Browsed by
Category: 30 Day Challenge

3DSC 2.29: Create Backups of Your Files

3DSC 2.29: Create Backups of Your Files

Last year I suffered a catastrophic malfunction of my main hard drive.  After returning from a work trip I settled in to check email only to find my computer unwilling to boot.  This is not the first time I have broken a computer.  Fortunately this time I was prepared.  The step that saved me in this instance is today’s task: backup your files.

3DSC 2.28: Obscure Your Phone Number

3DSC 2.28: Obscure Your Phone Number

Your phone number may not seem like a big deal. You give it out to nearly everyone one – and every service – in your life. I believe that your phone number is more important than your social security number as an individual identifier. Your phone number is linked to your entire digital trail – your public online accounts, the dossiers private data broker have on you, your mortgage information, your medical history, the location of every place you have…

Read More Read More

3DSC 2.27: Secure Your Communications

3DSC 2.27: Secure Your Communications

Today we will wrap up our three-day mini-series covering smartphone security.  Your call history and text messages are available to your mobile service provider.  They are also available to malicious parties that can hack your service provider.  Your phone calls and text messages are also available to anyone with certain technology.  Though IMSI-catchers like the Stingray are only available to law enforcement, today’s state “secrets become tomorrow’s PhD theses and the next day’s hacker tools.” 

3DSC 2.24: Smartphone Security Part II

3DSC 2.24: Smartphone Security Part II

Today’s task is to encrypt your device and put a (better) passcode on it.  I realize that most of you probably have a passcode on your mobile phone, but many out there don’t.  Even if you do I want to make those passcodes better; this is a critical step in smartphone security.  Phones are much more easily lost or stolen than your laptop and they carry a wealth of information about you.  You should protect the data that is on…

Read More Read More

3DSC 2.23: Smartphone Security Part I

3DSC 2.23: Smartphone Security Part I

Today we will move into securing our mobile devices. At this point your laptop and desktop computers should be reasonably well-protected. Smartphones and tablets have the potential to represent an even greater attack surface is not secured properly. today’s task is to ensure your smartphone OS  and all installed apps are updated. Ensuring all software is updated is the single greatest security measure you can take to protect your device from malware.

3DSC 2.22: Use Private Payment Methods

3DSC 2.22: Use Private Payment Methods

At this point your personal credit should be locked down pretty tightly. With your credit report in hand, you have reasonable certainty that your credit has not been stolen. With a credit freeze initiated, you don’t have to worry about anyone opening new lines of credit in your name. However, these previous techniques do nothing to protect your existing accounts, so it is still important to protect your credit card numbers. Today, you should set yourself up to use private…

Read More Read More

3DSC 2.20 – Initiate a Credit Freeze

3DSC 2.20 – Initiate a Credit Freeze

Identity theft is an incredibly invasive and potentially devastating form of crime.  It can cost tens of thousands of dollars, ruin credit, and consume countless hours of time.  One of the best tools for preventing identity theft is what is known as a credit freeze (sometimes called a security freeze).    Today’s task is to initiate a credit freeze for yourself and all members of your family, including your children.  If your children have a social security number they, too are…

Read More Read More