News of data breaches is all too common. This company apologizes for six million accounts breached. That company acknowledges hackers accessed 35,000 users’ personal identifiable information. But the question that probably matters most: Is your data breached, too?
The company should contact you if your information is in a data leak, but you can’t rely on that. You can also find out if your phone number or email address has been leaked by visiting https://haveibeenpwned.com/.
HaveIBeenPwned has uploaded various breaches and consolidated the information to make searching easy. Enter your address and get a list of breaches that compromised that email. You’ll get a summary paragraph as well as a description of data compromised in each breach.
It is not uplifting reading!
Next, the question is what to do about your breached information.
Steps to Better Security
First, change your passwords for those breached accounts. If you use that same password to access other accounts, change those passwords, as well, even if they are not listed as leaked.
Always avoid reusing passwords. Yes, it can be a hassle to remember many different access credentials, but you risk exposing many accounts if you keep reusing one email address and password combo over and again.
Make using unique passwords for all accounts easier by using a password manager. A manager can store your many passwords in one place and generate strong ones to use. You can often download an app to your mobile device, which gives you the convenience of filling in your credentials when you’re on the go, too.
The next step is to use two-factor authentication (2FA).
Understanding 2FA
This adds a layer of difficulty for hackers trying to access your accounts. Even if they had your username and password, they would need a second way to verify your identity.
Using 2FA requires you to provide one of the following before you can gain access:
something you know (e.g. the answer to a secret question);
something you have (e.g. your smartphone);
something you are (e.g. your fingerprint).
A bad actor would need to have not only your leaked credentials but also your other “something.”
A common approach to FA is an SMS text message or voice-based authentication. You enter your credentials, then the site follows up with a text or phone call providing a separate code you must then enter. This is not the best method, however. Scammers can hack the SIM card associated with your device, and then use your number to make and receive calls and texts.
Software tokens for 2FA are a safer solution. You’ll download and install an application on your phone (e.g. Google Authenticator, Authy or Okta Verify). It can generate a unique verification code that is valid only for 30-60 seconds.
Want to learn more about password management and soft-token 2FA. We’re here to help. Contact us today at (651) 456-8655 or send us a message from our Contact page.
Now we could sell our clients a typical, heavily commercialized, residential computer security product, but why settle for less? Here at Twin Cities PC Repair, we have tested several computer security products and have arrived to the conclusion that most are riddled with bells and whistles you simply don’t need. What does this mean? It means that the products slam your system performance by heavily utilizing system resources such as memory, CPU and hard drive.
What are we offering?
A simplified, yet powerful, product known as Emsisoft Business Security! Emsisoft’s ideal is a malware-protected world, a place where home and business computer security is engineered to perfection. Emsisoft produces innovative anti-malware solutions that are efficient, powerful, unobtrusive, and minimalistic. Emsisoft’s software effectively detects new threats before your computer is compromised. All of their products do their job perfectly; keeping your digital world safe. Emsisoft Business Security leaves your computer’s power where it belongs: with you.
Let’s Discuss Key Features…
FINDING AND REMOVING MALWARE
Dual-engine virus and malware detection – Emsisoft (A) and Bitdefender (B) engines work together to detect all types of malicious software, including viruses, ransomware,
trojans, bots, keyloggers, spyware and more. Signatures for double-detections are avoided for memory use and speed optimization.
Super fast system scans (1-2 min) – Scan your device quickly and thoroughly using our efficient dual-engine scanner. Scan time varies depending on which scan type you
select.
PUP/Potentially Unwanted Programs detection – Alerts you of potentially unwanted programs (adware, browser toolbars, system optimizers, etc.) that can affect your device’s
performance.
Advanced infection cleaning – Smart operation processes ensure the safety and stability of the computer during system cleaning. Checks 70+ autorun/loading
points including hidden ones used by rootkits and restores default values if they have been overwritten by malware.
There’s More! – Click HERE to download a full feature list in PDF format.
PREVENTING NEW INFECTIONS
Multi-layered real-time protection – We use diverse technologies and multiple layers of security to maximize our solutions’ protection capabilities.
Web Protection – Blocks access to known dangerous websites using a frequently updated block list. Web Protection is host-based and works across all
programs, even if the transferred web data is encrypted.
Anti-phishing – Blocks access to known fraudulent websites that try to steal online banking passwords or identity details.
Browser security – Browser extension/addon for Chrome, Firefox and Edge that blocks access to dangerous websites on a URL level. Uses a privacyconscious design that doesn t track your browsing history or break your SSL encryption chain.
There’s More! – Click HERE to download a full feature list in PDF format.
CENTRALIZED MANAGEMENT
Management Console – Centralized security management has never been easier. As part of our daily client endpoint monitoring duties (Included in your subscription), we monitor the protection status of your devices and we’ll reach out to you immediately if we notice any areas of concern. This also includes system performance monitoring such as, memory performance, hard drive performance and any Windows generated errors. Your security and privacy are of utmost importance! We do not have the ability to monitor your file system or any personal information on your device(s).
Windows & Third-Party Patching – Also, included in your monthly subscription, we review and deploy Windows and third-party software patches to your device(s). We test & review all patches before deployment, ensuring your have a healthy and up-to-date system!
There’s More! – Click HERE to download a full feature list in PDF format.
If you’d like to subscribe, request additional information, or are looking for a free consultation of your PC’s current security status, please call our security professionals at (651) 456-8655 or send us an email by visiting our Contact page! Only $9.99/mo/device. No contract. Cancel anytime.
The holidays are busy. We’re trying to get work done to have some fun, and we’re hosting family and friends. Plus, parents that have the holiday Elf tradition must remember to move the doll every night. It’s a lot, and it can make us more likely to fall for scams that can lead to data theft.
Hackers like to take the path of least resistance. Why work harder than they have to for their ill-gotten gains? Instead, they’ll use social engineering to get you to give them your data or download their malware. Look out for these top holiday scams.
Parcel delivery scams
More people are expecting packages this time of year. Bad actors take advantage of this with what’s called a smishing scam. It’s a particular type of scam using text/SMS messaging. You get a message from a known service telling you a delivery needs rescheduling, or that there’s an outstanding fee that needs to be paid.
Recipients, who are already expecting a package, are quick to fall for the request. Clicking on the message link, they enter personal information or download malicious software.
Tip: Go to the source of the package you’re expecting and see what they’re saying about your package delivery.
E-card scams
Another common holiday season scam takes advantage of our enthusiasm for money. Scammers send e-cards to your email. When you click on the link, you’ll download a virus or other malware (e.g. ransomware).
Tip: Check the credibility of any e-card sender before downloading the “gift.”
Christmas hamper scams
Everyone wants to be a winner, but don’t fall for the scammer calling or emailing to say you’ve won a Christmas hamper. They’ll claim to be from a legit organization and have some of your personal information already. That helps them make it all seem genuine. Then, they’ll ask for you to provide more personal details to collect your prize or gift.
They may ask only for your full name, address, and phone number (if the request was emailed). They’ll be collecting this information for a more focused attack in the future.
Tip: Use strong passwords and be careful about what personal details you put on social media.
Fake websites
Many people shop sites that are unfamiliar to them at this time of year. Grandparents (even parents) know nothing about that latest trendy shop! Bad actors will set up fake sites offering gifts and services. They’re looking to get your personal details and money.
Tip: Prefer secure website addresses starting with “https” and displaying a locked padlock.
Shopping scams
Every season has its in-demand items. Scammers take advantage of this and set up ads for amazing deals on those items. Desperate to get this year’s toy for your toddler, you might be hooked. Or they’ll ensure people click on their ads by offering ridiculous deals. If you do get the item purchased via these ads, it’s likely to be a sub-par counterfeit.
Tip: Shop with retailers you know and trust.
Bank scams
This scam operates year-round, but bad actors have an edge in the holiday season when people spend more. Fraudsters typically call, text, or email as your bank having noticed suspicious activity. They get you feeling anxious and then urge you to take action (e.g. click a link or share personal details) to address the issue.
Tip: Remember that banks never use unsolicited calls to ask for personal details, pressure you to give information, or tell you to move your money to a safe account.
The tips shared throughout this article will help. At the same time, setting up password managers and antivirus software can also be useful. We can help you secure your online activity year-round. Contact us today at (651) 456-8655 or visit our Contact page.
LetMeIn101: How the Bad Guys Get Your Passwords – Passwords are essential to your cybersafety. You know it, but if you’re like the rest of the digital society, you probably have dozens of passwords to remember. It’s a lot. So, you might take shortcuts. Taking advantage of your laissez-faire attitude is one way bad guys access your passwords.
Incredibly, there are still people out there using “password” or “123456” in their access credentials. Some people don’t change the default passwords on their devices. So, anyone can pick up a router, look at the sticker identifying the password, and access that network.
Tip: Avoid the obvious passwords! When you have to create a password, make an effort. When it’s time to update a password, do so. Steer clear of simple, easily guessed patterns.
Cybercriminals can also guess your password. With a little bit of research about you online, they can make some informed guesses. Common passwords include pet names, birthdays, and anniversaries. These are all easy to find via your social media accounts.
Tip: Be careful what you share on social media! Don’t befriend strangers, as you are giving them access to a goldmine of info for personalizing an attack on you.
If that doesn’t work, criminals may try brute force. They might script an automation bot to run thousands of password permutations until they get a hit. The software will try a long list of common passwords and run through dictionary words to gain access.
Tip: Use a complex password with numbers, letters, and symbols or a passphrase. A passphrase is typically at least 19 characters long but is more memorable, as it unique to you.
The criminal may also be working with info from a data breach. In early 2019, a security researcher found more than 2.7 billion email/password pairs available on the Dark Web. Criminals accessing that database could use the data as a starting point, as many people duplicate their passwords across accounts.
Tip: Use a unique password for each site. Yes, that’s overwhelming to remember, and that’s also why you should use a password manager to keep track of it all for you.
Criminals can also access your account if you’ve used a hacked public computer. The bad guys may have installed a key logger on the computer. The logger records every key you press on the keyboard. Or they might have compromised a router or server to be able to see your information.
Tip: Be cautious about your online activity on computers or networks you don’t trust.
Of course, there’s one more method of getting your password that we haven’t addressed yet. It’s the familiar phishing attack. For instance, you get an email that looks like it was sent by your bank. Phishing typically has an urgent message and a link that directs you to what looks like a credible page.
Tip: Pay attention to who is sending the email and hover the mouse over the link to see where it goes. If you are concerned about your bank account, for example, open up a browser and type the URL manually rather than clicking the link.
These tips can help you to protect your valuable passwords. Still, setting up a password manager and amping up your internet security can help too. Need support getting ahead of the cybercriminals?
Check out these additional helpful articles: How Do Hackers Get Passwords? – Click Here
Avoiding and Reporting Scams – Click Here
10 Signs of a Phishing Email | How to Identify Phishing Attacks – Click Here
Contact our experts today! Call us at (651) 456-8655 or visit our Contact page.
Two-Factor Authentication, How Hackers Get Around SMS – Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe.
With billions of usernames and passwords leaked, access credentials everywhere are at risk, especially if you are reusing your log-in information on more than one site (don’t do it!).
Business websites want to offer a secure user experience, so two-factor authentication (2FA) has become the norm. It’s meant to help stop automated attacks in which bad actors use the leaked usernames and passwords.
Still, if the site you’re visiting uses short message service (SMS) to send a one-time code to your phone, you could still be at risk.
Hackers, using information they have from a data leak, can call your telephone company. They use your name, date of birth, and other identifiers available on the Dark Web, to impersonate you. Then, say you’ve lost your phone, they transfer your phone number to a device with a different SIM card.
That means when the one-time SMS code gets sent your phone number, the message will instead go to their device.
Android Users Also Beware
On Android devices, hackers have an easier time getting access to text messages. If they have access to your leaked Google credentials, they can log into your Google Play account. From there, it’s simply a matter of installing a message-mirroring app on your smartphone.
The app synchronizes notifications across your different devices. It’s for when you really need to be connected, and you’ll be able to see your phone’s SMS alerts on your tablet!
The app won’t work unless you give it permission when prompted to do so, but too many people don’t stop to read alerts from their own accounts: they assume it’s another necessary update and go on with their day. Otherwise, the hacker might call you in a social engineering ploy pretending to be a legit service provider. They’ll be familiar to you, so you’re more likely to listen when they ask you to give permission.
Again, when the one-time SMS code gets sent to your phone, because of the message-mirroring app, the hacker’s device will also receive the code.
What Can You Do to Protect Yourself?
It starts with using unique passwords for all sites you visit. Worried you’ll forget them? A password manager can keep all your access credentials in one secure place for you.
You should also confirm that your credentials haven’t been compromised. If you use Google’s password service, you can head to the password manager site and tap “check passwords” to see if there are any issues. On Firefox, head to the Firefox Monitor page and “Check for Breaches.” On Safari, click on Preferences, and then on Passwords to see what recommendations they have for your security.
Change any passwords that have been involved in a leak!
To avoid the SMS concern specifically, avoid using one-time SMS codes to verify your identity. Instead, you can use a non-SMS authentication tool such as Google authenticator, which provides two-step verification services within the app itself.
Here’s some additional information you may find helpful:
Need help learning if your credentials have been leaked? Or want assistance setting up more security for your online activity? We can help. Contact our IT experts today at (651) 456-8655 or visit our CONTACT page.
Stop Your Technology from Stalking You – Unless you’re a reality television star, you probably don’t like the idea of being watched at all times. So, why would you want your technology to know all about you? With digital technology today, it’s far too easy for our devices to turn creepy. Here are some suggestions to stop the stalker-like tendencies of the technology you rely upon.
Today’s marketing and online communications are all about customization and personalization. If you like a friend’s picture of an Art Deco door in Belgium, you see many more posts featuring similar designs. Or if you view an area rug on a website, you’re suddenly bombarded with ads for rug stores when you next go online.
This can add convenience, but it is also unsettling. What companies online know about you could be more detailed than what your friends know. Take the following steps to regain control of what your computer, phone, and apps know about you.
Review your privacy settings
Whether going online from a phone, laptop, desktop, or tablet, get to know the device’s privacy settings. Some important settings to review include:
email tracking – this can let people know if you opened their message or not;
location tracking – personalizes recommendations but also tells search engines where you are;
voice recordings – manufacturers use these to train virtual assistants, but pause this to keep your conversations to yourself;
purchase history – this helps feed the machine so that businesses know how to target you in the future.
Opt out or block ads
Opting out of ads limits the information collected from your browser or device. The site or business still receives basic information about you, but you will no longer receive targeted, interest-based ads any longer. Apple’s iOS 14 allows app blocking, and you can also express your choice on Android devices.
Otherwise, use browser ad blockers, such as AdBlock Plus, or JavaScript blockers, such Ghostery, to limit ad tracking. Also known as content blockers, these software programs prevent ads from showing on websites you visit. You can find ad blockers for Chrome, Firefox, Opera, Safari, and Internet Explorer.
Check your permissions
Watch the permissions you give apps. We have already talked about checking device settings, but you can also limit the permissions you give to apps. For example, social media accounts have privacy settings that allow you to control what’s logged about you.
Plus, check permissions for other apps. Clash of Clans doesn’t need location services, for instance. Or you might not want to give Slack access to your microphone and video recordings.
Use webcam covers
Covering your webcam stops someone from potentially seeing and recording you. If you think you’d see the light come on to show the webcam is in use, know that hackers can disable that. A simple sliding webcam cover closes the webcam when you are not using it to avoid a cybercriminal having access.
Covering your webcam can also come in handy in all those online meetings you’re having. A covered camera means you don’t run the risk of your colleagues catching you unprepared.
Limit information you provide
Social media has created a culture of oversharing. There are probably many things you’ve seen about friends online that you would rather not know. You’re also sharing more than you need to with the companies that you interact with online.
If you’re filling out a form for a download, you might fill out only the required fields. When you add an app, be stingy with your personal details. Think about it from a need-to-know perspective. For instance, that home design game you love to play doesn’t need to know where you went to high school or with whom you bank.
Need help keeping the privacy-busting algorithms at bay? We can help. Our IT experts can configure device settings to limit information gathered about you online.
Steer Clear of Coronavirus Scams (4/9/2020) – With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the Coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.
The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around Coronavirus is their mission.
So far, several Coronavirus-related attempts to cyber-scam people have been reported. There are examples of:
emails that appear to come from government health departments;
offering a tax refund to get people to click on malicious links;
memos to staff that appear to come from large employers;
COVID-19 test offerings from private companies;
fake websites promising to sell face masks or hand sanitizer;
soliciting donations to help fund a vaccine.
What to Watch Out For
Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.
You may get an email promising the attached information offers Coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).
In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.
What to Do
Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:
be wary of anything that tries to play on your emotions and urges immediate action;
question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
avoid downloading anything you didn’t ask for;
doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
ignore any communications requesting your personal information;
don’t be suckered by fraudulent pleas for charity.
Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.
If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.
While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.
We hope you’ll take care and stay healthy both physically and online in these tough times.
Need help installing security software and keeping your technology safe? Our cyber-security experts can give your home a tech immunization. Contact us today at (651) 456-8655 or visit our Contact page!
The Advantages of Ad Blocking – Unless you’re in the advertising business, you probably try to avoid ads. You pay extra to stream ad-free content online. You leave the room if you are actually watching live TV shows with ads. You filter spam out of your inbox. You immediately click out of ads on the Web pages you visit. But are you actively blocking online ads? You should be. They are more than an annoyance. They could be a security risk.
Cyber-criminals are smart and savvy crooks. They don’t advertise what they are doing, and it’s not that easy to spot, but they do buy legitimate ad space to lure users to malicious sites.
Malvertising uses legitimate online advertising networks to target you with malicious code. Sites you know and trust that use legitimate ad networks can end up serving up the malicious ads. Cyber-criminals have run ads on the New York Times, Spotify, and the London Stock Exchange redirecting to malicious websites.
Adware is another risk. Packaged with legitimate software, adware runs on your computer without your knowledge. It displays unwanted advertising, redirects search requests to ad websites, and mines your data.
The cyber-criminal wants to steal your ID, or your financial and contact data, or to encrypt your information, spy on, or hijack your computer.
They can do this with exciting ads ($9 iPads?!) or alerts (often warning about infections) to get your click. But they can also take a drive-by download approach. In these cases, you don’t even need to click on anything. You load the Web page hosting the ad (or malicious pop-up window). You’re directed to a page that finds browser or software security vulnerabilities to access your machine.
Protecting Against Malvertising
Keep your software up to date, and run antivirus checks to protect against downloads and malicious code. Avoiding Flash and Java helps too, as they are commonly exploited by malvertisers.
Cyber-criminals mostly target Windows users, because the huge user base gives them the best return on investment. But Macs are just as vulnerable to malvertising attacks. — MalwareBytes
Installing an ad blocker plugin prevents the ad loading in the first place. These take away the annoyance of ads and help you avoid falling victim to a malicious attack hidden in an ad.
At the same time, you will enjoy cleaner Web browsing, and you won’t have to worry about distracting ads flashing at you while you read.
Your pages will also load faster. The ads often run a lot of code on top of the website code your computer needs to read and load. The images or video, for instance, can make a difference to data usage. So, the less you have to load, the faster you’ll get to the content you wanted. This can also help to preserve the battery life of your mobile devices!
There are some other considerations, though. For one, not all ad blocker plugins can be trusted. Some will mine your data and sell it to advertisers, which is exactly what you don’t want happening.
Also, some websites won’t load correctly without the ad code. You can turn off ads on a site-by-site basis. After all, some free sites that you frequent might rely on ad revenue, so there may be sites you trust that you want to support by turning off your ad blocker just for those sites.
Always think before you click. Updating browsers and plugins and installing ad blockers can also help.
For the peace of mind that comes with ad blocking and keeping your computer security current, give us a call at (651) 456-8655 or visit our Contact page. We can help set you up to enjoy a safer online experience.
Why You Need Professional Virus Removal. “Your computer has a virus.” Such a dreaded five words! We don’t want to come down with a human virus; we’ll feel awful and miss work. But when a virus hits our computer, we could lose valuable information or be vulnerable to attack. Chicken soup won’t cut it.
Perhaps you have an antivirus product installed on your computer. This computer software is intended to prevent, detect, and remove viruses. Antivirus tools are designed to keep infections out. They can also delete any viruses that may already be on the computer when the software is installed.
The software provides protection by tracking malicious code and other computer threats via:
classifying the actions the file or code drives (as malicious or OK);
inspecting file signatures for matches to an existing signature in its virus dictionary;
scanning for rootkits that can change how your operating system functions.
However, antivirus software isn’t that good at cleaning up. When it detects a malicious file, it will delete it. But what if the virus spread before discovery? If the infection spreads before virus deletion, it can do all sorts of damage.
Think of it this way: you have a cyst on your knee. Doctors decide it is pre-cancerous and operate to remove the cyst before it spreads. But, that’s all they do. They have seen the cyst. They go for the cyst. However, they don’t notice the cancer that’s in your shin or femur, because they were only working on the cyst. The rest of your leg remains unhealthy, and you don’t even know it!
Getting a Second Opinion on Viruses
If the antivirus software is your primary physician, a computer professional is the specialist you go to for an expert second opinion. For one thing, antivirus products don’t always remove all the malicious files. Many viruses start as one thing but can mutate into several different strains. The antivirus software may not be programmed to identify all of the virus variants. A professional actively looks for undetected strains on your computer.
Viruses are always evolving. A recent strain of malware, SquirtDanger, let hackers take computer screenshots, capture passwords, download files, and empty out cryptocurrency wallets.
Some viruses can change the settings of your computer. For instance, a common virus changes your computer’s DNS, which is like a bit like the Yellow Pages for the internet. On a virus-free computer, when you type in “Google.com”, your browser goes to Google’s servers located at the IP address “216.58.203.100.” However, an infection can make Google.com on your computer go to a different address. Perhaps a server address cyber criminals use to capture your personal data. It still looks to you like Google, but it’s no longer safe. These settings can still remain after the infection is long gone.
Viruses can also leave behind browser toolbars, extensions, and other nasties designed to spy on your Web browsing habits. If you’re consistently redirected to unwanted sites, or seeing unwanted pop-up advertisements, it’s likely your computer’s infected with a browser hijacker.
Ultimately, if you detect a virus on your computer, check with a professional. Don’t trust that your antivirus software is going to do the same, thorough job an expert can offer. Sometimes your computer isn’t fully safe until the operating system is reinstalled, but you can’t know that until someone can go in and see what the virus did and what remnants are still there, lurking.
Cyber criminals are growing more sophisticated and better able to design viruses that disguise their tracks. Avoid being an unwitting victim. A computer security expert can diagnosis when your computer gets a virus, or determine if there are strains on your device you don’t know about. Let a security expert protect your computer from harm today! Call us at (651) 456-8655 or visit our Contact page.
What Happens to Your Data When You Die? Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your data.
Consider your digital footprint. You have photos, files, and emails on your computer and your phone. You’re also documenting your life on social media, and sharing on more than one channel.
Your wearable technology (say an Apple Watch or a Fitbit) may be recording information too. If you have a virtual assistant in your home, it’s recording your search history and saving that data on the cloud.
Yet many of us never think “what will happen to my data after I die?” Do you want it deleted? Are there digital assets you want to share? Perhaps there is tangible value attached to some of your digital assets. At the very least, some photos and videos that may have sentimental value for those who survive you. So, let’s explore advance planning you can do to protect your digital legacy.
Personal Files on Computer or Phone
Your personal devices are password protected. While necessary, this makes it more difficult for your survivors.
Now, they could physically pull the computer or phone apart if needed. But, it’s easier to have a copy of your passwords in a secure place for someone to access in the event of your death. Another option is to use a password manager. You can designate someone as your backup contact. They will be able to gain access to your passwords should you die.
Digital Media Collections
Often, when you click the “Buy” button, you’re not really purchasing that movie or music forever. Your contract with iTunes, for instance, was only for your lifetime. Your rights expire at your death.
Cloud Accounts
Consider the personal and private data you have in the cloud, such as Google or Microsoft’s Outlook. This might include calendars, emails, GPS, documents and financial information.
Google’s Inactive Account Manager lets you make plans for your account. You decide:
When Google should consider your account inactive
What it should do with your data afterwards
Whether to share account access with someone (providing email and phone number)
When or if your account should be deleted.
Microsoft won’t provide your passwords after death. However, via their Next of Kin process someone could be sent a DVD of the data in your outlook.com account.
Other cloud providers ask for proof of death and of legal right to access. In Dropbox’s case for instance, your survivors will need a court order. Even with all this, there’s no guarantee your personal data is completely removed from the cloud. It may exist in other datasets in system backups.
Social Media Accounts
Social media companies do not provide login credentials. Many require proof of identity and a death certificate to deactivate the account. Facebook and Instagram will “memorialize” your accounts. The public can’t see, but Friends or Followers can still view it and post memories. You can assign a legacy contact to look after the account or have it deleted.
You don’t want someone using your social account to send out spam or inappropriate photos. For instance, a sexy spam bot took over a New York Times media columnist’s Twitter after his 2015 death.
Plan ahead to protect your privacy and provide access where necessary. Think of the pain and heartache you can save your survivors by managing your digital legacy now.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments