Entries by carmel

The Proper Password Etiquette

When you sign up for an online account, you are asked two main things: a username and a password. All websites you visit require a strong password… but what constitutes a strong password? Mostly, these are the basic requirements for a password: should have at least eight characters different from all your other passwords should contain […]

8 Tips in Protecting Yourself Against Identity Theft

As I way to end the Identity Theft series of blog posts, I would like to share some important tips to follow. If you haven’t already, catch up on other relevant topics such as: 4 Ways Identity Thieves Acquire Your Personal Information 9 Possible Signs of Identity Theft Your best protection against identity theft I […]

The 9 Signs of Identity Theft

Identity theft can happen to anyone; that is why you should always monitor your bank statements and credit card reports. Whether it is an account you are always using or not, always take time to routinely check. Other than that, there are some possible signs that someone may have stolen your identity. Here are 9 […]

4 Other Ways Identity Thieves Acquire Your Personal Information

Previously, I have discussed 4 Ways Identity Thieves Acquire Your Personal Information. There are more ways on getting your identity stolen. Below, I have listed 4 more examples on how other people access your personal information. Wi-Fi hacking Generally, public Wi-Fi connections are unencrypted, meaning everyone is just free to connect without any layer of defense. […]

4 Ways Identity Thieves Acquire Your Personal Information

In What Is Identity Theft?, I started discussing the basics of identity theft. I have shared examples on how data breaches affect individuals, and how cybercriminals use these personal information. So, this time, I will elaborate more on the different ways identity thieves get a hold of your personal data. Phishing The most method would be […]

What Is Identity Theft?

Identity theft happens someone pretends to be you. This person will then use your personal information will commit fraud and/or will steal from you. Personal information could mean any of the following: Full name Mailing address Email Username and password Social security number Driver’s license number Bank account number Passport number These details are tied […]

5 Common Phishing Scams and How to Prevent Them (Part 2)

In Common Phishing Scams and How to Prevent Them (Part 1), I talked about email scams and vishing scams. For this post, I will still discussing the different types of phishing scams. Think of phishing as a con game. The only difference is that the playing field is the entire Internet. You see, scammers and phishers are […]

5 Common Phishing Scams and How to Prevent Them (Part 1)

Phishing scams may appear in different forms. These scams are not solely about sending fake emails; it could be in a form of pop-ups and even phone calls. Scammers use different online techniques to defraud people.  Often times, scammers use fear as a tactic. They scare people in order for panic to arise and people […]

How to Promote Safer Online Sharing

In 2017, Mark Zuckerberg officially announced that there are officially 2 billion Facebook users.  Even until now, Facebook remains to be the top at its game.  However, too much exposure to social media can have its disadvantages. In this blog post, I will share tips on how to ensure that you are not sharing too […]

5 Ways of Risking Company Data Without Even Knowing It

Do you remember the time when Amazon experienced a data breach back in 2018? Many people are shocked to know that even industry giants become victims of cyber attacks. Owning a small business, you would think you would be more vulnerable to data breaches. Thus, it is extremely important identify to telltale signs that you […]

One partner from desktop to datacenter, who can manage and support it all—that’s OMNIPOTECH.

© 2020 OMNIPOTECH. All Rights Reserved.
Privacy Policy | Sitemap

Powered by: LinkHelpers