Steven Andiloro is the owner of Professional Security Solutions, a security company in North Carolina servicing customers nationwide!

Tag: Online Security

Steven-Andiloro-Ring-compressor (1)

Even More Personal Safety Devices

With all of the technological attacks and threats that have plagued our world in the last few years, it is very easy to forget about protecting yourself in other ways. Personal security is just as important as online security. You must remain vigilant at all times and protect yourselves. Luckily, today’s technologically-driven world has allowed for some fascinating advancements in personal security, as well as online security. Here are a few personal security gadgets and devices that you should look into.

 

Door Stop Alarm

If you’re looking to prevent home burglaries, then look no further than the door stop alarm. An incredibly simple device, the door stop alarm is shaped like a traditional door stop, and features an alarm that will sound if a door is opened. No matter how silently a thief opens a door, they cannot prevent the alarm from going off. It’s a great way to protect your home.

 

Wearable Alarms

When you’re being stalked or even chased by an assailant, reaching for your cell phone and making a call may be next to impossible. That is precisely why wearable alarms have become very popular in recent years. Personal security devices, like the Nimb Ring or the WearSafe are designed for situations like these. Although all of these devices have their own exclusive features and variations, the idea is still the same: a wearable device that connects to your smartphone through an application and can send an alert signal to authorities and personal contacts when pressed. These alarms can be literal lifesavers.

 

Video Doorbell

If you’re home alone and you get a ring at your door, you want to know who it is, right? But what if you weren’t expecting any company or it is very late at night? Who is at your door? Well, with a video doorbell, you can find out in just a few taps. Video doorbells connect to your home wifi and allow you to see who is standing at your door in real-time through a mobile application. You can even communicate with your visitor. It’s an incredibly safe way to answer your door.

 

Make sure to stay safe out there!

Steven Andiloro- Two More of the Worst Online Hacks in History

Two More of the Worst Online Hacks in History

 

As a continuation of last month’s blog, I took a look at some more detrimental online hacks that have rocked our nation. Although preventive cyber security measures have increased, so have the capabilities of hackers. A lot of our personal information is exposed when we utilize online resources. Many of us know someone who has been affected by cyber attacks and may even know people involved in some of these larger scale incidents. Here are a few more noteworthy security breaches to hopefully remind you to stay safe online.

 

Target:

In 2014, retail mogul, Target, faced one of the worst data hacks our country has seen. The attack led to 70 million names, mailing addresses, emails, and phone numbers being stolen. Additionally, 40 million credit and debit card number, expiration dates, and CV codes were obtained by the hackers. The unique scenario of the hack made it a national news story. The breach in security took place over a three-week time period, which is why so many accounts were infiltrated. Many customers lost a great deal of trust in the company, and stocks did take a hit for a few months. From a security standpoint, Target had all of the right preventative measures in place. Yet, they neglected to react to the warnings they were provided. Many lawsuits filed against the company due to damages were dropped once damages were returned to customers. After discovering the breach, Target offered a year of free credit monitoring and identity theft protection to U.S. based customers.  A few customers received settlement funds from Target and the security measures have increased drastically. I’d be willing to bet that they won’t be ignoring any more warning signs in the future.

 

Sony Pictures

Those working in the entertainment industry already have a significant amount of their dirty laundry aired. You can imagine their emotions when they found out that Sony Pictures had fallen victim to a cyber attack. The attack was orchestrated by a North Korean based group self-titled “Guardians of Peace.” The group claimed their motive was the release of the film “The Interview,” a comedy portraying an assassination attempt on Kim Jong-Un. The breach consisted of the group receiving access to Sony employee’s personal information, emails within the company, and copies of then-unreleased films. As a result of the attack, Sony has heightened their cyber security efforts including the use of new software to house all company information.

Steven Andiloro Beginners Guide To Internet Security

Beginners Guide To Internet Security

The creation of the internet has led to many great technological advances in our lifetimes. Everything from research capabilities to video chatting with people around the world is feasible thanks to the world of being able to log online. Sadly, many people have dedicated their lives to creating viruses and cyber attack mechanisms to destroy and alter the way we use the internet. It is important for everyone to be aware of viruses that exist and best practices for keeping your digital footprint safe.

 

Preventative Measures

Before the hackers and viruses can make their way onto your devices, there are plenty of proactive methods for keeping your information secured. One of the best practices includes making sure a strong password is used for all properties. Many sites now have strength requirements (upper and lower case letters, numbers, special characters, etc.) but for those that have no requirements, it is still best practice to include as many features in a password as possible. Another tip, though tedious, is creating a different username and password for all login credentials. People who use the same passwords for all accounts are more likely to be hacked via multiple sites rather than just one. A great tool to utilize are apps such as Keeper, which creates a secure location to manage all of your passwords in case they are forgotten.

 

One of the largest sources of cyber attacks stems from improper use of certain online properties. McAfee shares that improper use of tools such as email and instant messaging can cause holes in your security walls, allowing viruses to be easily implanted in your system. Additionally when online shopping, make sure that there is a note on the checkout page, ensuring that the site and your information is safely protected from hackers.

 

Services

In addition to completing the above actions, there are many companies that provide online security for you and your devices.Top Company Compare ranks a few of the top contenders with brands such as Norton, Scanguard, and Total AV making the top 5 list. By purchasing one of these software systems, you are eliminating any additional risk factors that come along with intense online use. These products usually update automatically and are applicable to multiple devices, giving optimal coverage for any possible online invasions.

With the number of daily technological advances being made, there is always room for cyber attackers to grow their craft. Even those who sparingly use the internet, knowledge, and protection from any sort of breach or hack that may present itself is crucial. Continuously remaining aware of our internet practices will provide less of an opportunity for cyber disasters.

Steven Andiloro Two of the Worst Online Hacks in History

Two of the Worst Online Hacks in History

I’ve said it before and I’ll say it again: we cannot escape technology. Technology has infested our everyday lives. And because of that technology, we have put a large amount of our personal information out in the open, without us fully realizing it. From online purchases to banking, our credit card and social security numbers, dates of birth and just about everything else are all out in the open, waiting to be taken. And unfortunately, malicious hackers have taken advantage. There have been dozens of online hacks on companies which have put millions of users’ information at risk before, but there are two in particular that I feel are exceptionally bad.

 

Playstation Network Outage

Video games are a multibillion dollar industry, with billions playing around the world. And Playstation, one of the world’s most popular gaming consoles, has a very popular online gaming community called the Playstation Network. In this community, subscribers can play video games and speak with each other and purchase video games or movies through the online store, which requires a credit card. And in 2011, hackers breached the Playstation Network, bringing the platform to its knees. The attack resulted in the access of 77 million subscribers’ personal information by hackers. Sony, the parent company of Playstation, was forced to shut down the service for a total of 23 days. In that time, they restructured the infrastructure and made the network safe to use again. In response, Sony executives publicly apologized during a press conference by bowing their heads in shame. At the time, it was one of the worst online hacks in history.

 

Yahoo! Account Breach

Speaking of the worst security breaches in history, Yahoo! has the unfortunate pleasure of laying claim to this record. An incredibly recent event, Yahoo!, the popular tech company, admitted to the breach of over 1 billion users’ accounts. What made the case so extraordinary was the fact that Yahoo! had been attacked twice within two years. The first hack occurred in 2013, which compromised the initial 1 billion accounts; the second hack took place a year later, adding an additional 500 million breached accounts. It is by far the worst data breach of any company on record. What makes matters worse is that Yahoo! only recently disclosed the security attack, in September of 2016. Although the news made headlines, it did not necessarily damage the company’s image.

Powered by WordPress & Theme by Anders Norén