Protect your Personal Information

Protect your Personal Information. It is at risk. IS Leon Panetta Chicken Little? IMHO NO! Read the information below. It is not just banks and financial institutions that are at risk for Cyber Attacks. An old saying comes to mind. “Why do bank robbers rob banks? Because that is where the money is!” The tools that we all use like e-mail sites (Google, Yahoo, Microsoft etc.), Social Media sites like Facebook, Twitter, LinkedIn, Yahoo, to name a few, are all being relentlessly attacked and we do not hear about it. It is not a matter of IF these services will be highly compromised, it is a matter of WHEN. Continue reading

b9f6e431b64665aeb28b5f9ab3ebd62f

How to protect your personal information. PIM Tips

How to protect your personal information. Personal Information Management (PIM) safety tips to follow.

Your personal information management is your responsibility. No-one else cares, or is going to protect you from “Bad People” doing bad things to you. “A study conducted earlier this year by the Ponemon Institute revealed Continue reading

06148830a89e75be135d82c152b6ed46

Personal Information Management – PIM & Identity Theft Quiz

Personal Information Management – PIM & Identity Theft Quiz

I just came across a great on-line tool that performs a Personal Information & Identity Theft Quiz, and gives you instant results. This is a great tool and I highly suggest you Continue reading

75976fb1409d94bce7781eb37f357156

Keep personal information (PIM) and work data seperate! Here’s why.

Keep personal information and work data separate! Here’s why.

Cisco Systems recent study data: “68% of employees and 71% of college students believe corporate devices should be used for Social Media and Personal use, too” See Note: 1

This is an understandable set of conclusions, and desires on the part of employees. But a very bad policy choice for both the companies and the individuals. Here’s why. Continue reading

ab56fc82884023b6c19863b80e43292d

How to: Manage your Phone – PIM training tip

How to: Manage your Phone – PIM training tip

Consider your phone as a very valuable tool in your Personal Information Management – PIM – strategy. It should also be considered to be a very dangerous and vulnerable access point for a lot of your critical data. If managed improperly, it is Continue reading

c6c14ceda2928fde6d8e21338f34f8ca

How to simplify your banking, Personal Information Management strategy

How to simplify your banking. Part of your Personal Information Management (PIM) strategy.

I generally suggest having as few bank accounts as is reasonable for you to manage your day to day life, and “Tame the data Deluge” that you experience from needing to many different accounts. Having fewer accounts will help with Continue reading

012a2069f966bcc0d8f2018bff3b7295

How to protect your Personal Information from mischief by bad people

How to protect your Personal Information Management PIM, systems from mischief by bad people.

1.) Run a security package. A Firewall for your network, and system security for each device.
2.) Use the latest versions of Continue reading

392b1a1791cdf6a673034060458c98d0

You are putting yourself and your children at risk! See this Video.

Safety and Security RISK ALERT:

You are putting yourself and your children at risk! See this Video.

Pictures you’ve e-mailed or uploaded from your smartphone could leak information that can threaten your assets, your safety or that of your children because Continue reading

d2b407db1cdb41295bd10fc2883e670f