to connectVideoFox News Flash, important news, Dec. 31
Fox News Flash, important news, for the Feb. 31, here. Check out what to click on Foxnews.com
Working for NASA is a big job, and it is a true honor. Every day, the talented men and women of the us need to be thinking on a cosmic level, we are not just talking about the space exploration and research. Sometimes it’s about the global security, such as the plan for the destruction of the Earth-ending asteroids. Tap or click here for more information about NASA’s innovative plan.
Other work includes the prevention of cyber-attacks, whether on the Earth or on the International Space Station. Such as a company or the government, NASA has to defend itself against the most advanced hackers on the internet.
But it begs the question: If tens of thousands of NASA employees and contractors to understand how to protect their personal devices in the house.
For a fragile moment in time on a private server, that could lead to astronomical problems. So how do NASA employees have to defend their own personal computers, and a myriad of devices? It all starts with practicing good habits online. Tap or click to read the 8 stupid things you do on the web, which can pose a risk. Are you guilty of any of these?
I recently had the distinct pleasure of giving a talk at NASA’s Glenn Research Center in Cleveland, Ohio, home to the National cyber security Awareness Month. I have discussed the basic safety procedures that everyone needs to know these days.
I was concerned with three main themes during the event, however, each is important, and fortunately, it’s not rocket science. You must comply with all three of them in the year 2020.
1. Your first line of defense
I get it, no one is spending a lot of time to reflect on their router; you just want to get it to work. However, for a meaningful cyber security, your router is your first line of defense is to keep criminals out of your network.
Hackers are able to compromise your router is already in place and have full access to your data, files, and networks. Tap or click here for a free trial to see if your router has been hacked.
Right out of the box, your router comes with a default user name and password. Since these references are all available on the internet, an amateur, how the hackers in order to hack and do all sorts of damage. So, the first order of business is to log in to your router’s administration console, and that the generic password has been changed.
If you don’t know your router’s password, and then tap or click, here to learn how to find it and change it.
Next, update your router’s firmware to the latest version. The exact steps will vary depending on your router brand and model has all of the modern options that will have an admin page that can be accessed through the web browser.
All you have to do is type in the default IP address of your router in the address bar of your browser and it will take you directly to that page. Tap or click here for more detailed information on how to update your router’s firmware.
Once the credentials have been changed, and the system is up-to-date, it’s time to make a number of settings. If you are using the same router for a number of years, and all of what you’re seeing in your security is WPA or WEP, and believe me, it is time for you to go shopping for a new one.
Look for WPA2, the latest standard, WPA3, and to make sure that your new router has a firewall, which is included in just about any newer model. And while you’re at it, there’s even more you can do. Tap or click here to see the 5 security settings to turn on before it is too late.
2. Don’t leave home without it
Every time the us has a laptop computer for work, the employee is required to use a virtual private network. This is exactly the reason why they have been created in the first place, to securely connect to corporate networks via the internet, in order to be safe from your own house.
A vpn or virtual private network, or VPN, is a layer of protection between your devices and the internet. It hides your IP and MAC address, along with your current position and encrypts the data that travels from your machine to web sites that you visit.
Kim’s tips and the trusted advice that’s free of charge Komando.com App.
More importantly, if you are using a public Wi-Fi connection and do not have a trusted network, a VPN provides a critical layer of security for you. They are cheap and easy to obtain.
If you’re on an unsecured network, as you would in a coffee shop, airport, library, or other public place, you can send queries via the cyberspace, and they route through their own networks, to other computers or servers, exposing you to an experienced hacker.
If you would like a more in-depth look at the Vpn, and then tap, or click here for a complete guide to choosing and setting up your own virtual private network.
3. Watch out for the mailbox
Phishing attacks are no joke. The Scam attempts that come in your e-mail, social networking accounts, and text messages can be persuasive in the first place, you should take a look.
Phishing scams have become more sophisticated in the last couple of years. In place of the long-lost uncle leaving you an inheritance of $ 10 million, the scammers masquerade as legitimate businesses or government agencies.
Maybe you’ll get an e-mail looks like it’s from Netflix, saying: “your account has been compromised, and you need to put your password to be reset. Tap or click here to see what it looks like. If you click on the link provided in your e-mail, you will be taken to a website that might look like the real thing.
RELATED: Hackers are getting smarter than ever, and they have opened up new ways to fool even the savviest among us. Tap or click here for 3 ways to avoid becoming a victim of such sorrow, phishing attacks.
The next type of scam is called spear phishing and it’s a bit of a more personal, Realistic-looking e-mail from legitimate businesses or agencies may include your name, phone number and even your office or home. This information can be gathered from social media, or maybe it was created out of a real estate agent.
Phishing attacks may be malicious links, or even files that can infect your system with malware. In this way, they will have access to your machine, or worse: infect your entire network and any other device.
So, don’t wait. If these techniques are good enough for NASA, it will definitely work for you.
BONUS TIP FOR EXTRA KNOW-HOW: How you can see all the devices that are connected to your network
If you use the internet in your home, you probably have multiple devices connected to your network. It’s so easy to keep piling on the add-on devices, also to your new laptop computer, video game console, or a new tablet, or even your friend’s on the phone.
You may even start to lose it, and everything that is connected to it, or even worse, see things that do not belong to it. There are even users who have been trying to connect to your home Wi-Fi networks without your consent or knowledge.
This is bad news for a number of reasons. Someone may be stealing bandwidth from your network, or your own personal information. Fortunately, there are easy ways to determine what devices are connected to your network, and you can prune it to what it should be and should not be there.
Then click here to take a closer look at the use of the internet connection.
What is the digital lifestyle, if you have any questions? Call Kim ‘ s national radio show, and then tap or click, here to find it on your local radio station. You can listen to, or watch, The Kim Komando Show up on your phone, your tablet, tv or on the computer. Tap or click here to see Kim’s perspective.
Copyright By 2020, WestStar Multimedia Entertainment. All rights reserved.
Learn about the latest technology on the Kim Komando Show, the nation’s largest weekend radio talk show. Kim takes calls and gives advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips newsletters and more, visit her web site at Komando.com.