Digital Estate Planning with Final Security is about protecting you and your loved ones from cybercrime, ensuring your important files are found and protecting your legacy. Get your free account and online will today; no credit card required.
The start of a new year is a great time to update your passwords. If you use a password manager, you can sort and see which passwords are the oldest and start with those. If you are not using a password manager, we strongly encourage you to download and start using one when you begin to update your passwords. You can read more about password best practices on our blog post.
Apps are permission hungry. Oftentimes, people will just blindly accept any permission an app is requesting during the first time it is opened. Even if someone does read and question whether they should accept and allow the permission, many are fearful the app will not work if they don't allow it. It is important to remember that these settings can easily be turned off and on. Knowing that, it is best to allow no permissions and use the application. You will be prompted for additional permissions if you are trying to use a feature of an app that is being blocked by a privacy setting. Some of the most common privacy settings abused by apps are: location data, the camera, the microphone and bluetooth.
Here is a list of good resources where you can read more about how to improve the privacy settings on your device:
Learn more about How to Protect Yourself and Stay Safe Online From: Phishing, Identity Theft, Social Engineering, Hacking, Malware and Scams
Regardless of your platform, it is a good idea to periodically take inventory of the apps you have installed on your devices. Here are a couple resources that can help you find which apps you have not been using:
You may have heard about two-factor authentication, but what is it and why is it important?
Two-factor authentication provides an added layer of security for your devices, software, apps, services, etc. The first part of the two-factor authentication process is most commonly where you provide your password. The second factor is usually a random unique code that is sent to you. You will then provide it back to the resource you are trying to access. These codes are only valid for a short period of time.
Two-factor authentication is important because it makes it harder for your devices, services, etc to be compromised. With data branches becoming almost a daily occurrence, it is vitally important to make sure your passwords are not the only barrier to accessing your accounts and services.
Implementation can be done a couple different ways, but depends on how the company or services chooses to implement their two-factor authentication. The two most common ways to use two-factor authentication are text messaging and through apps. With text messaging, you will get a special code sent to your mobile device. There are many different types of services and apps for two-factor authentication. Some of the more popular ones are: Google Authenticator, Microsoft Authenticator, Duo, Authy and LastPass.
Those annoying alerts, popups and other reminders to update your device, apps and software are annoying for a reason; they are vitally important. The threats to your devices and digital life are always changing. Ensuring you have the most current version of your operating system, apps and other software will help protect you from criminals. Here are some tips to help you keep your devices up-to-date:
According to AARP, it can take six months for financial institutions, credit-reporting bureaus and the Social Security Administration to receive, share or register death records. When you consider that timeframe and that cybercrime is now more profitable than the global illegal drug trade, your digital estate is the perfect target for criminals. We need to protect and organize our digital lives in preparation of our digital death.
Your privacy, safety and security is our top priority and at the core of everything we do. Your data is encrypted and protected at every level. From typing on your computer, through the Internet and into our application and servers.
Learn more about how we secure your data.