How to protect your "Digital Footprint"

The term "digital footprint" goes back to at least 2014. However, it's now become a popular term and it's something that everyone that uses the Internet for anything has. 

Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases.

When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation.

What is a digital footprint?

Every time you post something online, share content, or even when a website collects your information by installing cookies on your device, you are creating a digital trail. This includes your IP address, your login details, and other personal information that you reveal online. Information that is posted about you also gets added to your data trail.

What your digital footprint can say about you?

It’s a good idea to have a positive digital footprint. This information is your digital identity, and it could show up when someone searches for your name online.

Your online identity can influence different aspects of your life. For example, employers, schools, colleges, and law enforcement officials could use your digital footprint as a basis for character assessment.


Avoiding Malicious Links

Avoiding "bad links" isn't easy. Like many of you, we constantly receive emails with hyperlinks to websites. The vast majority of what makes to our inboxes is "legit".  Our internal lines of defense primarily come from our SonicWall routers,  Mimecast eMail Security and Sophos Antivirus/Antispam software that all trap suspicious emails and links. Still, it pays to be watchful of what you're being sent. Here are some techniques that will help.

Whether it’s in reference to an interesting article or information on a great new restaurant, “send me the link” is a commonly used phrase in the internet era. This is equally true in professional circumstances, where coworkers communicate and collaborate as a part of their jobs. In today’s threat-filled environment, where large and small businesses alike are facing unprecedented cybersecurity attacks, link safety is an essential part of employee security training.

CyberEdge Group’s 2019 Cyberthreat Defense Report found that 78 percent of networks had been breached in the previous year and that malware, ransomware, and spear-phishing “cause the most headaches.” In a separate study, risk advisory firm Willis Towers Watson found that 90 percent of breaches were enabled by human error. Any seasoned IT pro worth their salt knows how to recognize malicious links, but the average employee likely does not, and one wrong click can have devastating consequences.

Basic employee security training generally involves coaching employees on picking out suspicious attachments, but that training is incomplete unless link safety is also on the agenda. Emails with malicious links are just as much of a threat as emails with malicious attachments. There are a number of tips and tricks to keep in mind when trying to determine whether a link is safe.


Upgrading your PCs

We get it! Like the majority of our clients, The Computing Center is a small business. For us to continue to be successful, we need to carefully plan all our equipment purchases. And like many of our clients, we do keep some of our equipment longer than what's recommended by manufacturers. But when it's time, we carefully select the right machine for the job at hand. We also select machines that will last. 

Is it time to consider replacing your business computers?

So, you’re a small business owner and confident you’re on the path to success. You’ve defined your target market. Set realistic goals. Carved out your budget. Hired top talent. Even solidified your marketing plan. As a result, you’re thriving. Congratulations!
But what about your company’s computers? Sure, when you launched your small business, you researched and purchased the most current equipment available - at the time. But as new technology continues to emerge, and operating systems evolve, your hardware may not be very up to date.

Whether you’re working solo or leading a small group of successful team members, here are four reasons why you might want to consider investing in more powerful business computers:


Securing Your iPad

The Computing Center does NOT sell Apple iPads, however we do support them. iPads are by-far the most popular "pad" used by our clients and that's quite understandable. Many many software applications have iPad versions, developers understand the consistencies of iPads and take advantage of their many features. However, like all devices these days, iPads need to be kept secure. This article discusses how best to do just that.

iPads and other tablet computers are everywhere: in the coffee shop, at your children’s school, at your book club, at the department store. Chances are, you or someone you know uses a tablet computer regularly. But should you be worried about security? Are tablet computers like the iPad any less secure than a standard laptop?

Some dos and don’ts for keeping your iPad secure

Although iPad devices are safer than most, their popularity makes them an attractive target for would-be cybervillains. Since Apple has made a point of building a lot of privacy features into all of their devices and operating systems, why not use them to your advantage?