.  A lot of us use the Internet nearly continuously day in and day out.  We use it for work , we use it to keep in touch , and we use it for entertainment.  Certainly the benefits of having all this wonder at our fingers outweigh the risks.  But no matter how often we say it, or hear it, the truth is there are risks and we need to be aware of them so we can do the best to protect ourselves.

The topics of staying safe online, keeping your files safe, and the risks involved with regular Internet use have been written about again and again, and there is always more to say.  This article isn’t going to be complete, but the goal is for you to think about  your personal online safety and give some simple pointers to help you stay at least a little safer.

I have several email addresses I check on a daily basis, 7 to be exact.  I know that might seem overkill, and maybe it is.  Seven may not be necessary, but I keep multiple accounts for 2 primary reasons.  One is simply to keep myself organized, not getting all types of emails to one address helps me keep things straight and not feel overwhelmed.  The other reason is so that my accounts are not daisy-chained together.  For example, if you hack into the email address I use to sign into Facebook, you’re not going to get my Amazon account info.  Not only do I use different providers, I also use different prefixes.  This is something that Mat Honan pointed out in his article about getting hacked.   He says, “I shouldn’t have daisy-chained two such vital accounts — my Google and my iCloud account — together. I shouldn’t have used the same e-mail prefix across multiple accounts — mhonan@gmail.com, mhonan@me.com, and mhonan@wired.com. And I should have had a recovery address that’s only used for recovery without being tied to core services.”

Here’s the first tip:  use multiple email addresses with multiple prefixes.  How many addresses should you have?  Well, you may want 1 that’s just for social media and “enter your email address here to get our newsletter” websites, one that you share personally for communication, and one that’s just for account recovery that isn’t linked to anything else.

The second tip is something we have shared before on this blog:  passwords, passwords, passwords…  It’s important to use various passwords.  It seems like a pain because it’s so much to remember, but this is an important step in staying safe.  Passwords should be a complex combination of letters, numbers and symbols.  A bit of advice is to create passwords based on a sentence you can easily remember.  You can use the first letter of each word, or even substitute letters for similar numbers.  For example, “My son’s name is Bradley and he was born in 2010” could translate to “mS*10!n3”.  That is:   m (my) S (son capitalized) *10! (putting the year of birth in the middle of the password surrounded with an asterisk and exclamation point) n (name)  3 (for Bradley because it looks similar to a B).   Now the challenge is creating several passwords like that and remembering them all.

The third tip: If an extra security step is offered, use it.  Google uses a two-factor authentication feature, but Mat Honan admits he did not use it.  Basically, you need to use your password, and verification code that Google sends your phone to sign in.  According to Google , “2-step verification drastically reduces the chances of having the personal information in your Google account stolen by someone else. Why? Because hackers would have to not only get your password and your username, they’d have to get a hold of your phone. ”  It may seem like a pain to have to put in this extra information, but in the end it might be worth it.

That may be one of the most important points to bring out, using all the security available is worth it if someone attempts to hack your accounts.  You may have excuses to use 1 email address for everything, with the same simple password that you use for your banking and social media, and to skip the extra security steps.  But all those excuses won’t matter if your info falls into the wrong hands.

These are not the only online safety tips we could give.  Feel free to leave comments of any other ones.

By Eberly Systems 02 May, 2024
West Lawn, PA, May 2, 2024 — Eberly Systems , the West Lawn-based managed IT services and managed voice provider, today announces its acquisition of the Lebanon-based LYLAB Technology Solutions. Eberly Systems seeks to further a movement of people who are motivated and equipped to make a difference in their world through their daily work. They believe in building lasting partnerships based on trust and transparency while delivering industry-leading solutions to support and protect critical business assets. Driven by the principles of people, excellence, integrity, and stewardship, the team prides itself on partnering with companies to securely, reliably, and efficiently grow their businesses. “We cannot be more excited to join forces with the LYLAB team,” comments Kordel Eberly, Eberly Systems President & Founder. “ The integration of LYLAB Technology Solutions into Eberly Systems solidifies our commitment to providing small businesses with unparalleled service and support. We’re proud of this new opportunity to carefully design and manage the IT infrastructure and systems of even more local businesses and communities.” The acquisition solidifies the Eberly Systems commitment to supporting businesses in Lebanon County. Merging the two teams together as one entity offers the collective team the benefit of enhancing capabilities, refining processes, and extending reach to better serve the evolving needs of small businesses in the surrounding area. Future plans include expanding their presence into Lancaster County.
computer help with IT support
By Eberly Systems 16 Jan, 2024
A trusted MSP can be your invaluable strategic partner.
By Eberly Systems 02 Jan, 2024
These 5 key features of Office 365 Business Premium make it essential for businesses to have.
set of keys
By Eberly Systems 19 Dec, 2023
Eberly Systems has been hard at work over the last year in a concerted effort to enhance the security posture of our clients’ information technology environments. Here are the quarterly updates.
construction site
By Eberly Systems 03 Jul, 2023
After years of steady growth, the workforce at a construction development and property management company was becoming increasingly frustrated by disorganized data. Eberly Systems deployed a hybrid cloud storage solution for efficiency and secure data access.
By Nate M. 01 Jun, 2023
SharePoint file storage has both features and limitations that you should be aware of while storing and accessing files. Here's a rundown.
By Nate M. 05 Jan, 2023
These are the Eberly Systems recommendations for creating good passwords in 2023.
By Eberly Systems 15 Dec, 2022
Every business relies on phones and a phone service. In accordance with Eberly Services Managed IT, we offer Managed Voice solutions for both handheld and softphones supported by our stellar sales and help desk teams.
By Eberly Systems 04 Oct, 2022
Eberly Systems is proud to offer new services around managed endpoint detection & response, cloud security, business internet brokerage, and unlimited projects.
By Becky 22 Sep, 2022
Annual fundraisers offer a great opportunity to use company paid volunteer time off.
More Posts
Share by: