Tuesday, January 29, 2019

Top 10 Internet Safety Rules & What Not to Do Online

content/en-us/images/repository/isc/2017-images/internet-safety-tips-img-23.jpg






















1. Keep Personal Information Professional and Limited

Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.

2. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available. These settings are sometimes (deliberately) hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.

3. Practice Safe Browsing

You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don't even give the hackers a chance.

4. Make Sure Your Internet Connection is Secure

When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes you have no direct control over its security. Corporate cybersecurity experts worry about "endpoints"—the places where a private network connects to the outside world. Your vulnerable endpoint is your local Internet connection. Make sure your device is secure, and when in doubt, wait for a better time (i.e., until you're able to connect to a secure Wi-Fi network) before providing information such as your bank account number.

5. Be Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust.

6. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don't forget them. A strong password is one that is unique and complex—at least 15 characters long, mixing letters, numbers and special characters.

7. Make Online Purchases From Secure Sites

Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections. As Boston University notes, you can identify secure sites by looking for an address that starts with https: (the S stands for secure) rather than simply http: They may also be marked by a padlock icon next to the address bar.

8. Be Careful What You Post

The Internet does not have a delete key, as that young candidate in New Hampshire found out. Any comment or image you post online may stay online forever because removing the original (say, from Twitter) does not remove any copies that other people made. There is no way for you to "take back" a remark you wish you hadn't made, or get rid of that embarrassing selfie you took at a party. Don't put anything online that you wouldn't want your mom or a prospective employer to see.

9. Be Careful Who You Meet Online

People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online social life as you are in your in-person social life.

10. Keep Your Antivirus Program Up To Date

Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it's to date. Be sure to stay current with your operating system's updates and updates to applications you use. They provide a vital layer of security.

Keep these 10 basic Internet safety rules in mind and you'll avoid many of the nasty surprises that lurk online for the careless.


Credit for this article goes to






Tuesday, January 15, 2019

The best Chrome extensions to boost your productivity right now

Thanks to the emergence of Web-based tools and services, most of us work primarily in the browser these days, and that means it’s our main productivity center.

Google Chrome is far and away the most popular browser around and it supports a huge number of extensions, which are essentially plugins that add functionality to your browser. There are a ton of them that can help you get more work done in short order, while consuming less system resources than standalone apps and integrating more tightly into your workflow.

We’ve rounded up 28 of the best extensions to help you take notes, plan your day, tame your email inbox, research like a pro and stay on top of your workload, all without leaving your browser.

Tip: Although these are designed for use with Chrome, you can actually use them with Opera too.

Let’s dive right in, shall we?

Writing and note-taking

Whether you’re preparing a report, drafting an article or following a lecture, it’s a good idea to keep a note-taking app within easy reach.

Google Keep for taking notes and to-do lists



As a journalist, I’ve tried loads of tools for note-taking, but over the past year, I’ve stuck with Google Keep. It’s fast, lightweight and does exactly what I need it to — add notes quickly with just a click of a button in the browser.

I prefer Keep over alternatives like Evernote and Microsoft OneNote because it’s less cluttered and lets me focus on jotting down ideas in a jiffy, rather than offering a bevy of features for formatting text and extensive note organization.

That doesn’t mean Keep is a one-trick pony: The extension lets you save pages, images and text from the context menu on any page, and also lets you add notes to them. If you’re ready to write up a storm, you can always fire up the full-fledged app, which lets you jot down text, lists and reminders.

I’ve also grown fond of the Panel view for Keep extension, which opens up the app in a small window that you can work on, even with a separate browser tab open.

➤ Google Keep -link

Papier for brainstorming







Papier is a dead-simple note-taking tool that wins points for being more readily accessible than any desktop app.

Simply install the extension and open a new tab, and voilĂ , instant notepad. It automatically saves your work, allows you some basic formatting and supports keyboard shortcuts. Plus, there’s no clutter to distract you: All you see is a blank page ready to accept your notes and grand ideas, in bright white or a more pleasing night mode.

It’s a single page notepad that does away with a file storage system, so it feels more like a place to freely scribble thoughts than save and retrieve separate documents. Papier also offers basic rich text formatting that you can enable with keyboard shortcuts and carry over to Web-based text editors.

While it may seem rather light on features, Papier is great at getting out of the way to let you put your ideas on a page, thanks to its nearly invisible interface. That’s useful for when you need to brainstorm, quickly jot down a fleeting thought and everything in between – all without having to look around for a notepad beyond your browser.

➤ Papier -link

Task management
Got a lot of tasks to accomplish? List them in your browser and you’ll find it easier to track them through the day.

Jot for preparing short to-do lists

Jot is at once a simple and beautiful replacement for your new tab page. It displays a lovely new background image every time you open a tab, and lets you list your most important to-dos or short notes for the day in a large, legible font. To retrieve them, all you need to do is launch a fresh tab.

If you don’t need all the bells and whistles of advanced task management extensions, Jot is a great choice that looks better than the rest.

➤ Jot -link

Momentum for plotting your day




Momentum adds a bunch of useful widgets to your new tab that should help you plan your day easily and reach your immediate goals.

You’ll find a clock, the local weather, a to-do list and a customizable shortcut menu of links floating above a beautiful background image that changes every so often.

All the elements in the interface can be tweaked to your liking. What’s especially neat is the ‘focus’ widget, which sits front and center, and displays your main goal for the day.

$2 a month nets you even more customization options, the ability to sync items from apps like Todoist and Wunderlist, and a rotating ‘focus’ widget that pulls in tasks from your to-do list.

➤ Momentum -link

Todoist for scheduling tasks




If you haven’t yet settled on a default to-do list manager and use Chrome often, Todoist is worth a look. Its extension puts a powerful task list in your browser toolbar and offers a ton of features in a small space.

For starters, you can simply type to add a task or turn the active tab into an item on your list. It also lets you set a priority and enter a due date or recurring date for each to-do. Plus, it displays your schedule spanning the next seven days in a beautiful interface.

The ability to add and scan your to-dos in one place makes it a better choice than Wunderlist, which offers separate extensions for each function. In addition, Todoist pairs with a ton of apps through Zapier to do things like adding your tasks to Google Calendar and creating to-do items from starred messages in Slack.

The only downside to picking Todoist is that certain essential features like tasks reminders and comments require a subscription, which will set you back by $29 a year. Still, it’s not a bad deal for an app that syncs across devices and offers plenty more features for its asking price.


➤ Todoist -link


Taco for staying on top of projects




If you already use several apps to manage your tasks and projects, Taco’s new tab replacement can help you stay on top of them all.

Taco connects to a range of services like Wunderlist, Evernote, Asana, Basecamp and Trello to pull all your projects into your new tab. You can then prioritize them by dragging and dropping items in the ‘Up Next’ list, and act on them without having to open each app.

It’s powerful enough to filter your tasks by project, yet simple enough to use just like a normal to-do list. I love using Taco because it helps me make progress on both my work projects as well as my daily errands.

➤ Taco -link


All Credit goes to https://thenextweb.com/apps/2017/10/19/the-best-chrome-extensions-to-boost-your-productivity-in-2017/

Tuesday, January 8, 2019

10 Cybersecurity Travel Tips when traveling



10 Cybersecurity Travel Tips For The Holidays



1.Bring your own power adapters and cords

Charging your devices with unknown power adapters can create vulnerabilities.

“Cyber thieves may install malware onto hotel lamps, airport kiosks and other public USB charging stations,” the OCR states.

If you must charge your device on a foreign charging station, power it down before plugging it in.

2. Back up your electronic files

Back up your contacts, photos, videos and other data using another device or the cloud (just make sure those backups are encrypted).

3. Install security updates and patches

Out-of-date operating systems and software represent potential vulnerabilities on your devices, and it can be difficult to install updates while traveling.

4. Create new passwords and change passwords

The OCR recommends changing passwords for trips and changing them again upon return. It also suggests adding multi-factor authentication if possible. All the usual password standards apply.

5. Lock devices down

Most smartphones, laptops and tablets come equipped with security settings that will enable you to lock the device using a PIN or fingerprint ID. Th OCR suggests healthcare officials do this on every available device.

“This will be the first line of defense against a security breach.”

6. Remove or encrypt sensitive information on mobile devices


If you don’t need to access sensitive information on your trip, don’t bring it! Of course, encrypt any device you bring. The OCR urges full-disk encryption for laptops.

7. Turn off WiFi auto-connect and bluetooth

Connecting to a public WiFi network is dangerous and less secure than connecting to your mobile network like 4G or LTE.


“Always log into your work networks through VPN, and only use sites that begin with “https://” when online shopping or banking,” the guidance states.

8. Ensure physical security of your devices

If you cannot physically lock devices in your hotel room safe or other secure place, take them with you.

“There are no good hiding spots in your hotel room,” the OCR states. “Many breaches occur because a device was left unattended when an opportunistic thief struck.”

9. Create unique PINs

Don’t use the same PIN for the hotel safe and your mobile device (particularly if your mobile device IS IN that safe).

10. Use geo-location cautiously


Most social media sites automatically share your location when you post things, telling thieves you’re away from home.


Safe travels!


All Credit goes to http://bit.ly/2CSeIVt