Selecting and Using a Password Manager

| 0

In my blog Protecting Your Information Online, I recommend using unique usernames and passwords for every account you create.  For most of us this creates a unique problem in trying to remember all those usernames and passwords. For most of our accounts, our email is our username, but that still leaves the passwords.

Password managers offer a multitude of benefits. They generate strong, unique passwords for each account, reducing the risk of identity theft and account takeovers. By storing all passwords in a secure vault, they eliminate the need to remember multiple login details, streamlining the authentication process. Additionally, many password managers can fill in personal information on web forms, saving time during account creation or online purchases. Password managers can be used across multiple devices, so you have your passwords on your phone, computer, or tablet. They also alert users to potential security breaches, promoting better password hygiene and overall digital safety.

Here are some factors to consider when selecting a password manager:

Multi-Factor Authentication (MFA) – Look for a password manager that supports MFA. MFA adds an extra layer of security by requiring more than just your username and password for authentication. It might involve a PIN sent via text message or an authentication app.

Password Storage Location – Decide whether you prefer a cloud-based or desktop-based solution. Cloud-based options offer convenience and accessibility, while local storage might be preferred.

Recovery of the Master Password – Although password managers eliminate the need to remember multiple passwords, you still need to recall the master password. Choose a manager that provides a way to recover your master password if forgotten, such as a special key or emergency contact.

Free or Paid – Evaluate the features versus the cost of the password manager. A free version might suffice if you only have a few accounts and do not require storing other personal information. Features such as data encryption and access across multiple devices and security such as multifactor authentication, may only be available in subscription-based password managers.

Additional Features – Explore secondary features like automated device sync, multi-factor authentication, autofill, and multi-platform support. Consider your specific needs when evaluating these features.

User Experience – Opt for a password manager with an intuitive interface. It should generate unique passwords for each account and make it easy to manage your credentials.

Among the most popular password managers, 1Password stands out for its user-friendly interface and robust security features, making it an excellent choice for new users. Bitwarden, praised for its free version, offers a solid range of features without cost, appealing to those seeking a balance between functionality and budget. Dashlane, although on the pricier side, provides a polished experience with premium features.

For those who prioritize financial features and multi-device compatibility, LastPass has been recognized as a strong contender, despite some concerns over its security in the past. Meanwhile, NordPass is noted for its overall performance, making it a top pick for many users.

You will also notice that password manager features are now being integrated into web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox. They are designed to store, generate, and autofill your passwords across various websites. Choosing between a browser-based password manager and a third-party service depends on your individual needs and security requirements. If you have a limited number of accounts, the convenience and cost-effectiveness of a browser’s built-in manager might suffice. However, if you have multiple accounts and accounts that you would consider sensitive such as healthcare and financial accounts, investing in a dedicated password manager could provide the enhanced security and features necessary for peace of mind.

When you do decide on a password manager and begin to setup the system, to store, manage and create new passwords for your existing and new accounts, be sure to follow these best practices:

Create Strong and Unique Passwords – A strong password is your first line of defense against unauthorized access. Use a mix of upper- and lower-case letters, numbers, and symbols to create complex passwords. Avoid using easily guessable information such as birthdays or pet names. The auto create feature of most password managers will take care of this for you.

Employ Multi-Factor Authentication – Whenever possible, enable multi-factor authentication (MFA) for an added layer of security. This typically involves a combination of something you know (a password), something you have (a mobile device), and something you are (biometric verification).

Regularly Update Your Passwords – While it’s important not to change passwords too frequently, as it can lead to weaker choices, regular updates are necessary especially if there’s a suspicion of a data breach. Try to change annually and you may want to consider quarterly or every 6 months for sensitive accounts.

Never Reuse Passwords – Each account should have a unique password. Reusing passwords across multiple sites increases the risk that if one account is compromised, others will follow. Most password managers will warn you if you are reusing a password or using it for multiple accounts.

Store Passwords Securely – Ensure that your password manager uses strong encryption to protect your passwords at rest and in transit. This prevents them from being easily deciphered if intercepted.

Monitor Password Strength – Use the password manager’s built-in tools to monitor the strength of your passwords and update any that are weak or compromised.

Selecting and using the password manager that meets your needs will create a more secure and streamlined experience as you use online applications and services.

For more information, please visit the following websites:

Protecting Your Information Online

  • https://mobroadband.org/protecting-your-information-online/

Seven Factors to Consider When Choosing the Right Password Manager – Forbes

How To Choose the Best Password Management Software In 2024

Password security 101: Why you need a password manager- Zoho

Picking the right password for your password manager-Bitwarden    

Browser Password Manager or a Standalone Password Service – Consumer Reports 

Links to password Managers:

1Password – https://1password.com/

Bitwarden – https://bitwarden.com/

Dashlane – https://www.dashlane.com/personal-password-manager

LastPass – https://www.lastpass.com/

NordPass – https://nordpass.com/personal-password-manager/

Join the University of Missouri Digital Ambassador Program!

| 0

Do your friends, family, or neighbors turn to you for help with the internet, computers, or online tools like social media and banking? Are you eager to expand your digital skills and use them to benefit your community? Do you enjoy volunteering to support others?

If you answered yes, we invite you to become a University of Missouri Digital Ambassador for your community.

What Does Being a Digital Ambassador Involve?

As a Digital Ambassador, you’ll receive comprehensive training covering internet connectivity, troubleshooting home networks, password security, and using online tools like Google Workspace and Microsoft Office. You’ll also learn effective teaching methods for adults. The training will prepare you to assist community members in integrating digital tools into their daily lives.

We provide you with resources such as handouts, presentations, and promotional materials available online and on a flash drive. Extension faculty at the county and state levels will support you with additional materials and guidance for your community engagements.

In exchange for this training and support, we ask you for 40 hours of volunteer service over the next year. You can contribute by staffing local library help desks, offering one-on-one assistance, educating civic groups, or promoting digital tools at community events.

How You Can Make an Impact?

Digital Ambassadors play a crucial role in empowering communities through digital literacy. For example, you can help individuals navigate online banking, healthcare portals, job searches, and more. By collaborating with local businesses and sponsors, you may even facilitate access to devices for those in need.

Moreover, you’ll identify and support experts within your community who can share their knowledge on specific online applications, enhancing local educational efforts.

Join Us Today!

Digital Ambassadors across Missouri are already making a difference. They’re promoting online safety, providing personalized consultations, and advocating for digital education.

Ready to transform lives through digital empowerment? Register now to become a Digital Ambassador! Visit mobroadband (https://mobroadband.org/digital-ambassador/) for more information and to sign up. Stay updated on training opportunities and program developments in your area.

Together, we can build a digitally inclusive Missouri!

Securing Your Web Browser: Essential Tips and Practices

| 0

The Internet provides access to a world of information, entertainment, connection to family and friends, and applications that can assist us in our daily lives and businesses. Web browsers are the front door to accessing all that information and it’s essential to secure that front door.  We discussed “Choosing the Right Web Browser for You” in our last blog and securing your web browser is integral in maintaining your online privacy and safety. With the increasing sophistication of cyber threats, it’s crucial to adopt best practices to help protect your digital footprint. Here are some of the best practices to secure your web browsers, along with resources for further reading:

Update Your Browser Regularly – Keeping your browser updated ensures that you have the latest security patches and features. Most browsers update automatically, but it’s good practice to check for updates regularly.

Use a Secure Browser – Consider using a browser known for its security features. Forbes Advisor and ZDNet  list the most secure browsers of 2024, highlighting the importance of privacy features such as blocking third-party trackers and using password management software.

Use Security Extensions – Consider installing security-focused extensions that can enhance your browsing safety. Features like ad blockers, anti-tracking tools, and HTTPS enforcement can significantly reduce your exposure to threats.

Manage Browser Extensions – Be cautious about the extensions you install. Only use extensions from trusted sources, and regularly review and remove any that are no longer needed.

Disable Autofill – While convenient, autofill for passwords and credit card information can be a liability. Disable autofill for personal data and credit card information to prevent it from being captured by malicious websites.

Enable “Do Not Track” – Activate the “Do Not Track” feature in your browser settings to request that websites do not collect or track your browsing data. Some websites may not process this request, but most comply. Turning this feature on is recommended. Disable tracking on all apps on your phone as well.

Use Private Browsing/Incognito Modes – While not foolproof, private browsing modes can prevent the storage of cookies, temporary files, and browsing history on your computer.

Disable Third-Party Cookies – Blocking third-party cookies can reduce tracking from advertisers and other third-party entities.

Use a VPN – A Virtual Private Network (VPN) can encrypt your internet connection and hide your IP address, adding an extra layer of security, especially on public Wi-Fi networks.

Regularly Clear Your Browsing Data – Periodically clear your cookies, cache, and browsing history to minimize the risk of data breaches and tracking.

Be Wary of Public Wi-Fi – Avoid performing sensitive activities, such as online banking, on public Wi-Fi networks. If necessary, use a VPN to secure your connection.

Secure Your Connections – Always look for ‘HTTPS’ in the URL, especially when entering sensitive information. This indicates that the connection to the website is encrypted.

Regular Security Audits – Periodically review your browser settings and extensions to ensure they are still relevant and secure. Remove any extensions you no longer use or trust.

Educate Yourself – Stay informed about the latest security threats and how to counter them. ZDNet  and Forbes Advisor provide comprehensive guides of the best secure browsers for privacy in 2024, which is a valuable resource for anyone looking to enhance their browser security.

For more detailed tips and techniques, How-To Geek offers a list of nine tips to safely browse the web, which includes using secure browsers and avoiding clicking on search ads. Additionally, OSIbeyond provides 10 tips for making web browsing more secure, emphasizing user behavior as a critical factor in maintaining security.

By following these best practices and utilizing the resources provided, you can significantly improve the security of your web browsing experience and protect your personal information from potential threats.

For further reading and to explore more in-depth information, you can refer to the articles mentioned above. Stay safe and browse wisely!

 Most Secure Browsers Of 2024 – Forbes Advisor

https://www.forbes.com/advisor/business/software/secure-browsers/

 The best secure browsers for privacy in 2024 | ZDNET

https://www.zdnet.com/article/best-browser-for-privacy/

 9 Tips to Safely Browse the Web – How-To Geek 

https://www.howtogeek.com/9-tips-to-safely-browse-the-web/

 Web Browsing | Safe and Secure Web Browser Tips and Techniques – OSIbeyond   

https://www.osibeyond.com/blog/tips-for-making-web-browsing-more-secure/

10 Browser Security Add-ons to For Privacy- Best Guard Tools – geekflare 

https://geekflare.com/browser-security-for-privacy/

The 10 Best Browser Security Extensions [Surf Secure in 2024] – cloudwards 

Choosing the Right Web Browser for You 

https://mobroadband.org/choosing-the-right-web-browser/

Choosing the Right Web Browser for You

| 0

You’ve gotten your connection to the Internet, and you are ready to start using your computer, tablet, or phone to access the various applications, information, and entertainment online. While there are apps to access several functions and products online, the vast majority are accessed through your device’s web browser.

Selecting the right web browser or browsers helps you create a seamless and secure online experience. The landscape of web browsers has evolved, offering a variety of options, each with its unique features and benefits. Whether you prioritize speed, privacy, customization, or compatibility, there is a browser tailored to meet your needs.

Each device you use to access your online applications, search for information, shop, and other activities has a default web browser installed. For Example, Windows based devices have Microsoft Edge; Apple IOS devices (iPhone, iPad) and macOS laptops have Safari; and Android based devices (phones, tablets, Chromebooks, and others) have Chrome as the default browser. All these devices (except Chromebooks) allow multiple browsers to be installed and set as the default web browser.

It is always a good idea to install multiple browsers on your device. Even if you choose to use the browser that came installed as the default browser, there are several reasons to have multiple web browsers available:

  • Compatibility – Some websites and applications may function better with certain browsers and may indicate those browsers on their home page. While sites generally operate with all browsers, certain features may work better with specific browsers.
  • Redundancy – Having multiple browsers ensures that you have a backup in case one fails. If a website doesn’t work on one browser, you can quickly switch to another without disrupting your workflow.
  • Testing – If a web site doesn’t work on one browser, you can switch to another browser to see if the site is down or if you need to clear the cache on the other browser to get site to work.
  • Personal Preference – Sometimes, it’s just a matter of personal preference. You might prefer the user interface of one browser for reading news and another for watching videos. Multiple browsers give you the flexibility to choose the experience you want.

When looking at web browsers there are several to choose from. Below are some of the most popular:

Google Chrome continues to be a popular choice, known for its speed and simplicity. It’s designed to be quick at loading pages and offers compatibility with most websites. However, it’s not without its drawbacks, such as the lack of a built-in VPN or a true reading mode, which can be a downside for users seeking these features.

Mozilla Firefox is an option for those who want a browser that focuses on security. It has been consistently praised for its privacy-focused features and is considered one of the best browsers for users who are security-conscious.

DuckDuckGo is a fairly new browser option to the market. This web browser focuses on privacy by default. The browser and their search engine do not track your searches or display personalized ads. DuckDuckGo by default blocks tracking scripts, ads, and unnecessary site cookies.

Opera may be a choice for those that use social media. Opera integrates social media platforms seamlessly, enhancing the overall browsing experience.

Apple Safari and Microsoft Edge are also strong contenders, each optimized for their respective operating systems, macOS and Windows, providing a smooth user experience with integrated features that complement their ecosystem.

When choosing a web browser, it’s essential to consider your specific needs and preferences. Do you require a browser that offers high performance and compatibility, or do you prioritize privacy and security? Perhaps customization and integration with social media are your deciding factors. Whatever your criteria may be, the current browser market has something for everyone.

As we continue to rely heavily on the Internet for both personal and professional tasks, the importance of choosing the right web browser cannot be overstated. It’s the gateway to the online world and digital economy. Making an informed choice can significantly enhance your digital life.

Remember, all these browsers are free, so we encourage testing them out to see which one aligns best with your online habits and requirements. Happy browsing!

For more detailed reviews and comparisons, take a look at the guides provided by PCMag, TechRadar, and HighSpeedInternet.com. These resources offer valuable insights into the strengths and weaknesses of each browser, helping you make a well-informed decision.

Browsers discussed in this blog:

Google Chromehttps://www.google.com/intl/en/chrome/ 

Mozilla Firefoxhttps://www.mozilla.org/en-US/firefox/new/

DuckDuckGohttps://duckduckgo.com/

Operahttps://www.opera.com/

Apple Safarihttps://www.apple.com/safari/

Microsoft Edgehttps://www.microsoft.com/en-us/edge

Sources:

PCMaghttps://www.pcmag.com/picks/chrome-edge-firefox-opera-or-safari-which-browser-is-best

TechRadarhttps://www.techradar.com/best/browser

HighSpeedInternet.comhttps://www.highspeedinternet.com/resources/best-web-browsers

Recognizing the Red Flags: Common Signs of a Security Breach

| 0

In the interconnected world of today, where data is a valuable asset, the security of personal data is paramount. Data breaches can have far-reaching consequences, from identity theft to financial loss. It’s important to be aware of the common signs that may indicate a security breach.

Indicators that you might be part of a data breach or had an account hacked:

Unusual Account Activity – One of the most immediate signs of a security breach is unusual activity in your accounts. This could manifest as unexpected logins from unfamiliar locations or at odd hours, which could suggest that someone else has gained unauthorized access to your account.

Appearance of Suspicious Files – The presence of unknown or suspicious files on your system can be a telltale sign of a security breach. These files may be part of a malware installation and could potentially harm your system or compromise your data.

Slow System Performance – A sudden slowdown in system performance, including prolonged response times or frequent crashes, can indicate that your system has been infected or hacked and is being used for malicious activity. You can check system performance by opening task manager on a Windows computer or Activity Monitor on an Apple MacOS computer.

Locked Accounts or Changed Credentials – Finding yourself locked out of your accounts or discovering that your credentials have been changed without your consent is a strong indication of a security breach. This often means that an attacker has taken control of your account and changed the access details to prevent you from regaining control.

Phishing Attempts – Receiving phishing emails or noticing phishing attempts, where you are asked to provide sensitive information through deceptive means is a common precursor to a security breach. Always be wary of unsolicited requests for your personal information.

While recognizing the signs of a security breach is important, taking preventive measures is equally crucial. Regularly updating software, using strong and unique passwords, enabling multi-factor authentication, and being cautious about the networks you connect to can all help in preventing security breaches.

If you notice any signs of a security breach, it is crucial to act promptly to protect your personal information. Here are the steps you should follow:

Change Your Passwords – Immediately change the passwords for any affected accounts and ensure that the new passwords are strong and unique. Consider using a password manager to keep track of your passwords.

Contact the Affected Service – Inform the service provider of the suspected breach. They can take necessary actions to secure and recover your accounts and monitor for suspicious activity.

Check Your Computer for Malware – Run a thorough scan of your computer using a reputable antivirus program to check for any malware that may have been installed without your knowledge.

Monitor Your Financial Accounts – Keep an eye on your bank and credit card statements for any unauthorized transactions. If you spot anything unusual, contact your financial institution immediately.

Place a Fraud Alert – Contact one of the three major credit bureaus (Equifax, Experian, or TransUnion) to place a fraud alert on your credit reports. This alert will notify potential creditors to take extra steps to verify your identity before extending credit.

Consider a Credit Freeze – A credit freeze will prevent creditors from accessing your credit report, which can stop a thief from opening new accounts in your name. This can be done by contacting the credit bureaus directly.

Report to Authorities – Report the incident to the appropriate authorities. This may include local law enforcement, the Federal Trade Commission, or other relevant government agencies.

Purchase Identity Theft Insurance – You can purchase identity theft insurance through the company that provides your home or renters insurance. You can also purchase insurance through companies such as LifeLock or one of your credit card companies. Insurance helps with recovering your identity if stolen as well as any of the expenses associated with recovery.

Stay Vigilant – Continue to monitor your accounts and credit reports regularly. Early detection of fraudulent activity can minimize the damage and aid in the recovery process.

Educate Yourself – Learn more about how to protect yourself from future breaches. This can include attending cybersecurity awareness training or reading up on best practices for online security.

By following these steps, you can take control of the situation and mitigate the potential damage caused by a security breach. Remember, staying informed and vigilant is your best defense against cyber threats. For more detailed guidance, you can refer to resources provided by cybersecurity experts and authoritative guides.

Fraud Alert Links:

https://www.experian.com/fraud/center.html

https://www.transunion.com/fraud-alerts

https://www.equifax.com/personal/credit-report-services/credit-fraud-alerts/

Credit Freeze Links:

https://www.experian.com/freeze/center.html

https://www.transunion.com/credit-freeze

https://www.equifax.com/personal/credit-report-services/credit-freeze/

Educational Resources:

A 2024 Guide to Digital Security & Cybersecurity – https://www.security.org/digital-safety/

Online Fraud and Scams – https://www.digitallearn.org/courses/online-fraud-and-scams-new

Accounts & Passwords – https://www.digitallearn.org/courses/accounts-passwords-new

Understanding Drive-By and Pop-Up Computer Infections

| 0

I’ve just spent some time scanning a computer in my house that had a pop-up virus trying to infect it. Drive-by and pop-up infections are quite common and can lead to your computer and data being compromised.

Drive-by downloads are a form of cyberattack where malware is unintentionally downloaded and installed on a user’s computer. This can occur when a user visits a compromised website or clicks on a deceptive link. The downloaded malware can then perform various malicious activities, such as hijacking the computer, spying on network activity, or destroying data.

Pop-up computer infections, on the other hand, often masquerade as legitimate warnings or advertisements. They can be very persistent, tricking users into clicking on them, which may lead to the installation of malware. These pop-ups can appear even when not browsing the internet, indicating the presence of adware or other malicious software on the system.

To protect against these threats, follow these recommendations:

Keep Your Software Updated – Regularly update your operating system, browser, and any installed software to patch security vulnerabilities.

Install an Ad-Blocker – Ad-blockers can prevent malicious ads from appearing and reduce the risk of accidental clicks that could lead to malware infections. PC Mag has their list of top 5 add blockers.

Use Antivirus Software – A reliable antivirus program can detect and remove malicious software before it harms your system. PC Mag and CNet have their reviews of Antivirus programs for the year.

Enable “Click-to-Play Plugins” in Your Browser – This prevents multimedia content from running automatically and can stop drive-by downloads from executing.

Download Software from Trusted Sources – Be cautious of downloading free software. Ensure you obtain it from legitimate sources and providers to avoid bundled malware.

Adjust Browser Security Settings – Maintain your browser’s default security settings or enhance them to block unauthorized downloads and pop-ups.

Be Wary of Social Engineering – Educate yourself on the tactics used by cybercriminals to lure users into downloading malware, such as phishing emails and fake websites.

Regular Backups – Keep regular backups of your important data. In case of an infection, you can restore your system without losing critical information.

For those who suspect their system may be infected, here’s a step-by-step guide to help you navigate through the process:

Disconnect from the Internet – As soon as you suspect an infection, disconnect your computer from the internet. This prevents the malware from transmitting any sensitive data and stops it from downloading additional malicious components. For pop-up infections, you can power down your machine by holding the power button in for 10 seconds. Many of these pop-up infections run in the computer memory to start and by shutting down the computer without clicking on any recommended links or trying to close the applications on your computer can reduce the chance of further infection.

Enter Safe Mode (Windows MacOS) – Reboot your computer in Safe Mode. This will start your computer with only the essential programs running, which can help prevent the malware from loading.

Check Installed Programs – Review your installed programs and remove anything that looks suspicious or that you don’t remember installing.

Run Antivirus Scans – Use a reputable antivirus program to run a thorough scan of your system. Malwarebytes Anti-Malware is a widely recommended tool for removing malware and unwanted programs. Malwarebytes has both a free and subscription-based service.

Use Secondary Scanners – Sometimes, a second opinion is necessary. Tools like HitmanPro can provide a secondary scan that might catch malware that slipped past your primary antivirus software. Hitman Pro.Alert is their fee-based version.

Reset Your Browsers – Malware often makes changes to your browser settings. Resetting your browsers to their default settings can undo these changes. Once at the default setting, you can change back to any customizations you made to enhance security above the default settings.

Update Your Software – Ensure that your operating system, browsers, and all plugins are up to date with the latest security patches. Outdated software can be vulnerable to exploitation by malware.

Change Passwords – After cleaning your system, change your passwords. This is a crucial step, as malware can capture keystrokes and compromise your accounts.

Backup Your Data – Regularly back up your data to an external drive or cloud storage. If you have a backup from before the infection, you may be able to restore your files if they’ve been damaged or encrypted by malware.

Stay Informed – Educate yourself on the latest threats and how to avoid them. Drive-by downloads can exploit vulnerabilities in outdated software, so keeping informed can help you stay one step ahead of potential infections.

Consult Local Computer Repair Professionals – If you’re not confident in your ability to clean your system or if the infection persists, seek the help of your local computer professional. It’s better to get expert assistance than to risk further damage to your system.

While drive-by and pop-up computer infections pose a significant risk, awareness and proactive measures can greatly reduce the chances of falling victim to these cyber threats. It’s a continuous battle against cybercriminals, but with the right tools and practices, you can safeguard your information and continue to enjoy the benefits of your digital life.

You can find additional information and resources at the following sites:

Malware Protection for Home 2023 | Malwarebytes

Download HitmanPro: Scan and Remove Malware

Best Antivirus Software for 2024 – CNET

The Best Ad Blockers for 2024 | PCMag

What are drive-by downloads + drive-by attack prevention tips | Norton

How to remove a fake virus alert – Norton

How to Enable Click-to-Play Plugins in Every Web Browser (howtogeek.com)

Start your PC in safe mode in Windows – Microsoft Support

Start up your Mac in safe mode – Apple Support