Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 7 February 2011

Who is in charge of your family's computer security?

Posted on 19:11 by Unknown
I have been doing a little research on Identity Theft and some of the statistics I've found are scary. In 2009, according to Javelin Strategy and Research's annual "Identity Fraud Security Report" [ http://bit.ly/aKgBRe].
11.1 million adults were victims of identity fraud. 11.1 million people, that's a lot of people! That's almost 5 percent of the total population of the United States.
If that isn't scary enough, the monetary damage from all this fraud was $54 BILLION. That's an average of $4,841 per victim.
According to this survey, small business owners suffered fraud at one-and-a-half times the normal rate.
I see the potential for this to get worst and not better. It's not like all the data we have floating around the web, our multiple PCs, our home networks, our phones, and our wallets is going to decrease over time. This makes it more important than ever that you and I assess our data security on at least a yearly basis.
I urge you to preach the mantra of digital security to your family and friends.
After all, I don't think any of us can afford $54 billion.

Here is a link to an article that tells you just how to protect yourself from fraud.
http://www.maximumpc.com/article/features/protect_and_defend_32_ways_secure_your_digital_life


On the same note, I recently read an article titled "FCC Probes Google."
Here are some key points of the article:
  • At issue is Google's admission in May 2010 that its Street View cars had mistakenly gathered data, including email addresses, passwords, and URLs, in the process of photographically mapping the world's streets.
  • This information was inadvertently collected from unprotected Wi-Fi networks.
  • The FCC has announced that it's launching a probe to determine whether the unauthorized data collection violated the Communications Act.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Informative, Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • I need your help.
    Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
  • 10 Reasons to Root Your Android Device
    Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
  • Belarc Advisor
    This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
  • How do you get infected with malware?
    The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
  • Welcome
    Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
  • Extortionware / Rogue Security Software / Malware
    You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
  • Cell phone privacy reminder
    Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
  • Banking Scam
    Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
  • Free Download F-Secure Anti-Theft for Mobile 6.2
    Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
  • Beware of Christmas scams
    Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

Categories

  • Facebook
  • Informative
  • Other
  • Security

Blog Archive

  • ►  2014 (1)
    • ►  January (1)
  • ►  2013 (14)
    • ►  December (6)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
  • ►  2012 (20)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (2)
    • ►  February (2)
    • ►  January (1)
  • ▼  2011 (48)
    • ►  December (3)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (4)
    • ►  July (1)
    • ►  June (8)
    • ►  May (3)
    • ►  April (6)
    • ►  March (9)
    • ▼  February (3)
      • Best Buy has lost it's mind.
      • Who is in charge of your family's computer security?
      • Confused by ‘Update’ Jargon? Maybe this will Help!
    • ►  January (3)
  • ►  2010 (32)
    • ►  December (5)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (4)
    • ►  January (5)
Powered by Blogger.

About Me

Unknown
View my complete profile