HP.com Publishes 10 Tips for Protecting Your Identity from RESCUECOM

RESCUECOM Delivers Ten Helpful Identity Protection Tips in HP.com Article

hp.com
Article published with permission from Small Business Technology Magazine
By David Milman
May 17, 2007:


10 tips for keeping ID thieves behind bars

Protecting yourself, your equipment, your employees and your business from technological threats in this mobile world can be a dizzying challenge for any small business owner. Before you hit the road, consider these tips and best practices to steer clear of on-line identity theft:

1. Don't ignore your security updates, such as those from Microsoft Windows if you're on a PC. When that little annoying pop-up window says you have updates, pay attention! Those are critical to making sure you have the latest tools to protect your computer.

2. Always have the latest and updated antivirus and anti-spyware programs on your computers. While there are many sufficient free versions, paying for the top-of-the-line programs is always safest. Consider antivirus software programs from McAfee, Trend Micro or Symantec that often have anti-spyware tools built in. Another great anti-spyware program is Webroot Spysweeper.

3. Turn the "file sharing" setting off on your business's notebook computers. While this feature might be convenient in the workplace, it's critical to turn it off when you're traveling so that nobody can view your company or personal files. Password-protect any file that contains sensitive information. Microsoft Windows XP has this built right in.

4. When you compress a file you can secure, encrypt and password protect it. Don't forget your password. Other programs that have this ability are WinZip and WinRAR.

5. Disable the wireless radio on your notebook computer when not in use. Newer models have built-in wireless cards that are often visible when your computer's power is on.

6. When utilizing a Hot Spot to access the Internet, make sure you either pay for the access or sign in through some sort of "landing page" which tells you who the Hot Spot provider is. Avoid logging on to a "copy cat" network set up by a hacker.

7. Use a password to log on to your computer at all times?at the office and especially when traveling. Do not use any personal identification or obvious codes when creating these passwords, such as your Social Security number, birthdate or company name. Ideally, you should also use an alphanumeric password combination and change it every month.

8. When traveling, bring a travel router with a built-in firewall with you. Linksys (a division of Cisco Systems, Inc.), 3Com and NETGEAR offer mobile solutions. These routers should be configured and tested by your IT manager or consultant before you travel.

9. Voice over IP (VoIP) is becoming more popular. Executives are traveling, they can literally bring their office communications system with them. Be aware of the security gaps that can be exploited through VoIP and the preventative measures you can take. Make sure that all software security updates have been downloaded and installed before using your softphone or VoIP equipment. Also make sure your firewalls are properly configured and that your VoIP traffic is encrypted. Ask your VoIP provider about this.

10. Set up a virtual private network (VPN) for your notebook computers. This will encrypt and protect any emails or communications conducted within the VPN. But be sure to follow the other tips to protect your business.

VoIP traffic is encrypted. Ask your VoIP provider about this.

Google Reviews

Michael Bender
Michael Bender
in the last week
The most awesome professional service. They fixed major issues
...The most awesome professional service. They fixed major issues less
Joyce Kelly
Joyce Kelly
a month ago
What a great experience I had with Roy tonight! My computer was hacked and he worked through gettin
...What a great experience I had with Roy tonight! My computer was hacked and he worked through getting everything restored with great competence and we had a great time chatting as we got through it. He also gave me some great tips on keeping my personal information safe, which I greatly appreciated. I also had the pleasure of speaking with David Millner and he assured me from the start that they would fix the problem and they have! I have truly enjoyed this first experience with this company and hope I have many more! less
James Skaggs
James Skaggs
a month ago
In my conversations with David & Roy, (very professional in knowledge and listening to my compla
...In my conversations with David ~amp~ Roy, (very professional in knowledge and listening to my complaint and solving it to a very professional level is OUTSTANDING! My hat is off to these folks. I highly recommend them to anyone that has a computer problem/s. less
David Kisyua
David Kisyua
4 months ago
very professional, efficient, excellent quality serviceI highly recommend David Milman and his team
...very professional, efficient, excellent quality serviceI highly recommend David Milman and his team without reservations. less
View all Google reviews

Featured in:


Feature Inthe New York TimesFOX NEWSUSA TodayComputer WorldCNNForbes