Admin
Mercer's Tech Moment
Welcome to Mercer's Tech Moment. 

I look forward to sharing short yet informative tidbits about current and useful technology. Take a moment and you may find something enjoyable. 


Recent Posts
In today's interconnected world, our online activities are like footprints in digital sand. Every website visited, social media post, and online transaction leaves traces that form our digital footprint. Let's take a quick look at its impact and how to manage it. A digital footprint is the record of our interactions in the digital environment. It includes the websites we visit, emails we send, and information we share online. This footprint can be passive ( collected without our direct knowledge or active participation such as searches and online purchases) or active ( created through deliberate online activity such as social media posts, subscriptions, likes/follows, messages, and phone calls).  Our digital footprint can have long-lasting implications. It can affect our reputation, privacy, and even employment. Employers, colleges, and persons which we have gained their interest(be that good or bad) may search for information about us online. As you know from yearly training, there are also FERPA and HIPPA regulations that need to be followed and complied with in order to avoid legal action or possible fines. Managing Your Digital Footprint Be Mindful of Sharing: Think before you post. Once something is online, it's difficult to erase. Even after deleting, there is still a record of it somewhere. Check Privacy Settings: Regularly review the privacy settings on social media and other platforms, opting out of settings that share more information than desired. Google Yourself: Conduct periodic searches of your name to monitor your online presence. You can also set up Google Alerts to notify you of any changes or new information about you online. Secure Your Accounts: Use strong, unique passwords and enable two-factor authentication. Delete Old Accounts: Old social media accounts may hold information that may not reflect your current self. As technology advances, the ways in which our digital footprints are used and analyzed will evolve. Keep an eye on where you walk and the digital trail you leave behind. It's crucial to stay informed and proactive in managing our online presence.
Posted by MBasye  On Mar 25, 2024 at 9:55 AM
  
In an age where data is king, ransomware has emerged as the digital world's kidnapper. This malicious software encrypts your files, holding them hostage until you pay a ransom. It's a growing threat, with attacks increasing in sophistication and frequency. The attack begins when an individual clicks on a seemingly harmless link or downloads a rouge attachment. The ransomware then springs into action, encrypting files and displaying a ransom note demanding payment for the decryption key.  Victims of ransomware face a tough choice: lost their data or pay the ransom. Paying doesn't guarantee the return of data and often funds further criminal activity. The aftermath can be devastating, with financial and reputational damage that takes years to repair. Prevention and awareness are the best defenses. Regular backups, updated security software, and a vigilant eye for suspicious emails are the shields that protect against the ransomware onslaught. By understanding the threat and taking proactive measures, we can fortify our defenses and keep our data safe from these digital predators.
Posted by MBasye  On Mar 13, 2024 at 11:45 AM
  
Today's moment focuses on two simple, yet important words: Password Security As you log into various accounts, get reminders about changing or updating your password, or have that moment of regret when you have to click the dreaded "Forgot Password?" link, you may have the question come to mind: How important is all of this? Password security often gets overlooked as not being necessary. It's a lot easier to use a really simple password for everything you have to log into, but easier regularly becomes problematic. We live in a digital age where everything from getting a coupon in your email, to social media, to online banking all requires some form of password login. We often don't think of danger from bad actors, yet, strong passwords are the first line of defense against hacking attempts and protecting our personal information. Using weak or repetitive passwords is similar to leaving your car unlocked in a public place. You may not care if there's nothing important in there, but it's definitely not safe if your social security card, credit card and phone are on the seat. Strong passwords are the lock and alarm that may help keep your information and finances safe. A bad actor may not always be able to be stopped, but that doesn't mean you need to make it easier on them.  Follow these guidelines to create strong passwords: Use at least eight to 12 characters. Use a combination of letters, numbers, and symbols. Use at least one uppercase letter. Use a different password for each of your accounts. Use uncommon, unusual words. Draw from song lyrics, quotes, or popular phrases to make the password more memorable. For example, using the first two letters of each word in the sentence, “Northumberland County is my favorite school system,” could yield the password: NoCoismyfascsy24!.
Posted by MBasye  On Feb 26, 2024 at 2:47 PM