October 2, 2024 We all have documents, photos, contacts, and other digital assets we want to protect from cyber threats. It may be surprising that physical assets such as smart refrigerators and smart stoves are also subject to cyber threats.
The Willow Valley Computer Club and the Apple Users Club encourage residents to protect these assets. Here are the top four actions to protect them:
- Use strong passwords and a password manager
- Use multifactor authentication
- Recognize and report phishing
- Update software whenever an update is available
These actions will significantly reduce the likelihood of loss due to cyber threat actors.
October 7, 2024 Phishing emails are the dominant method scammers use to convince recipients to download and install malware or give up personal information. Everyone over 60 is a target for scammers.
This week, to help you avoid phishing scams, we encourage you to review this Phishing Tip Sheet and view this one minute YouTube CISA video, Easy Tips to Avoid Phishing Scams.
October 28, 2024 Stay Secure: Keep Your Apps Updated!
Software isn’t flawless. Hackers can exploit these flaws, called vulnerabilities, to steal your data. Updating your software when updates are available drastically reduces this risk.
Here’s how to stay protected:
– Windows: Many apps on Windows won’t update automatically. Patch My PC Home Updater (a free app from patchmypc.com) helps keep your software current. Patch My PC claims that 70% of successful malware attacks target outdated programs! This free app can update over 500 applications, keeping you safe at no cost.
– iPhone: iPhones automatically update apps when updates are available. No extra steps are needed!
– Android: Apps downloaded from Google Play or F-Droid also update automatically. However, apps from other sources may not.
Be safe: The Willow Valley Computer Club and the Apple Users Club encourage you to always check for and install app updates to minimize security risks.
November 2, 2024 The threat of cyberattacks is ever present. One simple additional step to bolster your security is to remove any software you no longer use. Unused software can harbor vulnerabilities that hackers may exploit.