Cyberspace, Let’s Stay Safe

Every day we engage in the world of cyberspace, and consequently, there are risks associated with security breaches for people and businesses all over the world that are appearing in media headlines. These attacks reveal the vulnerability of our data and the lack of robust security strategies in organizations, regardless of size. 

Overall, data security is vital to the well-being of businesses. Operations and records require protection. If compromised, reputation and fiscal damages occur.

In this article, we’ll look at ways iStratus protects you and your data:

It’s Why We Encrypt

In today’s world, people increasingly conduct their work on mobile or personal devices. Do we ensure our app is trustworthy and secure? Yes, all data is stored in an encrypted format and remains encrypted whenever it is stored in the ‘Password Vault’ or during migrations.

Begin with Strong Passwords

Create passwords that are long, complex, and varied. Specifically, passwords must be at least 8 characters long, include a mix of letters, non-sequential numbers, special characters, and ideally be as nonsensical as possible. In a point-blank attack, hackers try combinations of millions of dictionary words and numbers per second until one brings up a hit.

Implementing strong passwords is the first step to take in strengthening security in this space, to protect and prevent access to sensitive and valuable data. We recommend changing passwords at least every 90 days. Avoid using passwords like “1234567” or “Password1,” or having them written down for people to find.

Delete Any Redundant Data

We suggest deleting information and files you don’t use or need to access regularly. Applications like ours deal with sensitive information constantly as an essential element of our business. With appropriate information deletion or disposal mechanisms in place, this helps prevent stale data from being forgotten about and stolen at a later date. Erasing or otherwise modifying redundant data to be indecipherable also ensures it’s not stashed away somewhere it shouldn’t be.

Update Operating Systems and Applications Regularly

Having the most up-to-date iOS or version of an app is often the best way to ensure data is adequately patched and protected. Security with iStratus is regularly revised to ensure encryption is functioning adequately. We always recommend having the most recent update available. Since hackers and phishers are constantly adapting their approaches to exploit weaknesses in earlier software, it is advisable to update these applications frequently as possible.

Back-up Your Data Habitually

To this end, it also pays to back up your data frequently. It is not new information that this should already be a crucial part of your own IT security. With secure backups in place, you can survive essentially everything from accidental file deletion to bug-lockdowns.

Secure ALL Social Media Applications 

Instagram, Twitter, and Facebook are fun and engaging ways to communicate with all networks these days. However, to continue safely, it’s recommended you review the privacy settings of each account periodically to protect the privacy rights of any information purposely or inadvertently shared. 

It’s important to know who can see what, where, and which platform is sharing what data you have and with whom.

Check the Privacy Policy of Apps

iOS applications automatically enforce regulations for all users through their HTTPS, but the same cannot be guaranteed for Android apps. 

It’s best to either check out the privacy policy or inspect the website for an official stamp from a data protection organization. 

iStratus, as we’ve expressed repeatedly applies encryption to secure and protect any data you send online from hackers, network snoopers, and also third parties. We do not store or share your information anywhere.

Be Vigilant Against Phishing or Similar Scams

Databases with personal information are a goldmine of information. A phishing scam relies on tricks into replying or clicking on a link in a bogus email or text message to spread malware, steal credentials, or even worse. We all receive these kinds of text messages daily. 

The reality is, Cybercriminals will use unprotected information to attain fraudulent loans, steal identities, and infect entire networks, crashing them entirely. We don’t envision this happening with iStratus, however 

“A well-informed mind is the best security against the contagion of folly and of vice. The vacant mind is ever on the watch for relief, and ready to plunge into error, to escape from the languor of idleness.”

~ Ann Radcliffe (1764 – 1823)

What’s The Best Solution? Prevention!

In current times, always be on the safe side and never click on links in COVID-19-themed emails for example. You can typically detect a phishing scam by reading the sender’s address. However, as life is often hectic, most of us would be none the wiser at first glance. Be aware, iStratus won’t ever send you emails. Another clue is often errors appear within text from automated bots. 

Vigilance is the key essential. 

Live life and roll well with iStratus.

Raising Internet Savvy Kids & Teens

As parents, we want to do everything we can to keep our children safe and out of harm’s way, from looking both ways when crossing the street to always wearing a helmet when cycling. However, are we doing enough to protect them from bullies, predators, and stumbling across inappropriate content online?

Let’s face it, the internet is here to stay and with an ever-increasing amount of teens using apps on their smartphones, there’s always time to have regular discussions regarding cyber safety, if you don’t already provide those reminders to your loved ones. 

In this article, iStratus provides some handy tips for your parenting toolkit.

Be Open and Honest About Online Activity

It’s important to be informed. Have discussions with your kids about what apps they are using, what they are reading, watching, and who they are communicating with online – and keep the conversation going. Use iStratus to create a list, and look at them together. It’s essential to always remind them that this may be different for other parents and their children.

The bottom line? Listening and reaching an agreement about what is right for your family is what matters most. The internet and smartphones are everywhere, there’s no avoiding them. 

We need to reflect on our online reputation too if we want our kids to consider how they behave, interact with people and represent themselves in a public forum. They must always remember that these spaces aren’t private.

Who Are Your Children’s Friends Online?

As grown adults, we recognize that people aren’t always who they say they are online. Truthfully, young people can be alarmingly naïve about whom they are chatting to or connecting with if they are not taught to be cyber-wise from the onset.

iStratus suggests, becoming friends with your child’s social media circles and ensuring you monitor posts. There may be resistance to this but that can be a set condition for them to have online access.

Similarly, Stay #SocialMediaNetworkSavvy

Educate yourself on what social media networks and apps your children are using and use them as well. Remind your kids regularly about the privacy settings and reporting mechanisms on social networks. And being aware of what constitutes online bullying – both as a perpetrator and a victim.

Every photograph and personal detail that is posted and shared on social media and the internet contributes to someone’s digital footprint. The biggest risk with this is that once information is shared publicly, it can be used in untoward ways not necessarily expected.

Assume that anything that is put online is permanent (it can be deleted, but not necessarily before others have seen it or saved it). As parents, it’s our job to encourage our children to ask themselves before posting anything online if the information being shared (for example, their name, phone number, address, name of school, email) or a photo is something they would give a stranger. If the answer is no, then don’t post it.

If your child uses social networks, be sure they know how to:

  • Report inappropriate and/or offensive posts
  • Block someone
  • Keep posts set to “Private Between Friends” and not “Public.”

Use iStratus filing and folder systems to stay in control of your digital footprint, keep it all secure by only sharing important or personal information with people known and trusted.

Protect Privacy: Keep Locations Private

Most apps, networks, and devices have geotagging features, which reveal your whereabouts publicly and can lead someone directly to you. These features should be switched off for obvious privacy and safety reasons. Digital photographs also contain metadata (referencing the time, date, and GPS coordinates), which may reveal more than planned. Some social media platforms automatically hide or remove these details, but not all do, thus investigate these settings and be fully aware of how much info is being shared.

“The definition of privacy has changed – kids are more comfortable baring their souls online, but they don’t think about the consequences or permanence of the Internet.”

~ Elizabeth Wilkins, Editor, at Empowering Parents.com

Leading by Example is Key

Modeling the kind of positive online behavior we would like our children to use is fundamental. If they witness influential adults in their world being cautious and respectable while online, then they are more likely to follow in those footsteps. And, yes, this also includes limiting your own screen time.

Finally, the point is not to instill fear in our children or prevent them from experiencing the many educational, social, and entertainment benefits of the Internet, Social Media, or Apps. Rather, we must provide them with the skills and knowledge they require to make the most of the pluses while avoiding the dangers. 

There’s no doubt we’ll all sleep better by regularly discussing these points upon our checklists today.

Live life and roll well with iStratus.