Tag Archive for VPN

How to Stay Safe While Christmas Shopping

How to Stay Safe While Christmas ShoppingThe last minute rush to finish your Christmas holiday shopping in here! The cyber-criminals know that too. so you better make sure you’re not being silly with your cybersecurity. There are amazing deals to be found on the innerwebs as well as online scams. The bad guys want to take advantage of the holiday season to steal your important information.

Mashable recommends that you do your own due diligence and use common sense while shopping online. Here are some basics steps to take while buying your last minute Christmas holiday gifts.

Use familiar websites

To protect yourself while Christmas shopping online, start with a trusted website. Search results can be rigged. If you know the site, Mashable says chances are it’s less likely to be a rip-off. Do not trust results past the first few pages of links.

Most popular browsers will display a small lock icon in the URL bar to identify a secure website, so be sure to look out for that. Also beware of misspellings or sites using a different top-level domain (.gq instead of .com .au, for example)—those are the oldest tricks in the book, and are likely phishing scams, designed to fool you trusting them by dressing up as a website or service you trust. Yes, sales on these sites might look enticing, but that’s how they trick you into giving up your info.

Don’t overshare online

Be wary when online stores ask for more than they need. If a site’s checkout form includes data fields that aren’t in any way necessary for the transaction, that’s a sign you may want to reconsider the purchase. If those fields are marked as required, that’s worse. But if you are desperate to go ahead, Mashable recommends just lie! Fill the irrelevant required fields with made-up data.

Avoid public Wi-Fi

Do not connect to public Wi-Fi to do your holiday shopping. You are better off using your own Wi-Fi home to shop. If you use public Wi-Fi like in a cafe or shopping center, there’s a chance your transaction could be being captured by hackers. Even if you think you’ve connected to a known, safe Wi-Fi network, nothing prevents a scammer from setting up a portable Wi-Fi hotspot with an SSID that’s the same as that of your favorite coffee shop. Sometimes circumstances may require that you do your shopping while out and about. Mashable says you can improve your security by turning off Wi-Fi and just using cellular data (4G/5G) while shopping.

Use a VPN

Even if you’re shopping on a familiar website, from your home computer, there is still valuable information that can be scraped from your online interactions. Mashable says your IP Address is often visible to anyone who knows where to look. This can provide cyber criminals with not only your exact location, but often all the other devices that are connected to your network at any given time. To avoid this, the simplest solution is to install a VPN (or Virtual Private Network). This will encrypt your communications and prevent any possibility of snooping. It’s also just a great habit to get into, as a good VPN will provide protection without slowing down your network speeds too much.

Be password smart

Some shopping sites let you check out as a guest, just giving the one-time information needed for your transaction. Others require you to create a login identity complete with password and username. Remembering passwords is tough, so you may be tempted to just recycle the same password over and over. Don’t! Hackers know that many people indulge in password recycling. When attackers get credentials from one retailer, they quickly try the credentials at other, similar sites. If you don’t want to remember multiple passwords, the best solution to create strong, secure ones is to use a password manager.

Watch your back

Another benefit to shopping from home: nobody potentially looking over your shoulder. When you whip out your credit card and start typing the number into a website, nearby snoops have an opportunity to see and memorize the number. You can foil shoulder-surfers by staying alert, sitting with your back to the wall, and keeping your screen shielded. Better yet, use your password manager to fill in saved credit card data, while the card itself stays safe in your wallet.

Check your bank statements regularly

Don’t wait for your bill to come at the end of the month. Go online regularly during the holiday season and look at electronic statements for your credit card, debit card, and checking accounts. Look for any fraudulent charges, even originating from payment sites like PayPal and Venmo. (After all, there’s more than one way to get your money.) Always keep track of your purchases online, and you will know straight away if something is wrong.

Stay informed

Once you have yourself and your devices fully protected, take the next step. Online threats are becoming more and more sophisticated every year, and you need to ensure you’re up to date with all the latest threats, as well as tips and tricks from cybersecurity professionals. Follow a security blog that is consistently updated as the industry shifts and threats evolve.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

KOSA: A Bad Idea for Online Safety

KOSA: A Bad Idea for Online SafetyThe Kids Online Safety Act, known as KOSA, is another half-assed publicity grab. The politicians fail to address the root cause of the problem – data collection. We can all agree that social media is bad for kids. There is enough proof from multiple studies and former social media company employees. Therefore, KOSA is not the answer. It will infringe on the rights and interests of all internet users.

Kids Online Safety Act

Two-tier Internet in the U.S.To begin with, the Kids Online Safety Act, known as KOSA introduced by Senators Richard Blumenthal (D) and Marsha Blackburn (R), would establish a two-tier Internet in the U.S. The bill requires that sites that are ‘likely to be accessed by kids‘ act in the “best interest of users who are 16 or younger.” That means that all platforms would be responsible for mitigating the risk of physical or emotional harm to young users. This includes “the promotion of self-harm or suicide, encouragement of addictive behavior, enabling of online bullying or predatory marketing.” Sound nice; however, KOSA is not the solution we need. Here are some of the reasons to oppose KOSA:

Kids Online Safety Act safety

The KOSA requirements would mandate that platforms have parental controls. These government-mandated controls could be harmful to kids in abusive situations. According to Fight for the Future, a coalition of over 50 civil society groups, “KOSA risks subjecting teens who are experiencing domestic violence and parental abuse to additional forms of digital surveillance and control that could prevent these vulnerable youth from reaching out for help or support.

Additionally, the KOSA requirements would endanger VPNs (one of the government’s favorite boogey-techs). The group wrote; “… by creating strong incentives to filter and enable parental control over the content minors can access, KOSA could also jeopardize young people’s access to end-to-end encrypted technologies, which they depend on to access resources related to mental health and to keep their data safe from bad actors.”

KOSA is government censorship

seeking to make political pointsKOSA would give the President control over what people see online. The government would create a “Kids Online Safety Council” that would advise the government on implementing and enforcing KOSA. As a result, the legislation’s requirement to restrict access to topics such as sex education, LGBTQ issues, and mental health from minors could cause platforms KOSA could force platforms to self-censor just to avoid the hassle and costs.

Furthermore, Fight for the Future writes that censorship would be politically driven. “Online services would face substantial pressure to over-moderate, including from state Attorneys General seeking to make political points… KOSA would cut off another vital avenue of access to information for vulnerable youth.”

KOSA encourages more data collection

incentivize sites to collect even more informationAccording to Fight for the Future, the bill would incentivize sites to collect even more information about children to verify their ages and place further restrictions on minors’ accounts. They explain,

“Age verification may require users to provide platforms with personally identifiable information such as date of birth and government-issued identification documents, which can threaten users’ privacy, including through the risk of data breaches, and chill their willingness to access sensitive information online because they cannot do so anonymously.”

Therefore, they conclude, “Rather than age-gating privacy settings and safety tools to apply only to minors, Congress should focus on ensuring that all users, regardless of age, benefit from strong privacy protections by passing comprehensive privacy legislation.”

Kids Online Safety Act unintended consequences

unintended consequencesKOSA would also create unintended consequences. The unintended consequences include driving children to use less secure or more harmful platforms. The Kids Online Safety Act would make kids more vulnerable to online predators who could exploit their age verification information. It would also undermine the trust and communication between children and parents, as well as between platforms and users.

rb-

There are valid concerns about the impact of social media on us all. But the Kids Online Safety Act misses the point. Congress should be targeting data collection. Nearly all social media platforms and online businesses collect personal data from their users. The EFF points out that all social media firms harvest and monetize our personal data and incentivize other online businesses to do the same. The result is that detailed information about us is widely available to purchasers, thieves, and government subpoenas.

Consider location data brokers, for example. Our apps collect detailed records of our online activities without our knowledge or genuine consent. The app developers sell it to data brokers, who will in turn sell it to anyone who will pay for it. An election denier bought it to try to prove voting fraud. One broker sold data on who had visited reproductive health facilities.

If a bad actor or the government wanted to buy this data, it could probably find a way to do so. Collecting more data will not stop the bad actors from acquiring PII.

The better approach is to limit how all businesses collect personal data. This would de-incentive data collection and reduce the supply of data for bad actors.

Everybody should be allowed to make informed choices based on their own values and preferences.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How the RESTRICT Act Will Ruin Your Online Privacy

How the RESTRICT Act Will Ruin Your Online PrivacyThe RESTRICT Act is better known as the “TikTok ban.” It is a bill where politicians are using national security rhetoric to enact sweeping legislation. The RESTRICT Act was introduced by Senators Mark Warner (D) and John Thune (R) in March 2023. RESTRICT stands for Restricting the Emergence of Security Threats that Risk Information and Communications Technology Act of 2023. The TikTok ban would give the President the ability to criminalize entire communications platforms, they oppose. The act will allow the executive branch to control what apps and technologies Americans have access to without a way to challenge those actions in court.

prohibit transactionsThe bill authorizes the President through the Secretary of Commerce to prohibit transactions involving information and communications technology (ICT) products and services in which any foreign adversary has any interest. The bill requires the Commerce Department to maintain a list of foreign entities that pose a risk to the U.S. ICT supply chain. The bill classifies China (including Hong Kong and Macau), Cuba, Iran, Russia, and Venezuela as foreign adversaries.

The RESTRICT Act

Under the RESTRICT Act, the President could criminalize the entire communications platform he or she opposes. The Commerce Department will have broad powers. The bill authorizes them to, “deter, disrupt, prevent, investigate, and mitigate transactions” involving social media they do not like. It is not unreasonable to anticipate that the next Republican President would use the act. They could shut down any platform that contains information on Reproductive Rights, Black Lives Matter, Supreme Court ethics, Criminal trials, Disney, or the outrage du jour.

The “TikTok ban” is bad for America for a number of reasons. There are technical and Constitutional problems with the bill. The biggest technical threat is banning VPNs. Banning VPNs has long been a goal of the FBI as part of their “going dark” fear-mongering.

VPN’s

A Virtual Private Network (VPN) is a service that encrypts and routes your internet traffic through a server in another location. A VPN encrypts your communications to protect your data. VPNs make it appear as if you are accessing the web from the VPN server’s location. This legislation could outlaw the use of VPNs. The bill would give the Department of Commerce broad power to impose “mitigation measures” on technology products. The bill could criminalize the use of VPNs, or even ban VPNs altogether. The bill’s vague language leaves room for interpretation and uncertainty.

First Amendment

First AmendmentExperts agree the legislation would violate our First Amendment rights of the Constitution without actually protecting American consumers. The TikTok ban is a violation of the First Amendment because it infringes on the right of millions of Americans to express themselves and access information on a popular social media platform. The ban is also overbroad and disproportionate, as it would effectively censor all social media content, regardless of its source or nature. The ban would set a dangerous precedent for government interference with free speech online and would undermine the values of democracy and openness that the First Amendment is meant to protect.

Fourth Amendment

Fourth AmendmentThe TikTok ban is a violation of the Fourth Amendment of the Constitution. The 4th Amendment protects the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures. The RESTRICT Act allows the government to access and delete the personal data of millions of social media users without their consent, probable cause, or a warrant. This would infringe on their privacy and freedom of expression. The ban would also harm the creators and businesses that rely on social media as a source of income and exposure. The ban is not justified by any compelling national security interest, but rather by political motives and unfounded allegations.

RESTRICT Act Punishes Americans

civil and criminal penaltiesAmericans who violate The RESTRICT Act could end up with civil and criminal penalties. The bill would impose civil and criminal penalties for violations of any order or mitigation measure issued. The civil penalties include fines up to $250,000 or twice the value of the transaction that served as the basis of the order, whichever is greater. The criminal penalties of up to $1 million and up to 20 years imprisonment.

rb-

There are legitimate data privacy concerns about all social media platforms, including but not limited to TikTok. The EFF points out that all social media firms harvest and monetize our personal data and incentivize other online businesses to do the same. Nearly all social media platforms and other online businesses collect a lot of personal data from their users. The result is that detailed information about us is widely available to purchasers, thieves, and government subpoenas.

Consider location data brokers, for example. Our phone apps collect detailed records of our physical movements, without our knowledge or genuine consent. The app developers sell it to data brokers, who in turn sell it to anyone who will pay for it. An election denier bought it to try to prove voting fraud. One broker sold data on who had visited reproductive health facilities.

If China wanted to buy this data, it could probably find a way to do so. Banning TikTok from operating in the U.S. probably would not stop China from acquiring the location data of people here. The better approach is to limit how all businesses in the U.S. collect personal data. This would reduce the supply of data that any adversary might obtain.

President Biden has already said he would sign off on the RESTRICT Act if it lands on his desk,

Everybody should be allowed to make informed choices based on their own values and preferences.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

4 Things To Do On Data Privacy Day 2022

4 Things To Do On Data Privacy Day 2022Today is Data Privacy Day. Data Privacy Day commemorates the first legally binding international treaty dealing with privacy and data protection, signed on January 28, 1981. It is observed annually in Canada, the U.S. and Europe. In North America,  Data Privacy Day campaign is officially led by the National Cyber Security Alliance (NCSA). 

Data Privacy Day Tips

The more information you share about yourself (as well as your friends and family), the greater the risk of exposure to online threats such as identity theft, cyber-stalking and cyber-bullying. Here are some simple tips on how to protect your online information, identity and privacy on Data Privacy Day 2022.

Secure access to your devices

Use strong passphrases, passcodes or touch ID features to lock your devices. These security measures can help protect your information if your devices are lost or stolen they can keep snoops out of your business. Strong passwords tips from Cnet.

Think before you share

Big tech loves your dataBig tech loves your data. This data privacy day, take  steps to protect Information about you, such as the games you like to play, your contacts list, where you shop and your location. It all has value to Facebook. Treat your info – just like money. Be thoughtful about who gets that information and how it’s collected through apps. Tips to protect yourself from Facebook.

Be smart about Wi-Fi

Public wireless networks and hotspots are not secure. Anyone can potentially see what you are doing on your mobile device while you are connected. Limit what you do on public Wi-Fi. Avoid logging in to critical accounts like email and banks on these networks. Consider using a virtual private network (VPN) to be more secure on the go. Safe VPN apps according to Tom’s hardware.

Keep your mobile phone up to date

Patching all your devices is the best defenseYour mobile devices need regular updates just like your PC or laptop. This data privacy day, install the most up-to-date security software, web browser, operating system and apps. This is the best way to protect you privacy. Patching all your devices is the best defense against viruses, malware and other online threats.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

WFH Was Growing Before COVID

Updated 05/17/2020 – Statista published this chart which shows the top reasons for WFH in 2019, as cited by U.S. remote workers.

Top reasons Americans wanted to work remotely

WFH Was Growing Before COVIDWork from home (WFH) – the practice of working remotely – has exploded with the COVID-19 pandemic. With social distancing in place, millions of more workers around the world started working from home in March 2020. But WFM is not a new trend. Computer Economics reports that over the past 11 years work from home has grown for many reasons.

Working remotely

Despite the pandemic, the trend toward telecommuting was already well underway according to Computer Economics. To measure how much telecommuting is occurring, they polled IT managers and asked them to estimate the percentage of their total staff that works from home at one of three levels.

In the 2019 report Trends in Telecommuting in the IT Workforce, Computer Economics found that 92% of IT shops allowed some form of remote work:

  • 37% “only a specified amount of time”
  • 35% “only under special circumstances
  • 20% allow personnel to work from home as they choose
  • 8% did not allow any telecommuting in 2019.

Trends in Telecommuting in the IT Workforce, Computer Economics

When Computer Economics conducted the same research in 2008, 64% of IT organizations did not allow their personnel to work from home – at all.

Computer Economics concludes that even before the pandemic, the growth of WFM was enabled by a number of technologies. They cite the growth of high-speed internet, mobile devices, remote access, low-cost web conferencing, VoIP, and cloud computing.

three business demandsWFM growth has been driven by three business demands. The research firm identified concerns about work/life balance, workforce retention, and business continuity. in the face of a pandemic is just one more benefit of the trend.

Tom Dunlap, research director for Computer Economics, wrote in the presser:

Many business leaders are learning a hard lesson … Having robust, companywide telecommuting capabilities in place—even if only used one or two days a week—should be deployed as a contingency measure during pandemics or other natural disasters.

rb-

I work for one of the 35% “special circumstances” firms. At the beginning of the month, I submitted a proposal to start to allow “specified amount” telecommuting. But with the onset of COVID – they started to allow WFH – we will see if it sticks  around in the “new normal.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.