The Risks of Online Gaming & How to Stay Safe

Whether you’re an all-out “gamer” or simply enjoy a few hands of online poker every now and then, all that online gaming fun comes with its own set of risks.

WThe risks of online gaminghen we turn to the internet for gaming entertainment often the last think we think about (or want to think about) is the fact that we’re opening ourselves up to potentially be the victim of scams, identity theft or viruses.

If you spend any time gaming, then take a few minutes to read through the risks below and how to avoid them!

The Risks…

  • Large, online gaming communities may feel “friendly” but the truth is, you’re surrounded by strangers, which means you could unthinkingly share too much personal info like your full name, email address, age or even online passwords.
  • When you download “cheats” you could actually be downloading corrupt software that contains viruses.
  • Illegally downloading games could lead to severe penalties or even prosecution.
  • Getting rid of old game consoles, computers, mobile devices, etc. that still contain your personal info can put you at risk of identity theft.

Ok, now that you recognize some of the risks of online gaming, let’s go over how to protect yourself so you can keep on gaming without the worry.

How to Stay Safe…

  • Make sure you have updated antivirus software.
  • Only play authorized, legitimate versions of games that you have obtained/purchased legally and from the proper sources.
  • Choose a secure username that does not reveal personal info.
  • Create strong and long passwords.
  • Never share personal info with other players.
  • Keep your game software up-to-date.
  • Delete all personal info before disposing of or selling unwanted gaming devices.
  • Establish rules and guidelines for your children when they’re playing online (and model good behavior)!

To protect yourself even further, consider setting up a VPN so that you can mask your location and identity and never worry about online gaming hazards again! For more information about getting a Virtual Private Network, click HERE.

 

Risks & safety measures inspired by this post on GetSafeOnline.org.

10 People Who Need a VPN [infographic]

Do you need a VPN?

We’ll get to the answer to that question in a minute, but first, let’s back it up.

Do you know what a VPN is?

VPN is a Virtual Private Network. And, it’s an effective, safe and easy way to add security and privacy to both public and private networks. Basically, it enables you to freely use and browse the Internet without the fear of putting yourself at risk of cybercrimes, hackers, or geographic restrictions.

As you can imagine, having a VPN can be really beneficial, but there are specific groups of people who really can benefit from having a VPN.

If you’re wondering if you are a one of them, check out the infographic below to find out!


Click HERE to view infographic in a new page.

 

For even more info about how a VPN can benefit you, visit GhostPath.com.

What The Big Dogs Are NOT Telling You About The Security Of Your Mobile Device

Screen Shot 2014-09-02 at 10.57.29 AMEver feel like you’re not getting the whole story?

Well, we’ve done some digging and it turns out that there’s quite a lot that the big dogs (namely Google and Apple) are NOT telling you about the security of your mobile device.

According to a recent Unisys study on workplace mobile habits, it was found that many business users access important corporate data using non-secure methods, like public WiFi. Plus, an increasing number of employees are accessing their workplace’s business applications on their personal devices, putting both themselves, sensitive data and their company at risk.

And worse, most people don’t give a second thought to the security of their devices before logging on at a WiFi hotspot or checking their email using mobile data.

Here are some enlightening facts about our mobile device habits & security:

  • By 2020 there will be 50 billion (yes, with a b) internet-connected devices
  • 51% of organizations have experience data loss in the last year from non-secure device usage
  • 32% of Americans say they prefer to use simple passwords; a practice that puts you & your data at risk
  • In a recent media company security breach, it was uncovered that 3,000 users had the password “123456” and 2,000 users used “password” as their password

In order to better protect yourself, your data & your mobile device, get a VPN (virtual private network), which will encrypt your data and protect your privacy no matter what device you use to connect to the Internet.

 

This post was inspired by this infographic.

7 Rules for Safer Online Shopping

For most people online shopping has become the norm.

Our busy schedules prevent us from trekking to the mall every time we need something, so instead we visit online retailers to fulfill our shopping needs.

Safe online shopping

But, not all online shopping destinations are created equal, and while many sites are trustworthy and legitimate, there are a number of fake online retailers that are just waiting to rip you off.

Luckily, a little online shopping savvy can go a long way to protecting you, your money and your identity.

Read through our online shopping rules below to keep yourself safe online.

  1. Stick to sites that you know & trust. Instead of starting your online shopping with a search engine, begin at a trusted retailer like Amazon, Target, Lowe’s or Macy’s. Search engines can lead you to places that are not trustworthy, especially if you venture past the first page or two of search results. Also, check the spelling of the site’s name (Amazon.com versus Amazn.com*). Many “copycat” sites try to get your money by looking “familiar”, and check the top-level domain as well (Amazon.com versus Amazon.net*). *These are fictitious examples.
  2. Use credit cards. Credit cards tend to be the safest option for online shopping because you have recourse. If an ordered item is never delivered or you find fraudulent charges on your card, the credit card company will work with you to remedy those issues and get you your money back. But, if you use a debit card or give access to your bank account, it can be a lot more challenging to get your money back after you fall prey to a scam. Check your statements regularly, and keep an eye out for suspicious activity.
  3. Keep a paper trail. Whenever you make purchases online, be sure to save any and all documentation that you receive via email in an email folder or, better yet, print hard copies of receipts, terms of sale, product descriptions, and any emails that you exchange with the retailer. Again, this will be helpful and necessary should you find yourself the target on an online shopping scam.
  4. Only shop with the “lock”. Any time you’re about to make an online purchase, look for the lock. Make sure that the site has SSL (secure sockets layer) encryption installed. You can determine if it does because an SSL url will begin with https:// (instead of http://). Typically, a little lock icon will also appear next to the site’s url or in the status bar; another indication of a secure site.
  5. Shut down your machine. Do you typically leave your computer running and connected to the Internet 24/7? While that may seem like no big deal to you, it means that you’re leaving your machine open to cybercriminals all day and night. This gives hackers the opportunity to infest your system with malware and commit cybercrimes. Instead, after making a purchase, turn off your computer and protect yourself and your money!
  6. Don’t overshare! Only fill out the necessary (i.e. “starred”) information when making on online purchase. No online retailer needs your birth date, social security number, or other unnecessary personal data to complete your transaction. Don’t make it easy for online criminals, instead be cautious, don’t over share, and you’ll protect yourself from identity theft.
  7. Use a secure connection. Don’t conduct your online shopping while using unsecured public WiFi. This is an open invitation to hackers, peeping Toms, and identity theft. Instead, wait to make online purchases from a secure network like your home or place of work.

If you want to further protect yourself, your money and your identity while shopping online, consider getting a VPN. For more details about how a Virtual Private Network can improve your online experience, visit Ghost Path.

The Actual Time It Takes Hackers To Crack a Password + Celeb Phone Hacking

How long does it take to break a password?Do you ever wonder how secure your passwords are?

In light of the recent celebrity phone hacking scandal which resulted in revealing pictures of 100 celebs being posted and shared online and via social media, you’re probably wondering how secure your own passwords are.

The hacker, in this case, “took advantage of a security flaw in Apple’s online backup service, iCloud. Many online services lock someone out after several unsuccessful attempts to log in, but not Apple’s Find My iPhone app and iCloud. That has been changed by Apple in the aftermath of the nude celebrity photo scandal. But with unlimited guesses, a computer program can generate and test thousands of potential passwords until an account is entered. It is called a brute force attack. The tendency of many people to choose weak passwords and to use the same password for each service helped. Once a celebrity’s Find My iPhone app password is discovered, the same password often can access iCloud. People might never know their accounts have been compromised.” (quote from CNN.com)

With that in mind, if your passwords resemble something along the lines of “123456” or “password” or you use the same password for all sites, you’re putting yourself unnecessarily at risk.

Smart hackers are adept at breaking codes in little time, and when you use a simple or common password, you’re opening yourself up to be the victim of online crime.

Here is the actual time it take a hacker to break a password:

  • Lowercase, 6 characters = 5 minutes
  • Lowercase, 9 characters = 2 months
  • Uppercase & Lowercase, 6 characters = 5.5 hours
  • Uppercase & Lowercase, 9 characters = 88 years
  • 6 characters with numbers & symbols = 8.5 days
  • 9 characters with numbers & symbols = 19,985 years

As you can see, adding a length and complexity to your passwords pays off BIG TIME.

Here’s a little tip, instead of using simple words for your passwords, use phrases. For example: “Time flies when you’re having fun!” becomes “TFlyzwhenurhavinFUN!”

A password like that won’t be cracked for millennia! 

And, be sure to use a different password or password variation for every site with a secure log-in.

For extra protection, look into a Virtual Private Network to protect your data and privacy on all your devices, anywhere in the world! Read more HERE.

For the full scoop on the celebrity phone hacking scandal, watch the video below.

Screen Shot 2014-09-05 at 10.38.23 AM

 

This post was inspired by an element of this infographic.

Back To School Online Safety Tips + Video

In between back-to-school shopping, end of summer activities, and gearing up for yet another school year, it’s important to talk to your kids (no matter what age!) about being safe online.

Screen Shot 2014-08-11 at 11.56.51 AM

Over the summer, warm weather, vacations, camp, and playdates keep kids busy (and offline), but the school year means that the Internet will yet again play a major role in their lives as they do homework, study, and do research for school projects. And, the more time they spend online, the more vulnerable they are to being preyed upon by cybercriminals.

To ensure that your kids are well-prepared for a safe and productive school year, use these guidelines below to discuss smart online practices. Then, watch the “Online Safety Tip” video with them — it covers some important topics, too!

1. Don’t Talk To Strangers Online.

This may seem like a given, but many kids view the Internet as a safe, protected place. And, because of that, they can often over-share personal data like their name, age, address or passwords. Teach your kids the importance of staying vigilant even when online, and you’ll protect not only them, but your whole family, from malicious threats.

2. Don’t Post Anything You Wouldn’t Want Your Parents & Teachers To See.

A great rule of thumb is to teach your kids not to post or share anything online that they wouldn’t feel comfortable with you or their teachers seeing. Even if they think they are sharing something in a private, closed forum, you never know who might “share” it, and who may end up seeing it in the end!

3. Use Long & Strong Passwords.

Inform your kids about the importance of using long, strong passwords for all their accounts. A hacker can crack a 6 letter, all lower case password in mere minutes. Instead, encourage them to use passwords that are 8+ characters long and include a combination of upper and lower case, numbers and symbols.

4. Monitor Online Conversations.

It’s essential to keep tabs on your kids’ online conversations via IM, email and social media. For this, you can use parental control software and also talk to your kids about appropriate vs. inappropriate online discussions. A sit-down family chat around the dinner table will do wonders!

5. Make Sure All Devices Have Security Measures In Place.

Kids access the internet in a variety of ways and at a variety of locations. That’s why it’s vital to consider putting safety precautions in place that will protect them in as many instances as possible. Install antivirus software with a strong firewall, and consider using a VPN to further protect your data and identity from cybercriminals.

Online Safety Tips: Send Kids Back-To-School With Cyber-Security

For more info about using a VPN to protect you and your children, check out GhostPath’s services HERE.

How To Surf The Web Anonymously

Screen Shot 2014-05-08 at 3.01.18 PM

Have you heard that nearly everything you do or create on the Internet gets recorded somewhere, somehow?

Meaning that for every blog post you write and every photo you share, there’s a copy of it somewhere on the Internet. It doesn’t matter if you erase it, a copy will still be there for people to find. Not to mention the fact that our searches, sites we visit and other activities are tracked, too.

But what is more unsettling is that even if you just visit a particular Web site, you are often unknowingly giving out your personal information, such as your current location, what device you are using, and even where you go to after that. Kind of creepy, right?

Well, it gets worse…depending on where you live, this data may then be collected, sorted, analyzed, and even accessed and used by the government and other parties.

But, don’t worry — there is something you can do about it!

There are now Web services that allow you to browse anonymously. These services essentially act as the middle man between you and the Web site that you want to visit. This means that the Web site will not gain access to your private, personal information.

You have to remember, though, that while the destination Web site will not see your personal information, the “anonymizer” service, itself, may be keeping server logs that could record your data…and these logs could be subpoenaed. So, be sure to look for an anonymizer service that does not keep logs!

If you’re worried about protecting yourself and your data online, we’re here with some helpful solutions.  Read on to learn how to surf the Web anonymously.

Disable any extensions

Anonymous browsing services will protect you from people who have physical access to your computer. This means it will not leave anything about your history, and it will delete any cookies and private data when you close the browsers. Google, for example, has the Incognito mode for Chrome browsers.

However, there’s one more reason for you to use Incognito and other browser’s anonymous browsing mode: it disables any plugin or extension by default. Plugins and extensions can store private data and share these with the Web sites you visit without you even realizing it!

Without plugins or extensions running, you can be sure that Web sites cannot obtain data from them.

Get a second browser

Chrome, Firefox, Internet Explorer, Safari and other well-known browsers are available for free. Even if you have a favorite browser for your daily activities, it makes a great deal of sense to use a second browser for sites that you want to visit anonymously.

By second browser, we mean a browser that you do not use to open e-mails, access your social media accounts, and do your online shopping, among other usual activities online.

Why?

Because some anonymizer services – which may include those of your favorite browser – could still leave cookies on your machine, which could be used to find out who you are.

Use a Web proxy

If you only wish to anonymize select activities (and if you do not mind the slow speeds), you might want to check out Web proxies.

All you need to do is go to a Web proxy site, enter the URL you want to visit, and voila! You’re there…anonymously!

Be reminded, however, that some content may not display when you use a Web proxy. Forms may also not get submitted, such as when you are logging into your Web mail service.

A better option would be to use manual proxy servers that work like a Web proxy, but in this case, you will need to set your browser to use the proxy’s IP address.

Do not login

You’ve probably noticed that today there are countless sites that require you to use (or create) a username and password in order to read a complete article or use other functionalities of the Web site. Or, perhaps, they ask you to connect to the site using Facebook or Twitter.

Why?

Because the site wants identifying information about you.

Think twice before logging in or registering on any site with which you’re unfamiliar.

Don’t want to create a username & password, but still want access to the site?

Check out BugMeNot.com to see if they have log-in credentials that you can use instead.

Use TOR

TOR is short for The Onion Router.

What it does is simple: your browser will be performing the same data requests, but it will pass through a series of TOR servers, and at each of these transmissions, your data will be encrypted. This way you can access all your favorite sites without being “followed”!

Get a VPN

VPN stands for Virtual Private Network. These networks enable you to browse anonymously by hiding your IP address and replacing it with that of another server.

When you use a VPN you can rest assured that your data is secure and safe from hackers, cyber scams, identity theft and phishing email fraud.

How To Protect Your iPhone From Peeping-Toms

DeathtoStock_Wired9Did you know that any time you use public WiFi with your smartphone you are putting yourself at risk?

That’s right — public WiFi is a playground for hackers who are just waiting to access your secure data.  But, here’s the good news…

You can do something about it!

The solution in three words: Virtual Private Networks.  Virtual Private Networks, or VPNs, serve to protect you, your data and your identity in a number of ways, but the most important thing to understand about VPNs is this: VPNs secure the Internet connection you are using so that all of the data you are transmitting is encrypted.  This makes it more secure from hackers and other people who are trying to see what you are sending or receiving.

More specifically, a VPN is a collection of computers or networks that are joined together over a public network such as the Internet.  You can use a VPN to connect your data centers, or to access your home network without the need to log into a computer on the same local area network.  A VPN could also be used to secure transmissions and messages if you are using an untrusted network that is open to the public.  So, as you can clearly see, VPNs offer you a world of benefit in the smartphone era.

Here are a few more reasons why VPNs are so vital for smartphone users:

1. Having a VPN allows you to access your files and other data on your network even when you are away from home, your office or when you are traveling.  A lot of companies are letting their employees use their own devices for work, and having a VPN is a great way to keep your transactions, messages and data safe.

2. Use VPN when you are on public Wi-Fi.  Public Wi-Fi puts you at risk, and you never know who may be trying to hack into your phone.  Having a VPN on your iPhone or Android will keep you safe when you are connecting to a public Wi-Fi in a coffee shop, airport, hotel or elsewhere.

3. VPN allows you to be more secure.  If you use your smartphone for work, you will appreciate that VPN easily makes your transmission, e-mails and other communications safe, encrypted and secure.

4. If you are using your iPhone or Android to download files, you should also use VPN.  This is also true if you are paranoid about BitTorrent files.  Sometimes, just having a torrent-downloading app on your iPhone could put you at risk, but a VPN will protect you against that potential problem.

5. With VPN, you can use your smartphone to watch your favorite TV shows back home.  When traveling, you can connect to a VPN and check out your TV shows, sporting events or even watch Netflix online, even if it is restricted where you are.

How to Keep Your Children Safe Online

The Internet is an information playground. All we need is a click or two here and there to get any information we need. But it is more than just a source of information.  It is an open source of information.  The information is out there where anyone who wants to can access anything they want to at any time they want to.  That is precisely why the internet can be dangerous, especially for your children. Without proper guidance and supervision, they can be exposed to all forms of online danger.

The Growing Problem of Child Identity Theft

Over the years, there has been a significant increase in the number of children who have fallen prey to online predators. We don’t have to be shown studies; we only need to watch the news. There’s always news about a teen or two committing suicide because of cyber bullies, or children being victimized by sexual predators. What’s just as alarming, however, is the increase in child identity theft.

Identity theft is an issue we usually associate with people who have fat bank accounts and high-paying jobs. Many fail to realize, though, that children are prime targets for identity theft because it is easy to obtain their Social Security numbers without being detected for months (and even years). Children use their iPads, mobile phones and other digital devices so frequently that it makes them easy prey for thieves trying to access and use their personal information. According to a recent report, the incidence of child identity theft is now 51 times higher than that of adults.

The heart of the matter is “What can you, as a parent, do to protect your children?”

Protecting Your Children Online

One of your primary responsibilities is to keep your children out of harm’s way. You would do anything and everything necessary to make sure that your child is safe in all situations. Here are things that you can do to safeguard your child’s safety online.

  • Know what personal information your children have with them. Guide your children until they become familiar with every detail. Then make sure that you keep that personal information in a safe place. The best way to secure personal information is to memorize it. Both you and your children should know their personal information by heart.
  • Constant reminders will help. Continually remind your child about the dangers of giving personal information to strangers. Train your child to give personal information only to people both of you know personally.
  • Social network and download warnings. Warn your children of the dangers of posting personal information (especially their Social Security number, contact information and location) on social networks like Facebook and Twitter. Online file sharing (like music) and downloading of free games can also post dangers because of embedded malware used to grab private information.
  • In school: Be aware of how your child’s personal information is used. Talk to the principal and your children’s teachers. Ask them how, and for what purposes, students’ personal information is used. Who has access to those files?  How does the school maintained and disposed of their files? When you ask these questions, be wise enough not to accept answers like “Only their teacher sees their information.”  Be persistent.  Also, do not attach personal data like Social Security numbers to school forms unless absolutely necessary.
  • Be aware of your child’s online activities. This doesn’t mean you need to spy on your child! Just be sure that you get involved with whatever it is that he or she does online. Ask about online activities or updates about his or her Facebook or Twitter friends. Tell your children about online privacy, the need to have strong usernames and passwords, and the problems with spam, malware and inappropriate content. Encourage your children to be open with you, especially when there are suspicious messages or content in their email or social networking accounts. Illustrate using specific examples to help your children understand better.
  • Implement strict rules. Compose a list of rules that your children have to follow. Set a specific number of hours for online usage. Enumerate sites to which they are allowed to go. You might list examples of suspicious messages and content. You should also consider blocking some websites. Your list of rules should be posted somewhere near the computers your children use.
  • Use software or tools you have installed on your computer. Both PC and Mac computers have built-in tools that can protect your children when they are online. In PCs, you can enable “Family Safety.” Depending on your operating system, go to Control Panel and click Family Safety (Windows 8). For Macs, you can use “Parental Controls” (go to System Preferences and click Accounts).
  • Set an example to follow. Practice what you preach. They are watching you, and they will more likely do what you say, when they know that you do what you say.

Keeping your child safe online requires a lot of resolve and persistence. This shouldn’t be a problem for any caring parent. Prevent your children’s futures from going down the drain. Start protecting them now.