Tuesday, November 24, 2020

Protecting Your Online Reputation

 Protecting your online reputation is one of the most important things you can do in the ever-evolving technological world we live in. If your online reputation is unfortunately tarnished it will take a lot of time and effort to repair the damage. I am going to give you some tips to help protect your online reputation.

When it comes to online reputation, one of the main ways people damage their online reputation is through social media. Protecting your personal reputation on social media is probably one of the most important things you can do in today’s world. Not only does your family and friends see what you post and comment on, but now most employers access social media of potential employees to see if they are a good fit for their companies.

Here are a few ways to protect your reputation on social media:

1.       Using Two-Factor Authentication- Two-Factor Authentication is not only a great way to secure your email account, but also a valuable tool to securing your social media. Having multiple authentication layers gives you the extra security needed to keep your mind at ease when using a multitude of social media platforms. The biggest complaint with 2FA is how time consuming it may be for users, but this time factor may be just one more element to deter hackers from accessing your account.     

 

2.       Set Your Account to Private - Setting your social media account to private limits who has access to your content. With a private social media account, you are in control, and you dictate who has access to your account, post, and pictures. Private settings enable you to deny fake and suspicious accounts, and people who wish to cause harm to your reputation.

 

3.       Be Careful What You Post- Posting funny pictures or Gifs may seem like a good idea at first, but it can easily cause irreparable damage to your reputation. It is especially important to try and look at things from all angles and ask yourself if this may cause harm or offend anyone before you post it. When posting articles, it is in your best interest to research the information beforehand. There are a plenty of articles that are posted with misinformation just to obtain a following. If you post articles with false information you not only are subject to steering other followers in the wrong direction, but you can also harm your reputation. Always do your own research to see if the articles are real or fake.

 

It is important to always stay on top of your online reputation to reduce the risk of something or someone damaging it. Always stay vigilant and continue to research new information on how to protect your online reputation.


Tuesday, November 10, 2020

Security Suite Review and Recommendation

 

Security Suite Review and Recommendation

Stephanie Johnson

 

Dell’s Fast Access, Face Recognition by iNFINITE Studio LLC>: While a firewall protects unauthorized use from internet intrusion, the face remembering technology reduces the need for passwords and pin codes which can easily be more hackable.

 

HTTPS (Hyper Text Transfer Protocol Secure): This is the secure version of HTTP. This technology is encrypted to increase security of data transfer.

 

HTTP (Hyper Text Transfer Protocol): This protocol allows resources such a HTML documents to be obtained. It is the foundation of exchanges on the web.

 

WPA2 (Wi-Fi Protected Access): This is the recommended password type for WIFI routers and allows for custom password setting.

 

Three Different Security Suite Software Programs

1.       Endpoint: Endpoint provides security services with MACS and PCs in mind. They make a good point that most antiviral software and protection software are geared toward PC users, with little regards to MACS and other apple products.

2.       Norton LifeLock: Offers a membership to secure devices and passwords with a specific emphasis on credit care and identity theft.

3.       Arctic Wolf: Offers a combination of technology, features and teams of people to provide the best security technology in the face of evolving threats and hacks.

 

If I were to choose one of these programs, I would select Endpoint. The main reason being I frequently use apple products on a regular basis. In fact much of my financial information and purchases are done through the apple music or apple pay app. Knowing there is  security suite out there desiring to keep up with protecting both non, and apple users, puts my mind more at ease. I also appreciate that endpoint looks to assure that each device connected to a company’s network or used by any employees, can be safely monitored, and protected as well. I feel that Endpoint Security truly has all of its bases and customers covered and looks to deliver the best in security and peace of mind for its users.

Protecting Your Online Reputation

 Protecting your online reputation is one of the most important things you can do in the ever-evolving technological world we live in. If yo...