HP.com Publishes 10 Tips for Protecting Your Identity from RESCUECOM

RESCUECOM Delivers Ten Helpful Identity Protection Tips in HP.com Article

hp.com
Article published with permission from Small Business Technology Magazine
By David Milman
May 17, 2007:


10 tips for keeping ID thieves behind bars

Protecting yourself, your equipment, your employees and your business from technological threats in this mobile world can be a dizzying challenge for any small business owner. Before you hit the road, consider these tips and best practices to steer clear of on-line identity theft:

1. Don't ignore your security updates, such as those from Microsoft Windows if you're on a PC. When that little annoying pop-up window says you have updates, pay attention! Those are critical to making sure you have the latest tools to protect your computer.

2. Always have the latest and updated antivirus and anti-spyware programs on your computers. While there are many sufficient free versions, paying for the top-of-the-line programs is always safest. Consider antivirus software programs from McAfee, Trend Micro or Symantec that often have anti-spyware tools built in. Another great anti-spyware program is Webroot Spysweeper.

3. Turn the "file sharing" setting off on your business's notebook computers. While this feature might be convenient in the workplace, it's critical to turn it off when you're traveling so that nobody can view your company or personal files. Password-protect any file that contains sensitive information. Microsoft Windows XP has this built right in.

4. When you compress a file you can secure, encrypt and password protect it. Don't forget your password. Other programs that have this ability are WinZip and WinRAR.

5. Disable the wireless radio on your notebook computer when not in use. Newer models have built-in wireless cards that are often visible when your computer's power is on.

6. When utilizing a Hot Spot to access the Internet, make sure you either pay for the access or sign in through some sort of "landing page" which tells you who the Hot Spot provider is. Avoid logging on to a "copy cat" network set up by a hacker.

7. Use a password to log on to your computer at all times?at the office and especially when traveling. Do not use any personal identification or obvious codes when creating these passwords, such as your Social Security number, birthdate or company name. Ideally, you should also use an alphanumeric password combination and change it every month.

8. When traveling, bring a travel router with a built-in firewall with you. Linksys (a division of Cisco Systems, Inc.), 3Com and NETGEAR offer mobile solutions. These routers should be configured and tested by your IT manager or consultant before you travel.

9. Voice over IP (VoIP) is becoming more popular. Executives are traveling, they can literally bring their office communications system with them. Be aware of the security gaps that can be exploited through VoIP and the preventative measures you can take. Make sure that all software security updates have been downloaded and installed before using your softphone or VoIP equipment. Also make sure your firewalls are properly configured and that your VoIP traffic is encrypted. Ask your VoIP provider about this.

10. Set up a virtual private network (VPN) for your notebook computers. This will encrypt and protect any emails or communications conducted within the VPN. But be sure to follow the other tips to protect your business.

VoIP traffic is encrypted. Ask your VoIP provider about this.

Google Reviews

D.M. Lafortune
D.M. Lafortune
2 months ago
These folks are the best ! They have Rescued me more than once :o)
...These folks are the best ! They have Rescued me more than once :o) less
Steve Donnellon
Steve Donnellon
4 months ago
Working with Roy remotely from Junea, Alaska has been a excellent experience and and he solved my so
...Working with Roy remotely from Junea, Alaska has been a excellent experience and and he solved my software issue and had hellp with preventing future issues. less
Jay Amburgey
Jay Amburgey
7 months ago
I was having trouble with my gmail email and I contacted Rescuecom and a technician named Roy helped
...I was having trouble with my gmail email and I contacted Rescuecom and a technician named Roy helped me restore email and folders that I thought were deleted or lost. I highly recommend these guys for your technology needs and they also help with cellphones, routers and tv's. Way to go Rescuecom. less
Jean Ende
Jean Ende
7 months ago
I was in a panic because I'd been hacked--they saved the day and took care of all my problems right
...I was in a panic because I'd been hacked--they saved the day and took care of all my problems right away. less
View all Google reviews

Featured in:


Feature Inthe New York TimesFOX NEWSUSA TodayComputer WorldCNNForbes