Online Games – The Benefits and How to Stay Safe

| 0

One of the most popular uses of the internet is online gaming. Smart phones, gaming consoles, computers, tablets, and virtual reality devices all allow us to participate in online games alone or with others.

While gaming may seem like a waste of time to some, there are potential benefits to online gaming for everyone: 

  • Games can help develop cognitive skills through strategic thinking and problem solving.
  • First person games (where you have the point of view of your character in the game) can help improve hand-eye coordination and fine motor skills through precise movements. Others help enhance cognitive abilities like memory, attention, and spatial awareness.
  • Multi-player games provide an opportunity to connect with friends and family as well as meet new people from around the world. Online communities develop and thrive through games and help give people a sense of community, especially for those that find it difficult to socialize in person. Team-based games also help to promote teamwork, leadership, collaboration, and communication skills.
  • Gaming can provide stress relief, an escape from everyday pressures, and provide relaxation and help improve mood.
  • Gaming helps teach overcoming challenges, dealing with setbacks, and multitasking skills as gamers learn to adapt new strategies and keep trying until they succeed.
  • Some games incorporate historical settings, scientific concepts, and language to make learning interactive and fun.

While gaming can provide all these potential benefits, there are potential threats to be mindful of while enjoying online games. The threats gamers may encounter include:

  • Hacking of game accounts to steal valuable in-game items, currency, and personal information.
  • Phishing scams via email, websites, or in-game scams that trick gamers into revealing personal information, login credentials, and payment details.
  • Malware, trojans, and viruses that are often disguised as game modifications\customizations or cheat codes leading to infected systems and stolen data.
  • Cyberbullying and toxic behavior during and after game play that affect players’ mental health.
  • Deepfakes and voice cloning can lead to identity theft, misinformation, and harassment.

How can we protect ourselves when gaming online?

  • Protect your personal information. Use two factor authentication to protect your accounts along with strong password protection. Make sure that you also set up ways to recover your accounts should you forget your password, or your account is hacked. When setting up accounts, only provide the minimum personal information needed to set up your account. If games have a subscription, use a third-party payment system such as Apple Pay, Google Pay, PayPal, etc. This keeps credit card information out of your account information.
  • Parents should set up parental controls for children, making sure they have access to age-appropriate games. Set time limits on playing as well as when games can be played where possible to make sure kids spend time with friends and family outside of games. Teach your kids about online safety and that they should talk to you or another trusted adult if they feel threatened or bullied when gaming online. Help educate your kids about potential scams online and in games, and make sure they talk to you before purchasing or downloading games or in app purchases.
  • Make sure PCs, tablets, and gaming consoles are updated to the latest operating systems and gaming software. PCs and tablets should have an up-to-date antivirus program on them as well as gaming consoles where possible.
  • As gamers and parents, we should also make sure that we stay safe mentally as we game. We need to protect ourselves and our kids from cyberbullying by playing games with friends and family and only participate in gaming communities that promote positive and healthy gaming habits. Players that bully or create a toxic environment for you and other players need to be reported to the people or companies hosting the games and blocked where possible.

Gaming addiction is real, and both adults and youth need to set up ways to help reduce the possibility of gaming addiction, identify when it happens, and seek help if they become addicted to online gaming.

Avoid gaming addiction by doing these practices:

  • Set specific time slots to play games during the day. Use alarms to remind you when to take breaks from the game and engage in other activities, rest your eyes, stretch, or just take a walk.
  • Make sure to prioritize responsibilities such as work, school, chores, sports, and time with family and friends before gaming. Use gaming as a reward when specific tasks are completed.
  • To help reduce eye strain, try to follow the 20-20-20 rule. Every 20 minutes of screen time or game play, look at something 20 feet away for at least 20 seconds.
  • Make sure to engage in other activities. Balance gaming with other hobbies such as reading, sports, or creative projects. Make sure to spend time with friends and family face to face.
  • Monitor gaming habits. Keep a log of how much time is spent gaming and how that time impacts daily life. Adjust the time spent gaming to make sure you take care of yourself, and your other responsibilities. Also monitor in-game purchases and set a budget for gaming expenses.
  • Create game-free zones in the house such as the dining room or bedroom as well as non-gaming hours. Try to keep the devices you use to game out of site or at least off during non-gaming hours.

If you or someone you know is addicted to gaming, seek support from friends, family or find a professional that you or your loved one can talk to. There are support groups available to help people through gaming addiction. Check sites such as Gamming Addicts Anonymous  to see if there is a local group near you.  They also provide online meetings where local groups are unavailable.

Online gaming provides wonderful opportunities not just for fun but for learning and connecting with others. By balancing the joys of gaming with safety measures, you can ensure that online gaming experiences are both fun and secure.

For more information:

Securing Online Gaming:

Cyberbullying:

Gaming Addiction

Cyberbullying and How to Deal with It

| 0

In 2022 19.2% of students surveyed nationwide, in grades 6-12 (ages 12-18), who reported being bullied during school, about 21.6% reported being bullied online or by text, including nearly twice as many girls (27.7%) as boys (14.1%) (National Victim Survey – School Crime Supplement).

One of the many reasons people may not want to connect online or use online applications is cyberbullying. Cyberbullying can have long-term consequences for the mental health of both youth and adults. It is important to understand how to prevent and deal with cyberbullying, should it occur to you or someone you know.

What is cyberbullying?

  • Cyberbullying takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur via texting and messaging apps, or online in social media, forums, or gaming where people can view, participate in, or share content.
  • Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It also includes sharing personal or private information about someone else to cause embarrassment or humiliation.
  • Cyberbullying can cross the line into unlawful or criminal behavior.  Each state has different laws regarding cyberbullying.  You can learn more about the laws regarding cyberbullying in Missouri through the Cyberbullying Research Center  

How does cyberbullying occur?

It’s important to understand how cyberbullying occurs so it can be easily recognized, and we can take action to help children deal with cyberbullying. Some of the common tactics are:

  • Posting comments or rumors about someone online that are mean, hurtful, or embarrassing.
  • Threatening to hurt someone or telling them to kill themselves.
  • Posting a mean or hurtful picture or video.
  • Pretending to be someone else online in order to solicit or post personal or false information about someone else.
  • Posting mean or hateful names, comments, or content about any race, religion, ethnicity, or other personal characteristics online.
  • Creating a mean or hurtful webpage about someone.
  • Doxing, an abbreviated form of “documents”, is a type of online harassment used to exact revenge and to threaten and destroy the privacy of individuals by making their personal information public, including addresses, social security number, credit card and phone numbers, links to social media accounts, and other private data.

How can you tell if someone is possibly involved in cyberbullying?

The first step in preventing cyberbullying is to be aware of what kids are doing online. You need to know if your child is a victim of cyberbullying, witnessing cyberbullying, or is bullying other children online. Warning signs you should look for as a child uses their device include: (From stopbulling.gov)

  • Noticeable increases or decreases in device use, including texting.
  • Exhibiting emotional responses (laughter, anger, upset) to what is happening on their device.
  • Hiding their screen or device when others are near and avoids discussion about what they are doing on their device.
  • Social media accounts are shut down or new ones appear.
  • Avoiding social situations, even those that were enjoyed in the past.
  • Becoming withdrawn, depressed, or loses interest in people, hobbies, and activities.
  • Complaining about illness or physical symptoms to get out of going to school.
  • Difficulty sleeping. Almost 63% of victims report a lack of sleep as a psychological impact of being cyberbullied.
  • Talking about self-harm.

If you suspect your child may be involved in cyberbullying, take steps to investigate their digital behavior. Take the same approach as you would to any form of bullying. Make sure to provide support to the child being bullied, address the behavior of the bully or bullies involved, and make sure everyone understands that cyberbullying is taken seriously and can have serious consequences.

How can parents and youth prevent cyberbullying?

Responding to cyberbullying does require different approaches to address the issue. Some the things you can do to address the issue are:

  • Notice- Recognize if there has been a change in mood or behavior. Try to determine if these changes happen around a child’s use of their digital devices.
  • Talk – Ask questions to learn what is happening, how it started, and who is involved. Use active listening skills to get below the surface of conversations with youth.
  • Document – Keep a record of what is happening and where. Take screenshots of harmful posts or content. Most laws and policies note that bullying is repeated behavior, so records help to document it.
  • Report – Most social media platforms and schools have clear policies and reporting processes. If a classmate is cyberbullying, report it to the school. You can also contact app or social media platforms to report offensive content and have it removed. If a child has received physical threats, or if a potential crime or illegal behavior is occurring, report it to the police.
  • Support – Peers, mentors, and trusted adults can sometimes intervene publicly to positively influence a situation where negative or hurtful content posts about a child. Public intervention can include:
    • Posting positive comments about the person targeted with bullying to try to shift the conversation in a positive direction.
    • Reaching out to the child who is bullying and the target of the bullying to express your concern.
    • Rallying around a victim of cyberbullying is a highly effective defense against bullies. Bullying works by trying to isolate a victim or have them feel isolated. When friends and other youth rally around a victim, it can thwart the bullies.
    • Determining if more professional support is needed for those involved, such as speaking with a guidance counselor or mental health professional.

  • Teach internet safety. Making sure they understand about privacy, predators, phishing schemes, catfishing, and security.
  • Learn about their online friends and what they are doing online.
  • Let them know that you want to be aware of their online life and you will want to check on their online activities, friends, and files.
  • Help youth manage cyberbullying. Discuss what cyberbullying is and make sure they take any threats seriously. Teach them how to react to potential cyberbullying by ignoring or responding assertively and calmly to the person or persons doing the bullying. Identifying trusted adults that the child can speak to about potential cyberbullying.
  • Help youth build and maintain self-confidence. Having healthy self-esteem allows youth to be able to ignore or address cyberbullying.
  • Make sure youth understand you don’t approve of cyberbullying in any form and hold them accountable if they participate or witness cyberbullying.

What can youth do to help prevent cyberbullying?

  • Never respond to harassing or rude comments.
  • Save or print the evidence.
  • Talk to parents or a guardian if harassed; get help reporting this to your internet service provider, school, or local law enforcement.
  • Respect others online.
  • Only share passwords with a parent or guardian.
  • Change passwords often.
  • Password protect your cell phone.
  • Use privacy settings to block unwanted messages.
  • Think before posting or sending photos – they could be used to hurt you or someone else.
  • Contact the site administrator if someone creates a social networking page in your child’s name.

For more information on Cyberbullying:

What is Cyberbullyinghttps://www.stopbullying.gov/cyberbullying/what-is-it

School Crime Supplement– National Center for Education Statistics – https://nces.ed.gov/pubs2024/2024109rev.pdf

What is cyberbullying and how can it be prevented? – Mayo Clinic – https://mcpress.mayoclinic.org/parenting/what-is-cyberbullying-and-how-it-can-be-prevented/

Bullying – Mo Dept of Elementary and Secondary Education – https://dese.mo.gov/governmental-affairs/public-school-laws-missouri/bullying

Courage2Report – MO State Highway Patrol- https://www.mshp.dps.missouri.gov/MSHPWeb/Courage2ReportMO/index.html

Cyber-bullying: What Parents Can Do About it – The Center for Parenting Education –

Cyberbullying: Learn the Signs – American Society for the Positive Care of Children – https://americanspcc.org/cyberbullying-learn-the-signs/

How to help Kids Deal with Cyberbullying – Child Mind Institute – https://childmind.org/article/help-kids-deal-cyberbullying/

Mizzou Ed Bully Prevention Labhttps://www.mizzoubullypreventionlab.com/

Dispelling Common VPN Myths

| 0

Virtual Private Networks (VPNs) have become essential tools for enhancing online privacy and security. However, with their increasing popularity, several misconceptions have arisen about what VPNs can and cannot do. Understanding these misconceptions is crucial for users to make informed decisions about using VPNs effectively.

Here are some of the most common myths debunked:

Myth 1: VPNs Provide Complete Anonymity – One of the biggest misconceptions is that VPNs offer complete anonymity online. While VPNs do an excellent job of hiding your IP address and encrypting your data, they are not foolproof. Other methods of tracking, such as browser fingerprinting or cookies, can still identify users. VPNs are one part of a larger privacy toolkit and should be used in conjunction with other privacy measures for better anonymity.

Myth 2: All VPNs Are the Same – Not all VPNs are created equal. There are significant differences in the levels of security, privacy policies, and features offered by various providers. Some may keep logs, offer different encryption standards, or have more robust server networks than others. It’s important to research and compare VPN providers before choosing one.

Myth 3: VPNs Can Make Your Internet Faster – Another common myth is that VPNs can increase internet speed. In reality, the encryption process and rerouting of traffic through VPN servers can sometimes slow down your connection. The impact on speed can vary based on the quality of the VPN service and the distance to the server.

Myth 4: VPNs Are Only for Tech-Savvy Users – VPNs are often thought to be complex and only suitable for advanced users. However, many VPN providers have made significant efforts to create user-friendly interfaces that make it easy for anyone to use their services, regardless of technical expertise.

Myth 5: Free VPNs Are Just as Good as Paid Ones – While free VPNs can be appealing, they often come with limitations such as data caps, slower speeds, and fewer servers. Moreover, some free VPNs may compromise your privacy by tracking your activities or displaying ads. Paid VPNs offer better security and features.

Myth 6: VPNs Are Only for Questionable Activities – There’s a misconception that VPNs are only used for hiding illegal activities. This is far from the truth. Many people use VPNs for legitimate reasons, such as protecting their privacy, securing their data on public Wi-Fi, for work, or accessing content restricted in their region.

Myth 7: VPNs Protect Against All Online Threats – VPNs are excellent for securing your data in transit, but they do not protect against all types of online threats. For instance, they cannot prevent phishing attacks or malware. It’s essential to use VPNs alongside other security measures like antivirus software and safe browsing practices.

Myth 8: VPNs Are Illegal – The legality of VPNs varies by country. In most places, using a VPN is perfectly legal, especially for protecting personal privacy and security. However, some countries have restrictions on VPN use, so it’s important to be aware of the laws in your location.

By understanding these common misconceptions, users can set realistic expectations and use VPNs more effectively as part of their online security strategy. Remember, a VPN is a valuable tool, but not a silver bullet for online privacy and security. It’s one component of a comprehensive approach to safeguarding your digital life.

12 common VPN myths bustedhttps://nordvpn.com/blog/myths-about-vpn/

Common VPN Myths Debunkedhttps://www.bitdefender.com/blog/hotforsecurity/common-vpn-myths-debunked/

Choosing a VPN Service that Works for You

| 0

As you become more engaged online through social media, shopping, education, finance, healthcare, and other applications, and you are following the best practices we discussed in a prior blog to protect your information online, you may be considering using a Virtual Private Network (VPN).  A VPN helps encrypt your data, whether on your home network or using a public Wi-Fi connection, to keep your data safe. VPN products can offer a variety of services beyond encryption that may be helpful to you.

Some of the benefits of using a VPN when accessing online services and information are:

  • Enhanced Privacy and Security – VPNs encrypt your internet connection, making it difficult for hackers, ISPs, and even governments to track your online activities.
  • Remote Access – VPNs allow employees to access their company’s network remotely, enabling them to work from anywhere with an internet connection.
  • Safe Online Transactions – VPNs provide a secure environment for conducting sensitive transactions, such as online banking or shopping.
  • Anonymity – While not completely anonymous, VPNs can significantly reduce your digital footprint by hiding your IP address.

Although there are many benefits to using a VPN, there are some challenges and potential issues:

  • Potential Speed Reduction – The encryption process and server distance can sometimes slow down internet speeds, particularly with low-tier VPN services.
  • Legal and Regulatory Issues – VPNs are restricted or banned in some countries and using them could lead to legal consequences.
  • Compatibility and Complexity – Setting up a VPN can be complex for non-technical users, and compatibility issues may arise with certain devices or networks.
  • Reliability Concerns – Some VPNs may suffer from connection drops, which can interrupt services and cause frustration.
  • Trustworthiness of VPN Providers – Not all VPN services are created equal. Some may log and sell user data, negating the privacy benefits of using a VPN.

Now that you know the potential benefits and issues to using a VPN, here are things to consider when shopping for a VPN service:

  • Understand Your Needs – Before diving into the features of various VPN providers, it’s essential to understand what you need from a VPN. Are you looking to enhance your privacy, hide your location, or secure your data on public Wi-Fi? Your priorities will influence which features are most important to you.
  • Check the Provider’s Logging Policy – One of the most crucial aspects of a VPN is its logging policy. A reliable VPN provider should have a strict no-logs policy, ensuring that your online activities are not recorded or stored.
  • Assess the Level of Encryption – Encryption is what keeps your data secure as it travels over the internet. Look for providers that offer robust encryption standards, such as AES-256, to protect your information from prying eyes.
  • Evaluate Server Networks – The size and distribution of a VPN provider’s server network can affect your internet speed and the ability to bypass geo-restrictions. A larger network means more options and better chances of finding a fast, nearby server.
  • Consider Speed and Performance – VPN services can vary in speed and performance. While some reduction in speed is expected due to encryption, a good VPN provider should offer a service that minimizes this impact. Check independent reviews for speed test results.
  • Investigate Optional Features – Some VPNs come with additional features such as ad-blocking, malware protection, or multi-hop connections. Decide which, if any, of these features are important to you and choose a provider that offers them.
  • Research the Provider’s Reputation – The reputation of a VPN provider is telling of their reliability. Look for providers with a history of protecting user privacy and read reviews from trusted sources.
  • Examine the Pricing and Value – Compare the pricing of different VPN services. While free VPNs may be tempting, they often come with limitations and security risks. A paid service offers better security and features.
  • Check for a User-Friendly Interface – A user-friendly interface can make setting up and using a VPN much easier, especially if you’re new to the process. Look for services that offer intuitive apps for various devices.
  • Review the Customer Support – Reliable customer support is vital, especially if you encounter issues. Check if the provider offers 24/7 support through multiple channels, such as live chat or email. For more detailed reviews and comparisons, consider exploring resources such as PCMag, Wired, and Cybernews.
  • Read the Fine Print – Before committing to a VPN service, read the terms of service and privacy policy carefully. This will help you understand the provider’s commitments to user privacy and any potential red flags.
  • Test the Service – Many reputable VPN providers offer a trial period or money-back guarantee. Use this opportunity to evaluate the service’s performance and ensure it meets your expectations before making a long-term commitment.

A VPN service is a powerful tool for enhancing online security and privacy, but there are many considerations when selecting a VPN service. Users must carefully weigh the benefits against the potential challenges and choose a reputable VPN provider to ensure the best experience. As with any technology, informed use is the key to maximizing the advantages while minimizing the risks.

If you are interested in more information regarding VPNs, please read these online resources:

Why You Need a VPN, and How to Choose the Right Onehttps://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one

What is a VPN and what does it do?https://us.norton.com/blog/privacy/what-is-a-vpn

What Is a VPN, and Why Would I Need One?https://www.howtogeek.com/133680/htg-explains-what-is-a-vpn/

The 10 Best VPN Services for 2024  – https://www.pcmag.com/picks/the-best-vpn-services

5 Best VPN Services (2024)https://www.wired.com/story/best-vpn/

Best VPN Services of 2024 – tested by cybersecurity expertshttps://cybernews.com/best-vpn/

Protect your information online  – https://mobroadband.org/protecting-your-information-online/

Selecting and Using a Password Manager

| 0

In my blog Protecting Your Information Online, I recommend using unique usernames and passwords for every account you create.  For most of us this creates a unique problem in trying to remember all those usernames and passwords. For most of our accounts, our email is our username, but that still leaves the passwords.

Password managers offer a multitude of benefits. They generate strong, unique passwords for each account, reducing the risk of identity theft and account takeovers. By storing all passwords in a secure vault, they eliminate the need to remember multiple login details, streamlining the authentication process. Additionally, many password managers can fill in personal information on web forms, saving time during account creation or online purchases. Password managers can be used across multiple devices, so you have your passwords on your phone, computer, or tablet. They also alert users to potential security breaches, promoting better password hygiene and overall digital safety.

Here are some factors to consider when selecting a password manager:

Multi-Factor Authentication (MFA) – Look for a password manager that supports MFA. MFA adds an extra layer of security by requiring more than just your username and password for authentication. It might involve a PIN sent via text message or an authentication app.

Password Storage Location – Decide whether you prefer a cloud-based or desktop-based solution. Cloud-based options offer convenience and accessibility, while local storage might be preferred.

Recovery of the Master Password – Although password managers eliminate the need to remember multiple passwords, you still need to recall the master password. Choose a manager that provides a way to recover your master password if forgotten, such as a special key or emergency contact.

Free or Paid – Evaluate the features versus the cost of the password manager. A free version might suffice if you only have a few accounts and do not require storing other personal information. Features such as data encryption and access across multiple devices and security such as multifactor authentication, may only be available in subscription-based password managers.

Additional Features – Explore secondary features like automated device sync, multi-factor authentication, autofill, and multi-platform support. Consider your specific needs when evaluating these features.

User Experience – Opt for a password manager with an intuitive interface. It should generate unique passwords for each account and make it easy to manage your credentials.

Among the most popular password managers, 1Password stands out for its user-friendly interface and robust security features, making it an excellent choice for new users. Bitwarden, praised for its free version, offers a solid range of features without cost, appealing to those seeking a balance between functionality and budget. Dashlane, although on the pricier side, provides a polished experience with premium features.

For those who prioritize financial features and multi-device compatibility, LastPass has been recognized as a strong contender, despite some concerns over its security in the past. Meanwhile, NordPass is noted for its overall performance, making it a top pick for many users.

You will also notice that password manager features are now being integrated into web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox. They are designed to store, generate, and autofill your passwords across various websites. Choosing between a browser-based password manager and a third-party service depends on your individual needs and security requirements. If you have a limited number of accounts, the convenience and cost-effectiveness of a browser’s built-in manager might suffice. However, if you have multiple accounts and accounts that you would consider sensitive such as healthcare and financial accounts, investing in a dedicated password manager could provide the enhanced security and features necessary for peace of mind.

When you do decide on a password manager and begin to setup the system, to store, manage and create new passwords for your existing and new accounts, be sure to follow these best practices:

Create Strong and Unique Passwords – A strong password is your first line of defense against unauthorized access. Use a mix of upper- and lower-case letters, numbers, and symbols to create complex passwords. Avoid using easily guessable information such as birthdays or pet names. The auto create feature of most password managers will take care of this for you.

Employ Multi-Factor Authentication – Whenever possible, enable multi-factor authentication (MFA) for an added layer of security. This typically involves a combination of something you know (a password), something you have (a mobile device), and something you are (biometric verification).

Regularly Update Your Passwords – While it’s important not to change passwords too frequently, as it can lead to weaker choices, regular updates are necessary especially if there’s a suspicion of a data breach. Try to change annually and you may want to consider quarterly or every 6 months for sensitive accounts.

Never Reuse Passwords – Each account should have a unique password. Reusing passwords across multiple sites increases the risk that if one account is compromised, others will follow. Most password managers will warn you if you are reusing a password or using it for multiple accounts.

Store Passwords Securely – Ensure that your password manager uses strong encryption to protect your passwords at rest and in transit. This prevents them from being easily deciphered if intercepted.

Monitor Password Strength – Use the password manager’s built-in tools to monitor the strength of your passwords and update any that are weak or compromised.

Selecting and using the password manager that meets your needs will create a more secure and streamlined experience as you use online applications and services.

For more information, please visit the following websites:

Protecting Your Information Online

  • https://mobroadband.org/protecting-your-information-online/

Seven Factors to Consider When Choosing the Right Password Manager – Forbes

How To Choose the Best Password Management Software In 2024

Password security 101: Why you need a password manager- Zoho

Picking the right password for your password manager-Bitwarden    

Browser Password Manager or a Standalone Password Service – Consumer Reports 

Links to password Managers:

1Password – https://1password.com/

Bitwarden – https://bitwarden.com/

Dashlane – https://www.dashlane.com/personal-password-manager

LastPass – https://www.lastpass.com/

NordPass – https://nordpass.com/personal-password-manager/

Join the University of Missouri Digital Ambassador Program!

| 0

Do your friends, family, or neighbors turn to you for help with the internet, computers, or online tools like social media and banking? Are you eager to expand your digital skills and use them to benefit your community? Do you enjoy volunteering to support others?

If you answered yes, we invite you to become a University of Missouri Digital Ambassador for your community.

What Does Being a Digital Ambassador Involve?

As a Digital Ambassador, you’ll receive comprehensive training covering internet connectivity, troubleshooting home networks, password security, and using online tools like Google Workspace and Microsoft Office. You’ll also learn effective teaching methods for adults. The training will prepare you to assist community members in integrating digital tools into their daily lives.

We provide you with resources such as handouts, presentations, and promotional materials available online and on a flash drive. Extension faculty at the county and state levels will support you with additional materials and guidance for your community engagements.

In exchange for this training and support, we ask you for 40 hours of volunteer service over the next year. You can contribute by staffing local library help desks, offering one-on-one assistance, educating civic groups, or promoting digital tools at community events.

How You Can Make an Impact?

Digital Ambassadors play a crucial role in empowering communities through digital literacy. For example, you can help individuals navigate online banking, healthcare portals, job searches, and more. By collaborating with local businesses and sponsors, you may even facilitate access to devices for those in need.

Moreover, you’ll identify and support experts within your community who can share their knowledge on specific online applications, enhancing local educational efforts.

Join Us Today!

Digital Ambassadors across Missouri are already making a difference. They’re promoting online safety, providing personalized consultations, and advocating for digital education.

Ready to transform lives through digital empowerment? Register now to become a Digital Ambassador! Visit mobroadband (https://mobroadband.org/digital-ambassador/) for more information and to sign up. Stay updated on training opportunities and program developments in your area.

Together, we can build a digitally inclusive Missouri!

Securing Your Web Browser: Essential Tips and Practices

| 0

The Internet provides access to a world of information, entertainment, connection to family and friends, and applications that can assist us in our daily lives and businesses. Web browsers are the front door to accessing all that information and it’s essential to secure that front door.  We discussed “Choosing the Right Web Browser for You” in our last blog and securing your web browser is integral in maintaining your online privacy and safety. With the increasing sophistication of cyber threats, it’s crucial to adopt best practices to help protect your digital footprint. Here are some of the best practices to secure your web browsers, along with resources for further reading:

Update Your Browser Regularly – Keeping your browser updated ensures that you have the latest security patches and features. Most browsers update automatically, but it’s good practice to check for updates regularly.

Use a Secure Browser – Consider using a browser known for its security features. Forbes Advisor and ZDNet  list the most secure browsers of 2024, highlighting the importance of privacy features such as blocking third-party trackers and using password management software.

Use Security Extensions – Consider installing security-focused extensions that can enhance your browsing safety. Features like ad blockers, anti-tracking tools, and HTTPS enforcement can significantly reduce your exposure to threats.

Manage Browser Extensions – Be cautious about the extensions you install. Only use extensions from trusted sources, and regularly review and remove any that are no longer needed.

Disable Autofill – While convenient, autofill for passwords and credit card information can be a liability. Disable autofill for personal data and credit card information to prevent it from being captured by malicious websites.

Enable “Do Not Track” – Activate the “Do Not Track” feature in your browser settings to request that websites do not collect or track your browsing data. Some websites may not process this request, but most comply. Turning this feature on is recommended. Disable tracking on all apps on your phone as well.

Use Private Browsing/Incognito Modes – While not foolproof, private browsing modes can prevent the storage of cookies, temporary files, and browsing history on your computer.

Disable Third-Party Cookies – Blocking third-party cookies can reduce tracking from advertisers and other third-party entities.

Use a VPN – A Virtual Private Network (VPN) can encrypt your internet connection and hide your IP address, adding an extra layer of security, especially on public Wi-Fi networks.

Regularly Clear Your Browsing Data – Periodically clear your cookies, cache, and browsing history to minimize the risk of data breaches and tracking.

Be Wary of Public Wi-Fi – Avoid performing sensitive activities, such as online banking, on public Wi-Fi networks. If necessary, use a VPN to secure your connection.

Secure Your Connections – Always look for ‘HTTPS’ in the URL, especially when entering sensitive information. This indicates that the connection to the website is encrypted.

Regular Security Audits – Periodically review your browser settings and extensions to ensure they are still relevant and secure. Remove any extensions you no longer use or trust.

Educate Yourself – Stay informed about the latest security threats and how to counter them. ZDNet  and Forbes Advisor provide comprehensive guides of the best secure browsers for privacy in 2024, which is a valuable resource for anyone looking to enhance their browser security.

For more detailed tips and techniques, How-To Geek offers a list of nine tips to safely browse the web, which includes using secure browsers and avoiding clicking on search ads. Additionally, OSIbeyond provides 10 tips for making web browsing more secure, emphasizing user behavior as a critical factor in maintaining security.

By following these best practices and utilizing the resources provided, you can significantly improve the security of your web browsing experience and protect your personal information from potential threats.

For further reading and to explore more in-depth information, you can refer to the articles mentioned above. Stay safe and browse wisely!

 Most Secure Browsers Of 2024 – Forbes Advisor

https://www.forbes.com/advisor/business/software/secure-browsers/

 The best secure browsers for privacy in 2024 | ZDNET

https://www.zdnet.com/article/best-browser-for-privacy/

 9 Tips to Safely Browse the Web – How-To Geek 

https://www.howtogeek.com/9-tips-to-safely-browse-the-web/

 Web Browsing | Safe and Secure Web Browser Tips and Techniques – OSIbeyond   

https://www.osibeyond.com/blog/tips-for-making-web-browsing-more-secure/

10 Browser Security Add-ons to For Privacy- Best Guard Tools – geekflare 

https://geekflare.com/browser-security-for-privacy/

The 10 Best Browser Security Extensions [Surf Secure in 2024] – cloudwards 

Choosing the Right Web Browser for You 

https://mobroadband.org/choosing-the-right-web-browser/

Recognizing the Red Flags: Common Signs of a Security Breach

| 0

In the interconnected world of today, where data is a valuable asset, the security of personal data is paramount. Data breaches can have far-reaching consequences, from identity theft to financial loss. It’s important to be aware of the common signs that may indicate a security breach.

Indicators that you might be part of a data breach or had an account hacked:

Unusual Account Activity – One of the most immediate signs of a security breach is unusual activity in your accounts. This could manifest as unexpected logins from unfamiliar locations or at odd hours, which could suggest that someone else has gained unauthorized access to your account.

Appearance of Suspicious Files – The presence of unknown or suspicious files on your system can be a telltale sign of a security breach. These files may be part of a malware installation and could potentially harm your system or compromise your data.

Slow System Performance – A sudden slowdown in system performance, including prolonged response times or frequent crashes, can indicate that your system has been infected or hacked and is being used for malicious activity. You can check system performance by opening task manager on a Windows computer or Activity Monitor on an Apple MacOS computer.

Locked Accounts or Changed Credentials – Finding yourself locked out of your accounts or discovering that your credentials have been changed without your consent is a strong indication of a security breach. This often means that an attacker has taken control of your account and changed the access details to prevent you from regaining control.

Phishing Attempts – Receiving phishing emails or noticing phishing attempts, where you are asked to provide sensitive information through deceptive means is a common precursor to a security breach. Always be wary of unsolicited requests for your personal information.

While recognizing the signs of a security breach is important, taking preventive measures is equally crucial. Regularly updating software, using strong and unique passwords, enabling multi-factor authentication, and being cautious about the networks you connect to can all help in preventing security breaches.

If you notice any signs of a security breach, it is crucial to act promptly to protect your personal information. Here are the steps you should follow:

Change Your Passwords – Immediately change the passwords for any affected accounts and ensure that the new passwords are strong and unique. Consider using a password manager to keep track of your passwords.

Contact the Affected Service – Inform the service provider of the suspected breach. They can take necessary actions to secure and recover your accounts and monitor for suspicious activity.

Check Your Computer for Malware – Run a thorough scan of your computer using a reputable antivirus program to check for any malware that may have been installed without your knowledge.

Monitor Your Financial Accounts – Keep an eye on your bank and credit card statements for any unauthorized transactions. If you spot anything unusual, contact your financial institution immediately.

Place a Fraud Alert – Contact one of the three major credit bureaus (Equifax, Experian, or TransUnion) to place a fraud alert on your credit reports. This alert will notify potential creditors to take extra steps to verify your identity before extending credit.

Consider a Credit Freeze – A credit freeze will prevent creditors from accessing your credit report, which can stop a thief from opening new accounts in your name. This can be done by contacting the credit bureaus directly.

Report to Authorities – Report the incident to the appropriate authorities. This may include local law enforcement, the Federal Trade Commission, or other relevant government agencies.

Purchase Identity Theft Insurance – You can purchase identity theft insurance through the company that provides your home or renters insurance. You can also purchase insurance through companies such as LifeLock or one of your credit card companies. Insurance helps with recovering your identity if stolen as well as any of the expenses associated with recovery.

Stay Vigilant – Continue to monitor your accounts and credit reports regularly. Early detection of fraudulent activity can minimize the damage and aid in the recovery process.

Educate Yourself – Learn more about how to protect yourself from future breaches. This can include attending cybersecurity awareness training or reading up on best practices for online security.

By following these steps, you can take control of the situation and mitigate the potential damage caused by a security breach. Remember, staying informed and vigilant is your best defense against cyber threats. For more detailed guidance, you can refer to resources provided by cybersecurity experts and authoritative guides.

Fraud Alert Links:

https://www.experian.com/fraud/center.html

https://www.transunion.com/fraud-alerts

https://www.equifax.com/personal/credit-report-services/credit-fraud-alerts/

Credit Freeze Links:

https://www.experian.com/freeze/center.html

https://www.transunion.com/credit-freeze

https://www.equifax.com/personal/credit-report-services/credit-freeze/

Educational Resources:

A 2024 Guide to Digital Security & Cybersecurity – https://www.security.org/digital-safety/

Online Fraud and Scams – https://www.digitallearn.org/courses/online-fraud-and-scams-new

Accounts & Passwords – https://www.digitallearn.org/courses/accounts-passwords-new

Understanding Drive-By and Pop-Up Computer Infections

| 0

I’ve just spent some time scanning a computer in my house that had a pop-up virus trying to infect it. Drive-by and pop-up infections are quite common and can lead to your computer and data being compromised.

Drive-by downloads are a form of cyberattack where malware is unintentionally downloaded and installed on a user’s computer. This can occur when a user visits a compromised website or clicks on a deceptive link. The downloaded malware can then perform various malicious activities, such as hijacking the computer, spying on network activity, or destroying data.

Pop-up computer infections, on the other hand, often masquerade as legitimate warnings or advertisements. They can be very persistent, tricking users into clicking on them, which may lead to the installation of malware. These pop-ups can appear even when not browsing the internet, indicating the presence of adware or other malicious software on the system.

To protect against these threats, follow these recommendations:

Keep Your Software Updated – Regularly update your operating system, browser, and any installed software to patch security vulnerabilities.

Install an Ad-Blocker – Ad-blockers can prevent malicious ads from appearing and reduce the risk of accidental clicks that could lead to malware infections. PC Mag has their list of top 5 add blockers.

Use Antivirus Software – A reliable antivirus program can detect and remove malicious software before it harms your system. PC Mag and CNet have their reviews of Antivirus programs for the year.

Enable “Click-to-Play Plugins” in Your Browser – This prevents multimedia content from running automatically and can stop drive-by downloads from executing.

Download Software from Trusted Sources – Be cautious of downloading free software. Ensure you obtain it from legitimate sources and providers to avoid bundled malware.

Adjust Browser Security Settings – Maintain your browser’s default security settings or enhance them to block unauthorized downloads and pop-ups.

Be Wary of Social Engineering – Educate yourself on the tactics used by cybercriminals to lure users into downloading malware, such as phishing emails and fake websites.

Regular Backups – Keep regular backups of your important data. In case of an infection, you can restore your system without losing critical information.

For those who suspect their system may be infected, here’s a step-by-step guide to help you navigate through the process:

Disconnect from the Internet – As soon as you suspect an infection, disconnect your computer from the internet. This prevents the malware from transmitting any sensitive data and stops it from downloading additional malicious components. For pop-up infections, you can power down your machine by holding the power button in for 10 seconds. Many of these pop-up infections run in the computer memory to start and by shutting down the computer without clicking on any recommended links or trying to close the applications on your computer can reduce the chance of further infection.

Enter Safe Mode (Windows MacOS) – Reboot your computer in Safe Mode. This will start your computer with only the essential programs running, which can help prevent the malware from loading.

Check Installed Programs – Review your installed programs and remove anything that looks suspicious or that you don’t remember installing.

Run Antivirus Scans – Use a reputable antivirus program to run a thorough scan of your system. Malwarebytes Anti-Malware is a widely recommended tool for removing malware and unwanted programs. Malwarebytes has both a free and subscription-based service.

Use Secondary Scanners – Sometimes, a second opinion is necessary. Tools like HitmanPro can provide a secondary scan that might catch malware that slipped past your primary antivirus software. Hitman Pro.Alert is their fee-based version.

Reset Your Browsers – Malware often makes changes to your browser settings. Resetting your browsers to their default settings can undo these changes. Once at the default setting, you can change back to any customizations you made to enhance security above the default settings.

Update Your Software – Ensure that your operating system, browsers, and all plugins are up to date with the latest security patches. Outdated software can be vulnerable to exploitation by malware.

Change Passwords – After cleaning your system, change your passwords. This is a crucial step, as malware can capture keystrokes and compromise your accounts.

Backup Your Data – Regularly back up your data to an external drive or cloud storage. If you have a backup from before the infection, you may be able to restore your files if they’ve been damaged or encrypted by malware.

Stay Informed – Educate yourself on the latest threats and how to avoid them. Drive-by downloads can exploit vulnerabilities in outdated software, so keeping informed can help you stay one step ahead of potential infections.

Consult Local Computer Repair Professionals – If you’re not confident in your ability to clean your system or if the infection persists, seek the help of your local computer professional. It’s better to get expert assistance than to risk further damage to your system.

While drive-by and pop-up computer infections pose a significant risk, awareness and proactive measures can greatly reduce the chances of falling victim to these cyber threats. It’s a continuous battle against cybercriminals, but with the right tools and practices, you can safeguard your information and continue to enjoy the benefits of your digital life.

You can find additional information and resources at the following sites:

Malware Protection for Home 2023 | Malwarebytes

Download HitmanPro: Scan and Remove Malware

Best Antivirus Software for 2024 – CNET

The Best Ad Blockers for 2024 | PCMag

What are drive-by downloads + drive-by attack prevention tips | Norton

How to remove a fake virus alert – Norton

How to Enable Click-to-Play Plugins in Every Web Browser (howtogeek.com)

Start your PC in safe mode in Windows – Microsoft Support

Start up your Mac in safe mode – Apple Support

Protecting Your Information Online

| 0

As our lives become increasingly entangled in the digital world, we face many challenges and risks when protecting our personal information. Data breaches, identity theft, phishing, malware, and cyberattacks are common threats that can compromise the privacy and security of consumers’ data. We all need to be aware of the best practices and tools that can help us safeguard our information online.

Below are several of the best practices that you can follow to protect your information online:

Use strong and unique passwords for different accounts and devices. A strong password should be at least twelve characters long, include a mix of letters, numbers, and symbols, and avoid common words or phrases. A password should not be reused with multiple accounts or devices, as this can increase the risk of hacking all the accounts using the same password.

Use two-factor authentication (2FA) whenever possible. 2FA is a security feature that requires an additional verification step, such as a code sent to a phone, app, or email, a set of security questions only you know the answer to, or a biometric scan to access an account or device. 2FA can prevent unauthorized access even if the password is compromised or stolen.

Be careful about what you share online and who you share it with. Avoid posting or sending sensitive information, such as personal details, financial information, or photos, on social media platforms, messaging apps, or email. You should also check the privacy settings and permissions of the apps and websites they use and limit the amount of data they collect or share with third parties. Set apps to share information only with friends, turn off tracking, and limit apps’ access to location data where possible.

Consider using a VPN (Virtual Private Network). VPN on your tablet, computer, or phone encrypts your internet connection and hides your location from hackers. The VPN connection makes it almost impossible for third parties to track your online activity. Using a VPN application is highly recommended to protect your privacy on public Wi-Fi networks.

Keep your applications, web browsers, and devices updated. You should set applications on your tablet, phone, or computer to update automatically.  I would also recommend checking for updates manually on a regular basis (at least monthly). This includes the operating system of the device, along with web browsers and other apps that connect online. Updates not only fix productivity issues. They provide necessary security updates. Missing updates will leave you vulnerable to threats.

Reject cookies and other trackers when possible. Websites now ask or allow you to set what cookies and information you will allow them to track. Take advantage of this opportunity to reduce the information you share with sites. You can also set your web browser to block cookies and trackers on various websites. Web browsers can also be set to send a “Do Not Track” request to the site to block some of the cookies and other trackers. Not all sites process this request, but it is worthwhile to activate this setting. To learn how to change the tracking management settings in your browser, type in “tracking prevention and the name of the web browser you use (Chrome, Firefox, Edge, Safari, or other browser).”

Install antivirus software. Antivirus software (AV) can detect, quarantine, and\or delete threats that may exploit systems or devices. AV can also warn about malicious websites and provide other services that can help protect your information online such as VPN, scanning for your information on sites that sell information on the dark web, and other features.

Avoid clicking on suspicious links or attachments in emails or messages. Be wary of phishing emails or messages that trick you into revealing personal information or downloading malicious software. Phishing emails or messages may appear from legitimate sources, such as banks, government agencies, or online services. Still, they often have spelling errors, grammatical mistakes, or urgent requests. Always verify the sender’s identity and the authenticity of the link or attachment before clicking on it by contacting the sender through an alternate means. Do not reply directly to the sent message. Look for senders’ information in your contact list or company website.

Consider purchasing identity theft insurance. In today’s environment, it is not a question of if your data will be involved in a data breach but when it will happen. You can purchase identity theft insurance through the same companies that sell your car or homeowners insurance. You can also purchase it through other companies like LifeLock or other Antivirus providers. While it does not protect you from the breach, it will help you recover your identity should your information be used to steal your identity or create loans or large purchases in your name.

Get your yearly free credit report and consider subscribing to one of the three credit monitoring services. You can get your credit reports from one of the three credit monitoring services, Experian, Equifax, and TransUnion, every year for free by going to Annual Credit Report.com and filling out a request.  You may want to consider subscribing to one of these services, which allows you to receive alerts when changes happen to your credit report, lock your credit report, and set fraud alerts to prevent others from opening lines of credit with your information.