Protect your Personal Information. It is at risk. IS Leon Panetta Chicken Little? IMHO NO! Read the information below. It is not just banks and financial institutions that are at risk for Cyber Attacks. An old saying comes to mind. “Why do bank robbers rob banks? Because that is where the money is!” The tools that we all use like e-mail sites (Google, Yahoo, Microsoft etc.), Social Media sites like Facebook, Twitter, LinkedIn, Yahoo, to name a few, are all being relentlessly attacked and we do not hear about it. It is not a matter of IF these services will be highly compromised, it is a matter of WHEN. Continue reading
Tag Archives: Security
How to protect your personal information. PIM Tips
How to protect your personal information. Personal Information Management (PIM) safety tips to follow.
Your personal information management is your responsibility. No-one else cares, or is going to protect you from “Bad People” doing bad things to you. “A study conducted earlier this year by the Ponemon Institute revealed Continue reading
Personal Information Management – PIM & Identity Theft Quiz
Personal Information Management – PIM & Identity Theft Quiz
I just came across a great on-line tool that performs a Personal Information & Identity Theft Quiz, and gives you instant results. This is a great tool and I highly suggest you Continue reading
Keep personal information (PIM) and work data seperate! Here’s why.
Keep personal information and work data separate! Here’s why.
Cisco Systems recent study data: “68% of employees and 71% of college students believe corporate devices should be used for Social Media and Personal use, too” See Note: 1
This is an understandable set of conclusions, and desires on the part of employees. But a very bad policy choice for both the companies and the individuals. Here’s why. Continue reading
How to: Manage your Phone – PIM training tip
How to: Manage your Phone – PIM training tip
Consider your phone as a very valuable tool in your Personal Information Management – PIM – strategy. It should also be considered to be a very dangerous and vulnerable access point for a lot of your critical data. If managed improperly, it is Continue reading
How to simplify your banking, Personal Information Management strategy
How to simplify your banking. Part of your Personal Information Management (PIM) strategy.
I generally suggest having as few bank accounts as is reasonable for you to manage your day to day life, and “Tame the data Deluge” that you experience from needing to many different accounts. Having fewer accounts will help with Continue reading
How to protect your Personal Information from mischief by bad people
How to protect your Personal Information Management PIM, systems from mischief by bad people.
1.) Run a security package. A Firewall for your network, and system security for each device.
2.) Use the latest versions of Continue reading
You are putting yourself and your children at risk! See this Video.
Safety and Security RISK ALERT:
You are putting yourself and your children at risk! See this Video.
Pictures you’ve e-mailed or uploaded from your smartphone could leak information that can threaten your assets, your safety or that of your children because Continue reading