{"id":14594,"date":"2012-03-13T16:53:01","date_gmt":"2012-03-13T22:53:01","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-03T21:31:51","modified_gmt":"2021-08-04T01:31:51","slug":"detroit-safest-online-city-again","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/detroit-safest-online-city-again\/","title":{"rendered":"Detroit Safest Online City Again"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-14486 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Detroit Safest Online City Again\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/malware.jpg?resize=65%2C65&#038;ssl=1\" alt=\"Detroit Safest Online City Again\" width=\"65\" height=\"65\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/malware.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/malware.jpg?w=116&amp;ssl=1 116w\" sizes=\"auto, (max-width: 65px) 100vw, 65px\" \/><a title=\"us.norton.com\" href=\"http:\/\/us.norton.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Norton<\/a>, the anti-virus arm of <a title=\"Symantec\" href=\"https:\/\/securitycloud.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Symantec<\/strong><\/a> (<a title=\"NASDAQ : SYMC\" href=\"https:\/\/wp.me\/p2wgaW-pra\" target=\"_blank\" rel=\"noopener noreferrer\">SYMC<\/a>) teamed up with research firm <a title=\"Sperling\u2019s BestPlaces\" href=\"https:\/\/web.archive.org\/web\/20230605204004\/http:\/\/www.bertsperling.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Sperling\u2019s BestPlaces<\/strong><\/a> to rank US cities based on a number of cybercrime risks and they found <strong><a title=\"Detroit Zoo\" href=\"http:\/\/www.detroitzoo.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Detroit<\/a> the safest online city for 2012<\/strong>. <em>I wrote about Detroit&#8217;s 2011 ranking <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-Dt\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p>\n<p><a href=\"http:\/\/www.madeindetroit.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-14487\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"detroit\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/detroit-e1565388678390.jpg?resize=126%2C69&#038;ssl=1\" alt=\"Detroit\" width=\"126\" height=\"69\" \/><\/a><a title=\"twitter.com\/bertsperling\" href=\"https:\/\/twitter.com\/bertsperling\" target=\"_blank\" rel=\"noopener noreferrer\">Bert Sperling<\/a>, lead researcher for the analysis said, \u201c<em>By looking at data from consumer lifestyle habits as well as cybercrime data provided by Symantec, &#8230; we\u2019re able to provide a holistic view of the various factors that put a person at potential risk.<\/em>\u201d<\/p>\n<p>The <a title=\"www.huffingtonpost.com\" href=\"https:\/\/www.huffingtonpost.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Huff Post<\/em><\/a> <a title=\"www.huffingtonpost.com\" href=\"https:\/\/www.huffingtonpost.com\/2012\/02\/26\/2012-riskiest-online-city-study_n_1302611.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that the study looked at the prevalence of <strong>Internet use<\/strong> in addition to the types of risks users face online. Consumer statistics include the <strong>number of PCs, use of smartphones, the use of social networks<\/strong>, e-commerce, and accessing potentially <strong>unsecured <a title=\"Hotspot (Wi-Fi)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Hotspot_%28Wi-Fi%29\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Wi-Fi hotspots<\/a><\/strong>. <em>BestPlaces<\/em> also looked at the following cybercrime data: bot-infected computers located within a specific city, attempted malware infections, <strong>spamming IP addresses<\/strong> found within a specific city, and <strong>web attacks originating<\/strong> within a specific city.<\/p>\n<p><a href=\"http:\/\/www.wi-fi.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-14494 size-thumbnail\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"wifi_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/wifi_logo1-e1565388736274-75x48.png?resize=75%2C48&#038;ssl=1\" alt=\"Wi=Fi\" width=\"75\" height=\"48\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/wifi_logo1-e1565388736274.png?resize=75%2C48&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/wifi_logo1-e1565388736274.png?resize=150%2C96&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/wifi_logo1-e1565388736274.png?w=304&amp;ssl=1 304w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Symantec <a title=\"www.symantec.com\" href=\"https:\/\/web.archive.org\/web\/20121124120746\/http:\/\/www.symantec.com:80\/about\/news\/release\/article.jsp?prid=20120215_01&amp;ocid=FB_021512\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> <a title=\"metrotimes.com\" href=\"https:\/\/metrotimes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Detroit<\/a> had low scores in the number of Wi-Fi hotspots, potentially risky online consumer behavior, and PC expenditures. Other low-ranked cities include <a title=\"Tulsa Oklahoma\" href=\"http:\/\/www.city-data.com\/city\/Tulsa-Oklahoma.html\" target=\"_blank\" rel=\"noopener noreferrer\">Tulsa<\/a> and <a title=\"El Paso, Texas\" href=\"http:\/\/www.city-data.com\/city\/El-Paso-Texas.html\" target=\"_blank\" rel=\"noopener noreferrer\">El Paso<\/a>.<\/p>\n<p>Users are at most risk for cybercrime in the following cities:<\/p>\n<p>1. <a title=\"Washington DC\" href=\"http:\/\/www.city-data.com\/city\/Washington-District-of-Columbia.html\" target=\"_blank\" rel=\"noopener noreferrer\">Washington<\/a><br \/>\n2. <a title=\"Seattle, Washington\" href=\"http:\/\/www.city-data.com\/city\/Seattle-Washington.html\" target=\"_blank\" rel=\"noopener noreferrer\">Seattle<\/a><br \/>\n3. <a title=\"San-Francisco, California\" href=\"http:\/\/www.city-data.com\/city\/San-Francisco-California.html\" target=\"_blank\" rel=\"noopener noreferrer\">San Francisco<\/a><br \/>\n4. <a title=\"Atlanta, Georgia\" href=\"http:\/\/www.city-data.com\/city\/Atlanta-Georgia.html\" target=\"_blank\" rel=\"noopener noreferrer\">Atlanta<\/a><br \/>\n5. <a title=\"Boston, Massachusetts\" href=\"http:\/\/www.city-data.com\/city\/Boston-Massachusetts.html\" target=\"_blank\" rel=\"noopener noreferrer\">Boston<\/a><\/p>\n<p><a href=\"https:\/\/securitycloud.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-14495\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Symantec_logo\" src=\"https:\/\/i0.wp.com\/rbachnet.wwwmi3-ss40.a2hosted.com\/wp-content\/uploads\/2013\/08\/Symantec_logo-75x19.png?resize=117%2C30\" alt=\"Symantec\" width=\"117\" height=\"30\" \/><\/a>\u201c<em>With the explosion of smartphones, tablets, and laptops in recent years, and the rise of apps and social networking sites, our online and offline lives are blending together in ways that we\u2019ve never before experienced,<\/em>\u201d said Marian Merritt, Norton Internet Safety Advocate. \u201c<em>&#8230;this analysis highlights the potentially risky factors we face each time we go online. By taking a few simple precautions now, people can make sure they stay protected against online threats<\/em>.\u201d<\/p>\n<p>Greg Donewar, manager of the <a title=\"National White Collar Crime Center\" href=\"http:\/\/www.nw3c.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">National White Collar Crime Center<\/a> told <em>Huff Post,<\/em> \u201c<em>&#8230; over the past year, we\u2019ve seen a considerable increase in cybercrime attacks, and whether a person lives in the riskiest online city or the safest, consumers everywhere need to be aware of the inherent dangers of online activity.<\/em>\u201d<\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em><a title=\"www.forbes.com\" href=\"http:\/\/www.forbes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Forbes<\/a> <a title=\"www.forbes.com\" href=\"http:\/\/www.forbes.com\/sites\/moneywisewomen\/2012\/02\/24\/top-10-riskiest-cities-for-cybercrime\/\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> that cyber-crime is a $37 billion crime that affects 1 in 25 Americans. Take these steps to protect yourself online:<\/em><\/p>\n<p><em><strong>Create better passwords. <\/strong>Avoid passwords like password, 123456, qwerty, abc123, or monkey, <a title=\"www.huffingtonpost.com\" href=\"https:\/\/www.huffingtonpost.com\/2011\/11\/18\/top-25-worst-passwords-of-2011_n_1101710.html\" target=\"_blank\" rel=\"noopener noreferrer\">these<\/a> are the top most common passwords (I have been <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-uw\" target=\"_blank\" rel=\"noopener\">writing<\/a> about weak passwords for since 2010). Forbes says your first line of protection against cybercrime is to make sure all of your passwords follow these rules of thumb:<\/em><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20140119180806\/http:\/\/www.screened.com:80\/clint-eastwood\/14-141\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-14497 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"clint_finger\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/clint_finger-e1565388825534-51x75.jpg?resize=94%2C138&#038;ssl=1\" alt=\"\" width=\"94\" height=\"138\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/clint_finger-e1565388825534.jpg?resize=51%2C75&amp;ssl=1 51w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/clint_finger-e1565388825534.jpg?resize=103%2C150&amp;ssl=1 103w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2012\/03\/clint_finger-e1565388825534.jpg?w=270&amp;ssl=1 270w\" sizes=\"auto, (max-width: 94px) 100vw, 94px\" \/><\/a><\/p>\n<ul>\n<li><em>At least eight characters<\/em><\/li>\n<li><em>A mix of these four types of characters: upper case letters, lower case letters, numbers, and special characters<\/em><\/li>\n<li><em>Not a name, slang word, or any word in the dictionary<\/em><\/li>\n<li><em>Don\u2019t keep the same password; change it every six months<\/em><\/li>\n<li><em>Have uniquely different passwords (not just slight variations of the same password) for every account and site<\/em><\/li>\n<\/ul>\n<p><em><strong>Monitor your financial accounts. <\/strong>If you shop online, use online banking, or have any personal or financial information available online, you are at risk of finance-related crimes like identity theft and fraud which <a title=\"The Huffington Post\" href=\"http:\/\/twitter.com\/huffpost\" target=\"_blank\" rel=\"noopener twitter noreferrer\">Huff Post<\/a> says costs the average victim $631 in out-of-pocket costs. Forbes says that one of the easiest ways to protect yourself is to monitor your credit to detect any red flags early. They recommend users set up spending limit alerts on credit cards and checking accounts to keep tabs on your balances. Automatically monitoring for suspicious activity and fraudulent accounts helps catch costly identity theft and fraud immediately.<\/em><\/p>\n<p><em><strong>Lockdown your smartphone<\/strong>. If you use your smartphone to shop, spend, socialize, and surf, your phone\u2019s sensitive information essentially becomes a one-stop shop for cybercriminals. Forbes says if stolen or exposed to thieves, your smartphone can compromise your personal and financial information anytime and anywhere. Here\u2019s a quick five-minute checklist from Forbes on how to properly secure your mobile phone:<\/em><\/p>\n<ul>\n<li><em>Password-protect your phone with a complex and unique password, and set your phone so it auto-locks and never saves any passwords.<\/em><\/li>\n<li><em>Enable a service with remote tracking. You can also set your phone to automatically wipe your data if your phone password is inputted incorrectly several times.<\/em><\/li>\n<li><em>Turn Bluetooth off if you\u2019re not using it. Thieves can pair their Bluetooth device with yours and hack personal information.<\/em><\/li>\n<li><em>Be careful on public Wi-Fi networks where thieves can remotely access your data undetected. Only connect your phone to secure networks.<\/em><\/li>\n<li><em>Before downloading any apps to your phone, always do a quick search to make sure it comes from a legitimate site or publisher. Check user reviews on sites like <a href=\"http:\/\/viaforensics.com\/appwatchdog\/\">appWatchdog<\/a> for complaints.<\/em><\/li>\n<\/ul>\n<h6>Related articles<\/h6>\n<ul>\n<li>Why you should password-protect your smartphone (ctv.ca)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Symantec says Detroit has low scores in number of Wi-Fi hotspots, potentially risky online consumer behavior &#038; PC expenditures<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,1819,1457,166,19,2541,200,4,165,1366,579],"class_list":["post-14594","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-computer","tag-crime","tag-detroit","tag-michigan","tag-passwords","tag-risk","tag-security","tag-symantec","tag-symc","tag-wi-fi-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=14594"}],"version-history":[{"count":20,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14594\/revisions"}],"predecessor-version":[{"id":132565,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/14594\/revisions\/132565"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=14594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=14594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=14594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}