Monday, April 1, 2019

Safeguard Your Data –Part 3



If you missed part 1 & 2 of this article you will find them on this Blog.

Photos
The loss of photos can be heartbreaking so taking some time to ensure they are backed up securely is a good investment of your time. The problems I see most often with customers are: Lack of a clear understanding of Cloud backup options and/or lack of understanding on how to effectively backup to either the Cloud or a local device. The other issue of course is finding the time in busy schedules.

As we can all be accused of being a bit snap happy it is not unusual to accumulate a large amount of photos consuming a good whack of space. 

YouTube contains a myriad of HOW TO tutorials on how to backup data from a variety of devices.

This YouTube tutorial  https://youtu.be/Iw-EvM6gLBA explaining how to backup your windows 10 computer to a local device was easy to understand and follow.

If you just want to backup your photos, and providing your photos don’t take up more than 64 gigabytes, you can use a usb memory stick. After 64 gigabyte usb memory stick prices start to creep nearer the cost of a 1 Terabyte usb hard drive. If you want to backup your entire computer then an external usb drive is the recommended option. 

There are a myriad of free and buyable backup apps that allow you to store multiple copies of you data on different devices or locations. At the bottom of this article I’ve listed prices for backup devices from a few Irish sources.

The Two Copy Rule
 2019 marks my 38th year in technology. During those years I’ve seen countless examples where technicians including myself fell victim to the three monkeys of disaster (hubris, arrogance, and assumption). It’s nothing new and as we all know part of the human condition. In 2019 I must unfortunately report the three monkeys continue to prosper. Facebook has just admitted to storing hundreds of millions of passwords in plain text but has assured us that they were not accessible by anyone outside of Facebook except for some 2,000 engineers and developers. As of January 2018 facebook employed some 35,587 people.  If you wish to defend yourself from becoming a victim always maintain at least two independent copies of your valuable data on two independent devices AND ensure these devices are securely stored. Take ownership of backing up your data and hopefully you will never need to use it.

Backup Device Prices

Usb Memory Sticks
Argos -SanDisk Ultra Fit 130MB/s USB 3.1 Flash Drive - 64GB  -  €18.99
Harvey Norman Verbatim USB 2.0 Store N Go Slider 64GB Black  €19.95 
MemoryC Online retailer with offices in Celbridge Co Kildare
64GB Kingston DataTraveler USB3.1 Flash Drive €14.75 plus shipping

Usb Hard Drives
Argos Maxtor M3 1TB External Portable Hard Drive €59.99
Harvey Norman ADATA HV300 Hard Drive | 1TB | Black € 59.90
MemoryC 1TB AData HV620S USB3.1 Portable Hard Drive Black €58.43 plus shipping.

Sunday, January 27, 2019

Safeguarding Your Data - Part 2



If you missed part 1 of this article you can read it by going to the web links provided at the end of this article.

What Is My Data?
Part 1 of this article dealt with financial insurance records. This article will deal with Cloud Email.

Cloud Email:
This is an area where it is quite common for me to see total data loss due to hacking. The Achilles heels of cloud based emails such as Gmail and Hotmail are:

1.      There is no backup of the email accounts.
2.      Once it has been hacked, the hacker may encrypt the emails and demand a ransom for their return.  There is no way to undo the ransom hack attack.
3.      By residing on the cloud the email account is subject to hack attacks 24 hours a day 365 days a year from anywhere by anyone.

Action Required:

1.      Download any important attachments to your computer and follow the two copy rule (I’ll outline the two copy rule later).

2.      Save important emails to your local computer and/or print them.

3.      Avoid leaving sensitive data on your cloud based email. Work on the premise that at some point a hacker will gain access to it. So once you have secured a copy of the emails then delete the sensitive emails.

4.      If you are using an apple device make sure that your email and contacts are included in the cloud backup.

Two Copy Rule: This is where you have at least two independent copies of data in separate or different locations or devices. In a pc example your email would be backed up to the cloud and a local hard drive or usb.   

My personal recommendation is NOT to include the cloud in the count so you should have two other backup devices AND the cloud.

My next article will continue on this topic.

Oliver Reidy is a computer technician and has been in the industry since 1981.You can contact him via email at help.desk@reidyonline.com or at the telephone numbers listed on this page. This article, and all previous articles, are available to view online at http://reidyonline.blogspot.ie/ or www.reidyonline.com/blogspot.htm

Sunday, January 20, 2019

Safeguarding Your Data



Safeguard Your Data

By the time you read this article it will be 2019 and no doubt some fresh data breech will have been announced, hand wringing performed, perfuse apologies given, and promises that it won’t happen again issued. The truth, as we all know, is this is far from the truth. Which begs the question who is responsible for my safeguarding my data? The answer is simple: It’s you !  In this accidental digital world we live in you must take action and the time to protect and safeguard you data. The consequences of ignoring it are really very simple – you’ll lose it. Over the next few articles will outline data profiles and some steps you can take to safeguard it

What Is My Data?
Start with the question “what is my data?” and you are on the road to safeguarding it. The average person’s data is spread across multiple devices, networks, computers, and held by many institutions. When it comes to locations outside your control the most important element is to maintain a duplicate, where possible, of what they hold. To help those confused by that the following is a list of data, more will follow in the next articles:

Financial and Insurance records – Account numbers, passwords, policy numbers, access passwords, balances etc.

  • Action Required: Ensure you have paper and digital copies of this information in a secured location such a home safe or other hidden location.
Your local digital copy should be, at a minimum, stored in a file which is password protected and where possible encrypted. A usb flash drive that can be hidden is a good idea as a storage location.

 The data includes in the case of your banking, direct debit mandates, credit card numbers including expiration and security code, and emergency number for lost, stolen, or hacked accounts.

  • Financial Access passwords: Change your passwords frequently where possible and NEVER use the same password on more than one site or app. Record previously used passwords and do NOT re-use them.
   
If your financial institution offers double authentication use it. Double authentication is where the website sends a code to your phone which you must use in combination with your password and login information to login.

In my next article I will continue on this topic. Stay Safe and happy new year!

Wednesday, August 1, 2018

Facebook





Facebook has been taking some very heavy pressure in the media and from law makers for some time now and I thought it prudent to outline how these companies operate and make their vast profits. Ultimately it is up to you to decide if you want to continue to use these apps to share information. Hopefully this article will give you some more information which may help you understand the world of the “cloud”.

Cattle and Sheep
With the wonderful weather we have been having you may have taken a drive in our countryside and observed the picturesque views of meadows and animals of all varieties grazing peacefully. To you, unless you are a farmer, they are lovely animals at peace. The livestock farmer sees them completely differently. To the farmer they are assets to be fattened up and eventually sold for slaughter or their products sold. When it comes to the internet that is exactly what you are to Facebook and indeed to virtually all of the data giants including Google ,Amazon, Ebay, and Whatsapp(Owned by facebook). In case you wonder about Apple and Microsoft their aim is also the same you are profit and you wallet and personal data are the milk or meat.

Selling Your Information
In considering the about point you must also dwell on the following truth: Every picture, message, post, search and visit to the cloud are collected analyzed and flogged to whomever is willing to spend the money to get the data. So Aunt Molly’s 80th pictures and posts are being collected and turned into profit by Facebook and their compatriots. The revelations in the press about who accesses this data and how it can be used to manipulate your thoughts on topics has caused a sharp decrease in the number of people opting out from using social media.

Integrity and Privacy
As a computer technician I’ve repaired hundreds if not thousands of computers in my work career. Most of them were packed with information. Part of my job requires as a fundamental requirement that I can be trusted and that my integrity is such that I won’t be accessing your personal private data.  Imagine my repair terms required you to agree to allow me copy all of your data trawl through it to build a picture of who you were and then flog it to companies looking to exploit it. What person in their right mind would drop off their laptop to have a virus removed? But that’s exactly what is happening when you use Facebook and other cloud apps. The latest kicker is that they are doing the same with your cloud email which explains why it was “free”. It’s not you are paying the price of you privacy for it.

The wonderful thing about using software is that you can choose NOT to use it.

“You must be the change you want to see in the world.” - Mahatma Gandhi


Oliver Reidy is a computer technician and has been in the industry since 1981.You can contact him via email at help.desk@reidyonline.com or at the telephone numbers listed on this page. This article, and all previous articles, are available to view online at http://reidyonline.blogspot.ie/ or www.reidyonline.com/blogspot.htm

Friday, July 27, 2018

General Data Protection Regulation



On the 25th of May 2018 the General Data Protection Regulation (GDPR) became the law of the land and the wider EU. If you haven’t noticed the effects of this new comprehensive regulation you will no matter what area of life you operate in. In this article I will give a very brief overview, to familiarize yourself fully with the GDPR please visit the site of the Data Protection Commissioner at http://gdprandyou.ie/  The Dail made 105 amendments to the regulation before passing it into law. You can download the full text of the act in pdf format by visiting https://www.oireachtas.ie/en/bills/bill/2018/10/

The Aims of The Regulation

Some but NOT all of primary aims of the regulation are:

#1 Make Companies, individuals, and organizations responsible and accountable for keeping personal information on any citizen of the EU including justifying why such information is recorded, how long they will retain it, and crucially the right of every EU citizen to know what information is being kept and have it corrected and/or deleted. Specific portions of the regulation are targeted at protecting minors.

#2 Provide for severe financial penalties for companies, organizations, and individuals where they are found to be in breach of the regulation.

#3 Elimination of complex or implied agreements to keep and pass on personal information.

#4 Provide a simple mechanism for citizens to register a complaint against any company, individual, or organization that they believe is in breach of the act.

#5 Require companies, individuals, or organizations to respond to citizen requests about personal data.

What Is Personal Data?
The regulation defines personal data as any information which can identify an individual or pertains personally to that individual and includes photographs and video.

The Reach of The Regulation
 GDPR applies to any company, individual, or organization who records personal data on EU citizens regardless of where these entities are located inside the EU or in non EU countries.  Thus a company located in the United States of America who holds personal data on EU citizens is subject to the regulation.

Next month based on your feedback I may continue on this subject