Contact Us For A Demo

Posts Tagged ‘smartphone safety’

Cybersecurity Safety

Tuesday, July 18th, 2017

Cybersecurity-breach stories are so common lately, the headlines no longer shock. But don’t let familiarity breed contempt. In 2017, you can’t afford to grow complacent about Internet safety. As the following examples demonstrate, it’s crucial to guard your online data:

“Hacking actions at nuclear facilities targeted traditional vectors like websites, emails and Microsoft Word documents that were infected as the method for cyberattacks. It needs to be back to basics of ‘security blocking and tackling’ for many, and consideration of even traditional cyber threats.”


“The FBI and Homeland Security issued a new warning to American energy companies about potential cyberattacks on nuclear facilities…Homeland security officials say the hackers penetrated the ‘business’ side of the nuclear facility.”

“A wave of ransomware attacks spread like wildfire (in June). Many Microsoft Windows-based computers—specifically, ones not protected against a vulnerability in a Microsoft messaging protocol…began seizing up worldwide, locking employees out of their desktops, and displaying ransom notes…It’s still not clear what the initial attack vector was. But once inside, the worm could spread across computer networks.”

Password Matters

A hacker’s job is to crack computer passwords to access sensitive files and data. Once they obtain the password, they can do malicious things to the information stored in an account. Or worse, they may be able to harm the accounts of other people who share computer networks. So, the argument— “I don’t need a secure password because I don’t store important information in my account”— won’t fly. Passwords are usually the weakest security link within an organization’s network. Don’t fall victim to cybercrime. Create a secure password:

Password Don’ts

  • Don’t use dictionary or foreign words, names, doubled names or first/last names and initials.
  • Don’t use simple transformations of words (7eleven, seven11, etc.) or any alphabet or keyboard sequence (backwards or forwards).
  • Don’t use your user ID in any form (as-is, reversed, capitalized, doubled, etc.).
  • Don’t reuse old passwords. Instead, choose a completely new password every time you change it.
  • Don’t consider using short words (less than 8 characters), phone numbers, birth dates, social security numbers or numbers substituted for letters (like a zero instead of the letter O).
  • Don’t use ‘password’ as your password. (Believe it or not, statistics show that up to 70% of all user-passwords are the word ‘password.)
  • Don’t tape the password under the keyboard or anywhere else on the computer, the computer’s desk or in an unlocked file cabinet. Mischievous people will look for your password in these places like a thief looks for a key under the front doormat.

Password Do’s

  • Choose a phrase, and then use the first letters (‘A stitch in time saves nine’ would be ‘asits9’).
  • Use a password that has at least two alphabetic characters (a-z, A-Z) and at least one numeric (0-9) or special (punctuation) character. Always use a mixture of upper- and lowercase characters.
  • Choose a password that is easy to remember, so you don’t have to write it down.
  • Select a password that you can quickly type. This keeps people from discovering your password by watching you type it.
  • Change your password often—at least once every three months.
  • Implement a password-protected screen saver in case you must leave your workstation without first logging off. When possible, log off or lock your workstation by using CTRL + ALT + DEL.

Smartphone Safety

Since smartphone saturation in the United States surpassed 80 percent of the population in 2016, hackers are targeting secure data stored on handheld devices. Keep your data safe:

  • Malicious people could gain physical access to your smartphone or tablet. Malicious people are rude. Someone has to say it! Protect your device with a password and run apps such as Android Lost or Find My iPhone to help recover lost or stolen smartphones.
  • Malicious emails and text messages can infect your smartphone with malware. To prevent this, periodically run anti-virus software on your device.
  • The camera and microphone on your smartphone can be remotely activated. Do not take a smartphone near classified information, and remove the battery before discussing sensitive information.
  • Wireless networks may be insecure and subject to monitoring. Use VPN when accessing wireless networks and do not access sensitive information over shared wireless networks. Turn off Bluetooth when you are not using it, to prevent hackers from exploiting your device.

About Allied Universal

Remember, cybersecurity and crime prevention are everyone’s responsibility. A convenient and affordable way to make sure you are prepared for disasters and emergencies of virtually every kind is to subscribe to the Allied Universal Fire Life Safety Training System, which has been designed to help improve and save lives. For more information about the best system out there, or to subscribe, click here.

Are You Smart About Your Smartphone?

Tuesday, February 5th, 2013

Part 1 of a 2-Part Series

If you’re among the 46 percent of people in the world who own a Smartphone, you’ve likely experienced the panic that sets in when you think you’ve lost it. Whether the phone ultimately proved to be temporarily misplaced or if it permanently vanished, you had legitimate cause for alarm. After all, the amount of sensitive data most users store on their phones is astounding—direct access to savings and checking accounts storage of personal passwords for social media and email accounts, contact information for friends and colleagues. What’s more, even if you guard your phone with your life, the information contained on it could potentially be hacked or compromised by a virus when you are using a public wi-fi connection.

According to data released by Find My Smartphone by Lookout, which allows Smartphone users to track missing phones, the top 10 cities most at risk for lost or stolen phones include:

  1. Philadelphia, PA
  2. Seattle, WA
  3. Oakland, CA
  4. Long Beach, CA
  5. Newark, NJ
  6. Detroit, MI
  7. Cleveland, OH
  8. Baltimore, MD
  9. New York, NY
  10. Boston, MA

Regardless of where you live, your phone could be in danger, as 113 Smartphones are stolen or lost every minute in the U.S. So, if you fail to protect your phone with a password, back up your data and install a program that can wipe the phone’s memory remotely, losing your phone could start you on the path to an identity-theft nightmare.

To help keep you safe while surfing the web using your Smartphone, we would like to share the top 10 steps you can take to make sure your Smartphone is safe. This week, we’ll cover 5:

  1. Create a Password. Admittedly, it’s a hassle to unlock your phone every time you want to use it. But consider this: if you could put a lock on your wallet, wouldn’t you do it, despite the inconvenience? A phone password is by no means foolproof. However, it might just provide a deterrent for potential thieves who will move on to an easier target.
  2. Log out of Security-enabled Apps. Would you keep a major credit card on your desk at work? Setting up your Smartphone to automatically log into sensitive accounts is like carrying credit card passwords in your wallet right alongside the cards. Of course no one thinks they will be victims of theft. As we so often caution at Allied Universal, the best thing to do to be safe during an emergency is to be prepared. So treat your Smartphone as though you plan on losing it. Don’t value convenience over security.
  3. Adjust settings so your Smartphone won’t automatically connect to available WiFi networks. To BE SAFE, disable the feature on your phone which allows it to immediately connect to available networks. You can usually find this feature under your phone’s settings. When you opt to use a public wi-fi, consider the fact you could be sharing your screen with a hacker. Then, proceed with caution.
  4. If you shop online, download shopping apps instead of browsers. You usually have a choice when using your Smartphone to order items on sites like Amazon, eBay, Overstock or major retailers like Target and Best Buy. Dedicated shopping appsare preferable to browsers which return full-site results, because applications are specifically designed to ward off phishing and other scams. But be careful before downloading that the app is legitimate. Oftentimes, while you are browsing using your Smartphone, sites will ask if you want to download the application. Opt in, as this is for your safety.
  5. Download remote wiping software. Dozens of apps and services enable you to locate your phone and wipe data clean. Even though certain tech-savvy hackers may be able to disengage these applications, adding the feature will provide you with extra protection in your phone protection plan. Here’s a sampling of where to go to procure the appropriate app if you have an iPhone, Android, Blackberry or Windows-based phone.

Check our blog post next week, when we’ll share the final five steps to take to protect your Smartphone. When a disaster strikes, prior planning and clear decisive action can help save lives. The Allied Universal Training System by Universal Fire/Life Safety Services helps commercial buildings with compliance to fire life safety codes. Our interactive, building-specific e-learning training system motivates and rewards tenants instantly! It’s a convenient and affordable solution to all of the training needs of your building(s). Choosing our service cuts property management training related workloads by 90% and saves you over 50% compared to conventional training! More importantly, IT SAVES LIVES!