Emergency Water Storage in California: A Thirst for Preparedness

In California, the land of sunshine, beautiful coastlines, and innovative tech hubs, there’s also a critical need for awareness about water preparedness. Whether you’re considering the possibility of drought, earthquakes, or other emergencies, having a sufficient water supply is paramount for survival. This blog dives deep into the importance and methods of emergency water storage in California.

Why is Emergency Water Storage Crucial in California?

  1. Droughts: Periodic droughts aren’t strangers to Californians. With global climate change, the frequency and severity of drought conditions might increase, making water storage vital.
  2. Earthquakes: If a major quake damages water infrastructure, it might take days or even weeks to restore regular water supply.
  3. General Preparedness: In any emergency, from power outages to wildfires, access to clean water can become limited.

How Much Water Should You Store?

The general recommendation is to store at least one gallon of water per person per day for a minimum of three days. However, considering California’s unique challenges, it’s wise to plan for a two-week supply. So, for a family of four, that’s 56 gallons of water.

Best Practices for Storing Water:

  1. Commercial Bottled Water: It’s the simplest solution. These bottles are sealed and can last unopened for years. Remember to store in a cool, dark place to prolong shelf life.
  2. Food-grade Storage Containers: If you’re storing tap water, use containers made for long-term storage. Before filling, sanitize the container with a solution of one teaspoon of non-scented liquid household chlorine bleach to one quart of water.
  3. Avoid Containers that Previously Held Harmful Chemicals: Never use containers that stored milk or fruit juice as it’s difficult to clean them thoroughly, and they might promote bacterial growth.
  4. Rotate Tap Water Storage: If you’re storing tap water, rotate it every six months. Mark containers with fill dates to keep track.
  5. Isolate Storage: Store water away from gasoline, kerosene, pesticides, or similar substances. Vapors from these substances can penetrate plastic over time.
  6. Large Storage Solutions: For those who have space, consider larger tanks that can store 55 gallons or more. These are particularly handy for households with larger families or properties with landscaping needs.
  7. Water Purification: While storing water is crucial, having a method to purify uncertain sources can be a lifesaver. Consider stocking up on water purification tablets or personal filters.

Storing Water for Special Needs:

  1. Medication and Medical Needs: If someone in your household depends on medication that needs water or has special medical needs, factor this into your storage calculations.
  2. Pets: Our furry friends need water too! Ensure you store extra water if you have pets.
  3. Cooking and Cleaning: While drinking and hygiene are priorities, remember that you might need water for cooking or cleaning, especially if the emergency extends beyond a few days.

In California, where the beauty of nature is juxtaposed with its fury, water isn’t just a lifeline—it’s gold. By investing time and resources into adequate emergency water storage, you’re ensuring that no matter the circumstances, your household remains hydrated, healthy, and ready to face whatever challenges come its way. After all, it’s better to have it and not need it than to need it and not have it!

Earthquake Preparedness in California: Staying Ready in Shake Territory

Californians know all too well that they live in one of the world’s most seismically active regions. With the San Andreas Fault, among others, slicing through large parts of the state, earthquakes are a natural, albeit unsettling, part of life. Preparing for these inevitable events is essential for personal safety and property protection. In this blog, we’ll outline steps to enhance your earthquake preparedness in the Golden State.

Understanding the Risk

The first step in preparedness is understanding. Recognize that in California, no place is entirely immune to earthquakes. Some regions may experience them more frequently or with greater intensity, but the risk is statewide.

Building an Earthquake-Ready Home:

  1. Secure Heavy Items: Anchor bookcases, refrigerators, and other tall or heavy furniture to walls to prevent them from toppling.
  2. Flexible Fittings: Use flexible connections where gas lines meet appliances. This flexibility can reduce the risk of a gas leak.
  3. Safe Spacing: Avoid placing heavy objects on high shelves and keep breakables in closed cabinets with latches.
  4. Inspect Your Home: Regularly check the foundation, roof, and walls for cracks or weaknesses. If you identify any structural issues, consult a professional.

Preparing an Emergency Kit:

Ensure you have an emergency kit specifically tailored for earthquakes, containing:

  • Water (a gallon per person per day for at least three days)
  • Non-perishable food
  • A flashlight with extra batteries
  • A first aid kit
  • Essential medications
  • A multi-tool or Swiss army knife
  • Copies of personal identification and important documents
  • Cash in small denominations (ATMs might be out of service)
  • A whistle to signal for help
  • Sturdy gloves to protect your hands while moving debris

Safety First During an Earthquake:

  1. Drop, Cover, and Hold On: Drop to your hands and knees, cover your head and neck (and your entire body if possible) under a sturdy table or desk, and hold on until the shaking stops.
  2. Stay Indoors: If you’re inside, stay there. Many injuries occur when people enter or exit buildings.
  3. Stay Away from Windows: Glass can shatter and cause injuries.
  4. If Driving: Pull over to a safe spot, away from overpasses, bridges, power lines, and trees. Remain in the vehicle until the shaking stops.

Post-Earthquake Measures:

  1. Check for Injuries: Before you do anything, ensure you and your loved ones are okay. Provide first aid as necessary.
  2. Expect Aftershocks: These smaller tremors can follow the main quake. Be ready for them.
  3. Inspect Your Home: Check for gas leaks, damaged electrical wires, and structural damage. If you suspect a gas leak, turn off the main gas supply and evacuate.
  4. Listen to the Radio: Battery-operated or hand-crank radios can provide emergency updates when the power is out.
  5. Communicate: Have an emergency communication plan with family members. Texting may work even if voice calls don’t.
  6. Evacuate if Necessary: If your home is unsafe, get everyone out. Use your emergency supplies or go to a designated public shelter.

Living in California comes with its unique set of challenges, especially when it concerns natural disasters like earthquakes. However, with the right level of preparation and awareness, you can greatly increase your chances of weathering the next big quake with minimal harm. Remember, preparedness is not just a one-time task but a continuous process of learning and adapting. Stay safe, and stay prepared!

Keeping Your Emergency Kit Up-to-Date: Why, How, and When

The world is ever-changing, and so are the emergencies we might face. While we all hope never to be in a dire situation, it’s essential to be prepared. This means not only having an emergency kit but also ensuring it’s current and functional. Below, we discuss why, how, and when to update your emergency kit.

Why Keep Your Emergency Kit Updated?

  1. Shelf Life: Many items in an emergency kit, especially food and water, have expiration dates. Consuming expired products can be harmful and counterproductive during a crisis.
  2. Changing Needs: As families grow, shrink, or face different challenges (e.g., medical conditions), the supplies in the emergency kit might need adjustment.
  3. Advancements in Technology: Newer, more effective tools and devices become available that can better assist in emergencies.
  4. Weather and Seasonal Changes: The requirements for an emergency during winter are different from those in summer.

How to Update Your Emergency Kit:

  1. Inventory Check: At least once a year, make it a habit to go through each item in your kit. Check expiration dates and ensure everything is in working order.
  2. Stay Informed: Follow updates from local and national emergency management organizations. They often provide insights into the latest recommended items.
  3. Rotate Food and Water: Replace expired food items with fresh supplies, and make sure to store items that can last longer and provide ample nutrition. Similarly, store water in clean containers and refresh the supply regularly.
  4. Update Personal Documents: Ensure copies of personal identification, medical records, bank account details, and other essential documents are current. Store them in waterproof containers.
  5. Consider Power Sources: Battery-operated devices might need new batteries. Think about incorporating solar-powered chargers or portable power banks as backup.
  6. Medication Review: If you or any of your family members are on medication, ensure that you have an adequate, up-to-date supply.
  7. Customize for Your Needs: Adjust your kit based on the specific needs of your family members, including pets. For example, babies might need diapers, while elderly members might require specific care items.
  8. Educate and Train: New family members or changes in your living situation mean it’s time to review emergency procedures and educate everyone on the contents and use of the emergency kit.

When to Update:

  1. Seasonal Changes: As seasons change, so do potential emergencies. Adjust your kit accordingly.
  2. After Every Use: If you use your emergency kit, restock and replace items as soon as possible.
  3. Major Life Changes: Moving homes, the birth of a child, or health diagnoses can all warrant a review of your emergency kit.
  4. Annually: At a minimum, review and update your emergency kit once a year. Some people choose to do this at the beginning of a new year, while others might pick a specific date that’s easy to remember.

While it’s crucial to have an emergency kit, it’s equally vital to keep it up-to-date. Regular check-ins and updates will ensure that if the unexpected occurs, you and your loved ones have the best chance of staying safe and sound.

An Emerging Threat: How to Protect Yourself from “Juice Jacking”

For so many, our smartphones, tablets, and other Internet of Things (IoT) devices have become an integral part of our daily routines. These handy gadgets keep us connected and productive. However, alongside these technological advancements, cybercriminals have also upped their game, continuously seeking new ways to exploit unsuspecting users.

One such threat which has recently emerged is known as “Juice Jacking.” It’s more common than you think and has only been around since the early 2010s. In this article, we will delve into the threat of Juice Jacking, understand its course of action, highlight the associated risks, and most importantly, equip you with practical tips to safeguard your devices.

What is Juice Jacking?

Juice Jacking is a term used to describe the malicious act of compromising public charging stations or USB ports to gain unauthorized access to your devices. The term was first coined by a group of researchers who created a fake kiosk and displayed it at a cybersecurity convention to bring awareness about this potential threat.

Today, these counterfeit charging stations are commonly found in bustling areas like airports, shopping malls, and other public spaces, masquerading as innocent power sources. They’re often positioned next to public charging stations/ports. Unsuspecting victims who are eager to recharge their devices unknowingly fall into the trap. When connecting their devices to these compromised charging stations, they expose their data to potential theft.

The Risks of Juice Jacking

We’ve all been in public before with our smartphones on 1% desperately searching for a place to get a quick charge. It may seem worth the risk to opt for a public charging station if that’s your only option. However, the repercussions of falling victim to Juice Jacking can be severe and far-reaching. Here are some of the risks associated with this nefarious practice:

  • Data Theft: When connected to a compromised charging station, cybercriminals exploit vulnerabilities in your device’s software to gain unauthorized access. They can then extract your personal information, such as passwords, financial data, or sensitive documents. The aftermath of a data theft can be emotionally distressing and financially devastating.
  • Malware Installation: In addition to stealing your data, malicious actors may also inject your device with malware during the Juice Jacking process. Installation of malware can render your device vulnerable to further attacks, compromise its performance, or even grant unauthorized access to your device by remote hackers. The worst part, you may not even know if someone has downloaded malware onto your device as it can secretly embeds itself stealing critical information undetected.

Tips for Preventing Juice Jacking

Fortunately, there are some preventative measures you can take to safeguard your devices when your battery is low in public:

 

  • Carry a Personal Charging Port: Investing in a portable power bank or carrying your own charger gives you control over your device’s charging process. By relying on your own power source, you eliminate the need to use potentially compromised public charging stations.
  • Opt for Wall Outlets: Whenever possible, choose wall outlets over public USB ports. Wall outlets are generally less susceptible to compromise and offer a more secure charging experience.
  • Update Devices’ Software: Regularly updating your devices’ software is vital. Software updates often include security patches that address known vulnerabilities, making it harder for cybercriminals to exploit your device.
  • Use VPN on Public Wi-Fi: If you need to connect to the internet while charging your device in public, use a reputable virtual private network (VPN) service. A VPN encrypts your internet traffic, enhancing your online privacy and security.

Always Keep Personal Security Top of Mind

Remember, safeguarding our personal information and digital devices is an ongoing process. By staying informed, implementing security best practices, and investing in robust home security measures, we can create a safer and more secure digital environment for ourselves and our loved ones. Let’s make security a top priority, both on the go and within the comfort of our homes. Learn more by contacting us today.

Best Security Practices for Home Gun Safety

As a security provider committed to safeguarding homes and promoting the well-being of families, we understand the importance of responsible gun ownership. While firearms can be valuable tools for self-defense, it is crucial to prioritize gun safety within the home environment, especially whenever children are present.

An unsettling statistic is that firearms are now the leading cause of death for children and teens in the United States. And in 2022, there were over 20,000 deaths related to gun violence. We share these statistics not to be alarmist but to raise the awareness of gun safety. With guns in approximately 42% of households, gun safety is paramount for a secure home.

Below, we will explore the best home practices for gun safety, focusing on proactive measures that enhance security and prevent accidents. By implementing these guidelines, you can maintain a secure and protected living space for you and your loved ones.

Safe Gun Storage Options

First and foremost, all firearms within a household should be properly stored in a secure location to prevent unauthorized access or theft. It’s a tragic and far too common occurrence of children accidently finding firearms and causing injuries to themselves or others.

Implementing secure storage solutions not only ensures the safety of your household members but also reduces the risk of firearms falling into the wrong hands. Consider the following options for safe gun storage:

  • Gun Safes: A high-quality gun safe is an ideal choice for storing firearms. Look for a safe that meets industry standards and offers features such as fire resistance, thick steel plating, and secure locking mechanisms. Biometric or digital locks provide quick access while maintaining security. Additionally, opt for a safe with adjustable shelving to accommodate different firearms and accessories. Lastly, please remember to always be cautious about sharing your safe combination. The less people who know it, the better.
  • Lockboxes: You can strategically place smaller lockboxes in bedrooms or other accessible areas for quick access during emergencies. Ensure these lockboxes are hidden from view. Combination or key-operated lockboxes provide an additional layer of security, preventing unauthorized access, which we recommend utilizing.
  • Trigger Locks: Utilize trigger locks to immobilize firearms when they are not in use. These locks act as an extra precautionary measure, preventing accidental discharge and unauthorized handling. Trigger locks are widely available and inexpensive, making them an essential accessory for gun owners.
  • Ammunition Storage: Store ammunition separately from firearms. Keeping them apart decreases the likelihood of unintentional discharge and makes it more challenging for unauthorized individuals to access both firearms and ammunition. Designate separate locked storage areas for each.

Gun Safety and Training

Education and training are vital components of responsible gun ownership. Every gun owner should be knowledgeable about firearm safety. By promoting a culture of responsible gun handling, you can minimize accidents and ensure a secure environment. Consider the following steps to better promote gun safety:

  • Firearms Training: Enroll in certified courses that focus on safe handling, storage, and operation of firearms. You should also seek out qualified instructors who can teach essential skills such as proper grip, stance, and aiming techniques, enhancing your knowledge and confidence while handling firearms.
  • Responsible Firearm Handling: Educate family members about the importance of treating every firearm as if it were loaded, even when it’s not. Stress the significance of never pointing a firearm at anyone unintentionally and keeping fingers off the trigger until ready to shoot. Reinforce safe practices such as maintaining muzzle discipline and using the appropriate safety mechanisms.
  • Gun Safety for Kids: Children are naturally curious, making it crucial to educate them about the dangers of firearms. Teach them to never touch firearms without adult supervision and to inform an adult immediately if they come across a firearm. Establish clear guidelines, such as not playing with toy guns that resemble real firearms, and ensure firearms are securely stored out of children’s reach. Consider training from organizations specializing in child firearm safety education.

Protect Your Home and Keep Your Firearms Secure with a Home Security System

A comprehensive home security system goes beyond protecting your property from external threats. It plays a crucial role in ensuring the security of your firearms and preventing them from falling into unauthorized hands. By integrating your gun security measures with a reliable home security system, you can enjoy an added layer of protection and peace of mind.

Here’s how a home security system can contribute to the security of your firearms:

  • Intrusion Detection: By installing motion sensors, you can create a perimeter of defense around your property. In the event of an unauthorized entry attempt, the system will immediately trigger an alarm, alerting you and the monitoring service. The swift response helps prevent burglars from accessing your firearms and other valuables.
  • Remote Access and Alerts: Modern home security systems offer convenient features such as remote access and alerts through mobile applications or web interfaces. These tools enable you to monitor your property in real-time, receive notifications about any unusual activities, and even control your security system remotely.
  • Video Surveillance: Placing cameras strategically throughout your property, including near the areas where you store firearms, provides an additional layer of visual deterrence and monitoring. Video footage can serve as valuable evidence in case of a security breach or theft, aiding law enforcement in their investigations and increasing the chances of recovering stolen firearms.

Remember, a home security system is not a substitute for responsible gun ownership and proper storage practices. However, it serves as a powerful complement to your efforts, ensuring that your firearms remain secure and out of unauthorized hands.

When partnering with a security provider like Boyd & Associates, we will work with you to ensure all your firearm locations are carefully monitored and covered. With our integrated security systems, we will create a comprehensive defense strategy to deter burglars and help prevent your firearms from falling into the wrong hands. For more information about our security services, feel free to contact us today.

How To Tell If A Rental Listing Is Legitimate

Con artists are capitalizing on the competitive real estate market by running rental scams designed to drain money from both prospective renters and trusting landlords.

Within the last year, both the Federal Bureau of Investigation (FBI) and the Better Business Bureau (BBB) have issued warnings about this fraud type.

How much are Americans losing to real estate and rental scams? According to the FBI, losses have been steadily increasing. In 2021, the amount lost was more than $350 million — up 64 percent from the previous year.

If you have a move on the horizon, we’ve got you covered with tips to avoid rental scams. Or, if you’re a landlord or homeowner advertising a rental, learn how to tell if a potential renter is actually a scammer.

How rental scams work

Imagine finding a perfect apartment or house in your price range. Then, you hear that dozens of other people are interested too. Not wanting to miss your chance, you quickly fill out the application even if you can’t see the property in person.

It’s typical for rental applications to ask for personally identifiable information (PII), such as your Social Security number and payment information for the security deposit, so you share your details.

But then, you never hear back from the landlord. Unfortunately, this is how it often goes for victims of rental scams.

These bogus listings can be hard to spot. Scammers often steal photos and descriptions from legitimate real estate sites.

But there are a few tells you can look out for.

Scammers often rely on urgency (“You need to send us a wire transfer right now to secure this home”) or lies (“I’m in the hospital so I can’t show you the property”) to manipulate the victim into acting quickly — before they’ve had time to think it through.

Rental scams may affect landlords, too 

Landlords are also frequently targeted by rental scams.

This can happen when a scammer responds to a legitimate listing, pretending to be a prospective tenant eager to secure a lease. Often without touring the property, the scammer agrees to fill out an application and pay the security deposit via check.

In some cases, the scammer will write that check for more than the necessary amount, then ask the landlord to return the surplus to them via a peer-to-peer payment app, prepaid credit card, or wire transfer.

In other cases, the fraudster sends a check, then claims to have to back out of the lease due to an emergency, and asks the landlord to pay the money back.

The trouble is, the fraudulent check they sent will bounce a few days later, and the landlord will be out any money they “returned.”

How to avoid rental scams

Now that you’re alert to this type of fraud, you can better avoid falling victim.

Our identity specialists help our members identify and fight back against fraud, so they’ve seen all kinds of scams play out, including rental scams.

To stay safe, try these rental scam safety tips:

If you’re a prospector renter: 

  • Avoid renting a property sight unseen. Wondering how to tell if a rental is legitimate? See it for yourself. Even if the landlord or agent gives a believable excuse as to why they can’t take you on a tour, always err on the side of caution. If you are searching for a rental from a different city or state, consider finding a trusted friend or a licensed real estate agent to tour a property on your behalf in order to confirm its legitimacy.
  • Research current rental rates in the area. If it seems too good to be true, it most likely is. When a listing is priced way cheaper — or for far less than you’d expect after seeing the photos — it could be a sign of a scam. 
  • Be wary of high-pressure sales tactics. If you’re feeling rushed or pressured to share personal or financial information, just walk away — there’s a good chance you’re dealing with a scammer.
  • Work with a professional. “Use a legitimate real estate website or real estate agent to find your rental,” advises Krentz. Keep in mind that anyone can post on classified sites like Craigslist and Facebook Marketplace, so there are fewer guard rails on those sites. 
  • Look up the address, description, and images of a listing online. “Many scammers take photos and listings from legitimate real estate sites and post them as their own, but with a lower rent price,” says Krentz. If you notice a rental is listed in multiple places, and one of those listings has spelling errors, wrong capitalization, or bad grammar, it may be a sign of fraud.
  • Never pay a deposit via wire transfer, prepaid gift card, or peer-to-peer payment app. These forms of payment do not typically have the same fraud protections credit cards have and, in the case of a scam, the money usually can’t be returned to the victim.

If you’re a landlord:

  • Try to avoid renting to someone willing to lease a property sight unseen. This may be a red flag that you’re working with a scammer. 
  • Never accept a check from a new renter that’s made out for more than they owe. Don’t deposit the check; instead, return it to the sender. If someone sends you a check but then asks for that money back, be sure the check clears the bank before you return the payment. If it doesn’t, you’ll know you were working with a scammer. 

Other real estate scams to watch out for 

Real estate scammers also use a variety of other tactics to steal your money and personal information.

For example, in a foreclosure scam, a fraudster may promise to lower a homeowner’s mortgage or “save” their home from foreclosure for an upfront fee (then don’t deliver).

If you’re ever having trouble covering your mortgage, steer clear of companies that charge a fee to help consolidate or cover your loan. Instead, seek help from the U.S. Department of Housing and Urban Development.

According to the BBB, moving scams also cost Americans hundreds of thousands of dollars in 2021 — a 216 percent uptick from 2020.

In this scam, moving companies underquote then overcharge victims in the middle of a move (sometimes holding their belongings hostage until they pay an exorbitant fee). Or, they may demand payment upfront and then never follow through with their services.

One of the best ways to ensure you’re working with a credible moving company is to ask friends and family for referrals. Or, opt for a company that is open to sharing proof of registration and insurance, has positive online reviews, and completes an on-site inspection prior to moving day to provide an accurate quote. 

How to report a rental scam

If you’re a Boyd Identity Protection member and you think you’ve fallen victim to a rental scam, give us a call right away.

Our customer care team is here to walk you through the next steps to try to recover any stolen assets. 

If you’re not a member, we recommend reporting the scam to your local law enforcement, as well as the Federal Trade Commission, BBB, and FBI.

 

How Do Identity Thieves Get Your Information?

In this digital age, some identity thieves go to extraordinary lengths to steal personal information.

Many of the tactics they use are highly sophisticated, from hijacking phones from afar to creating false identities with just a few pieces of real information. Other methods for stealing personal details — such as mail theft — are less high-tech but no less concerning.

When it comes to protecting your identity, understanding what you’re up against is a good first step. So, let’s take an in-depth look at what identity thieves look for when trying to steal your data.

Plus, learn how our features — like credit monitoring alerts and dark web monitoring — can help you act quickly to minimize the damage if your details fall into the wrong hands.

Data Breaches

Unfortunately, data breaches and their fallout have become all too common. With incidents happening at such a rapid pace, it’s no wonder so many consumers suffer from “breach fatigue.”

So what’s causing these information leaks, and what can you do to safeguard your data?

You may be surprised to learn that most security incidents are actually accidents caused by human negligence or error. According to Verizon’s 2022 Data Breaches Investigations Report, 82% of data breaches analyzed over the past year included a human element.

Other breaches are the result of targeted attacks by cybercriminals. These attacks aren’t limited to big corporations; small businesses can also have data stores that are attractive to criminals. That’s one reason why it’s important to keep tabs on all of the places where your data is stored, including what businesses or services you have an account with.

What do identity thieves look for with these attempts?

If your personal or financial information is made public in a breach, cybercriminals might be interested in putting it up for sale on the dark web. From there, your details could be used to commit fraud or identity theft. Or, your information could be blended with other victims’ information to create a brand-new false identity, a type of fraud known as synthetic identity theft.

That’s one reason why we created our dark web monitoring tool. Once it’s enabled, you can enter your details for monitoring, and we’ll alert you if we find your information somewhere it doesn’t belong — such as the dark web or closed hacker forums.

Phishing and Pharming

When you’re online, phishing has nothing to do with a rod and reel. Rather, phishing happens when criminals hook you with phony emails, texts, or phone calls.

A related scam is pharming, in which users are directed to fake websites without their knowledge. For example, when a pharmer hacks into your browser and redirects you to a fake website.

What types of information might you be prompted for in a phishing or pharming attack? Any sensitive details that can be used for profit, like your Social Security number or the credentials to your bank account.

Phishers and pharmers may try to lure you by promising freebies or even by posing as your business, but with a little vigilance, you’ll be ready to spot the scam.

Any time you open an email or visit a website, be wary of urgent requests, frequent typos or blurry images, and multiple pop-up windows. If something doesn’t seem right, delete the email or close the browser window and move on.

Oversharing Online

Unfortunately, oversharing on social media can reveal more than you intended.

Take that first-day-of-school pic you snapped of your kiddos on the front porch. Is your house number visible in the background? If so, the safest bet is not to share, as your street address is considered personally identifiable information (PII).

Similarly, it’s not advisable to post from your vacation — or even from a restaurant — in real time. When you share your location, you’re also sharing the fact that you’re not at home, which can make you a target for theft.

There’s something else to consider. Everything you share online accumulates over time as part of your digital footprint. As your footprint grows, identity thieves may have more opportunities to get your information.

To combat this, consider adjusting your privacy settings to control who can see your information on social media. Think twice before accepting friend requests from people you don’t know. And consider enabling a social media monitoring feature like the one we offer, which can ping you if we notice signs that might point to account takeover.

SIM Card Swaps

Many smartphones use SIM cards, or subscriber identity modules, to identify the user and store important data. Your phone number can be transferred to a new SIM card for legitimate reasons, like when you’ve lost your phone or you’re upgrading to a new device.

But with SIM swap scams, thieves take advantage of this capability by calling a phone carrier, posing as you, and requesting to move your phone number to a device in their possession. Fraudsters have also been caught bribing phone-company employees to make the swaps on their behalf.

If the SIM swap is successful, the thieves can then use the compromised phone number as a portal to the rest of your digital life. With access to text messages, for example, a thief can side-step the extra security provided by two-factor authentication, making it easier to penetrate financial accounts, personal emails, and cryptocurrency wallets.

SIM swapping can also lead to a compromised social media account, which can cause reputational harm.

Compromised Credit Reports

Credit reports are treasure troves of personally identifiable information (PII), such as your full name, birth date, and Social Security number.

Identity thieves can request a copy of a credit report by posing as a landlord or potential employer. If you suspect that someone has stolen your identity or if you’ve been told that your PII has been compromised, you may be able to prevent further damage by requesting a security freeze with the three major credit bureaus.

Identity Theft in the Physical World

While some identity thieves have adopted sophisticated tactics for mining data digitally, others steal information the old-fashioned way: in the physical world.

Here are a few examples:

  • Dumpster diving: Criminals are known to dig through trash in search of sensitive information. So be careful about what you throw in the recycling bin — and shred sensitive documents if they’re no longer needed.
  • Mail theft: Stealing physical mail is a tried-and-true tactic that’s still used by identity thieves today. To deter any would-be snoops, consider purchasing a mailbox with a lock and ask your postal service to hold your mail whenever you’re out of town.
  • Shoulder surfing: A fraudster might spy over your shoulder any time you’re in a public place, so be aware of your surroundings and never let your guard down — especially when you’re at an ATM or in a checkout line, for example.
  • Skimming: This pervasive and often hard-to-detect technique happens when fraudsters leave skimming devices attached to the credit-card processor at legitimate businesses. When you swipe your card, the skimmer reads the magnetic strip and stores your card number. Then, whoever planted the device can then use your credit card or sell the information to a third party.
  • Shimming: Similar to skimming, this is when criminals insert a tiny microchip into an ATM or card reader with the aim of stealing and storing your information. 

You have a partner in identity protection

Data is a valuable resource. That’s why we’re deeply committed to safeguarding our members’ information, and to helping them take quick action if it’s been compromised.

Even if fraud occurs, with Boyd Identity Protection, you’ll never have to fight identity theft alone. Give us a call at 1 (800) 381-2693 to learn more and sign up today!

 

 

 

Do I Need Security Software?

When you bought a new computer years ago, you often had to install additional security software on your computer to help ensure it was secure against cyber attackers. However, most of today’s computers and devices have numerous security features already built into them, such as automatic updating, firewalls, disk encryption, and file protection. In addition, Microsoft provides Windows computers security functionality called Microsoft Defender, which includes additional features such as anti-virus. In many ways, today’s systems by default are much more secure. In fact, YOU are most likely now the greatest weakness. This is why cyber attackers continually target people, attempting to trick them into doing things you should not do, such as giving up your passwords, clicking on links, or opening email attachments that install malware on your computers or share your credit card information.

Which tools should I consider?

If you want to take some additional steps to secure your systems, there are some additional security programs you can consider.

Password Manager: Passwords can be complex and overwhelming, especially having to remember potentially hundreds of different passwords. A Password Manager is a secure vault that protects and stores all your passwords for you so you have to only remember one master password. In addition, they can log you into websites, generate passwords for you, and help validate certain websites.

Virtual Private Network (VPN): VPNs primarily focus on protecting your privacy by encrypting your connection to the Internet and hiding your source location.

Security Suites: These are packages of security software that provide a collection of additional security features above and beyond what your operating system already provides. For example, filtering for dangerous websites, parental controls, and often a VPN. Each suite has different features, so research the one that you feel is best if you need one.

Selecting a Security Vendor

If you need to purchase additional security tools or software, there are many different vendors from which to choose. Which one should you choose? Quite often different vendors are more similar in the features they offer than they are different. The key is to use a solution from a trusted vendor. You don’t want to accidentally purchase and install something distributed by cyber criminals that are infected with malware.

Purchase tools from only well-known vendors that you have heard of and trust. Never purchase a tool from a company you know nothing about, that is brand new or has no reviews or lots of negative reviews. You want to be sure that the solution you are purchasing is legitimate and actively updated and maintained. You may even want to consider in what country the vendor is based. There are numerous online sites that have reviews of trusted vendors showcasing the differences in features and costs of their security software.

Be careful of free tools. While excellent free security tools do exist, there can be some concerns. These tools may be limited in features, difficult to use, or not updated frequently. In some cases, free tools may be developed by cyber attackers and then infected with malware.

Remember, while these security tools are helpful, start first with your computer’s built-in security features, including enabling automatic updating. Today’s operating systems are very secure by default. Finally, you are your own best defense. Be cautious with any odd or suspicious phone calls, emails, or text messages. No security software in the world can protect you from someone trying to trick or fool you into something you should not do.

IoT Device Safety for Young Children

Technology today has become ingrained in many children’s lives, making them much more adept with Internet devices than previous generations. Nearly 95% of American households today have the Internet, giving children greater access and exposure than ever. Many children have a basic understanding of a tablet or smartphone or even know how to surf the web before they enter elementary school.

The next generation of kids will undeniably be tech-savvy and Internet-centric, which provides parents and caregivers with a unique challenge. The Internet will be a big part of their children’s development, so it’s important to talk with them early about Internet usage and establish rules on how to use it.

Should Parents Monitor Children’s Internet Usage?

The short answer is yes, but the practical way to go about it is more complicated. There must be more research before we fully understand how technology impacts children’s development. However, current studies indicate there are positives and drawbacks to technology usage in children.

For starters, Internet access can be an effective way for children to unwind and relax. With the advancement of streaming, kids can now watch their favorite shows or lighthearted videos from a smartphone, tablet, etc. Additionally, the Internet can help children learn new things and build research skills. Google’s search engine has become a modern phenomenon, and many children understand how to use it effectively at a young age.

On the other hand, too much Internet usage can negatively impact social skill development in children and make them more isolated. Another study indicates that an over-saturation of technology can decrease the attention span of children and adults.

So, what is the best way to monitor a child’s Internet usage? Well, the best answer is moderation. Parents or caregivers should establish clear rules for how long a child can use an Internet device. We suggest less than two hours of screen time every day, but it is ultimately up to you to decide what is best for your child. However, if you notice prolonged Internet use is becoming a problem, you should intervene.

How to Keep Children Protected While Using an IoT Device

Although the Internet is a powerful tool that has a lot of positives, there are also a lot of dangers to it. The truth is, you do not know who is on the other side of the screen, their intentions, or how they might target you or your child. Children are more susceptible to online scams and cyber-attacks because they are mostly unaware of these behaviors, so it is essential to have measures in place to ensure their safety.

Parental Controls

Parental controls were implemented in the mid-90s when the Internet entered the mainstream. Today, these controls exist on basically any IoT device you use. There are a lot of customizable features that restrict certain content from children, giving parents and caregivers a lot of flexibility.

For instance, parental controls on smartphones allow you to limit which apps your child can download, set screen time limits, and even restrict the ability to share photos and videos from the device online. As for laptops and tablets, you can restrict the websites they access, the games they can play/download, view browsing history, and limit screen time. There are more advanced settings for each device too. But this should give you a basic understanding of what you can control as a parent.

Teach Them the Basics of Internet Safety

Sometimes, parental controls can only go so far. The sooner children learn how to protect themselves online, the better. Most of us have heard the parental advice, “don’t talk to strangers.” The same rule applies when online. It’s a sad reality, but there are a lot of dangerous people online, and children are susceptible targets to their nefarious goals. Criminals often use a child’s naivety to their advantage.

Children must never share personal information about themselves, family members, or friends. These include names, addresses, phone numbers, events they’re attending, etc. If it’s information they wouldn’t tell a stranger in real life, it’s something they shouldn’t share online. Additionally, they must understand that even reputable websites like YouTube can be dangerous if they’re not careful. They must always be conscious about what they say and do online: no exceptions!

Make Sure They Know How to Operate Other Smart Home Devices

Internet-capable devices have expanded far beyond the traditional laptop or cellphone. Home automation has become increasingly popular among households. People can control everything from lighting to locking their doors, to adjusting thermostats, and much more from a smartphone, laptop, etc.

If you have any smart home technology or are considering installing some, it’s important to teach your children how to handle these devices on a basic level. The last thing you want them to do is to inadvertently leave the house unlocked or disarm your security system. Most children are well-versed in technology already, so it shouldn’t be too difficult for them to understand.

Consider a Smart Home Security System to Keep Your Children Protected

A child is a home’s most important asset, and a smart home security system can ensure they remain protected. You can even teach them the valuable lesson of home safety by showing them how the system works and how to use it properly.

At Boyd & Associates, the safety of our customers is always our top priority. We offer a wide range of security and smart home solutions that are easy to use and keep you and your family safe. For more information about Boyd & Associates and how we can help you build a more secure home, feel free to contact us today.

Securing Your Belongings While Traveling

Securing your belongings while traveling is important to ensure that you have a safe and stress-free trip. Here are some tips to help you keep your belongings secure while traveling:

  1. Choose the right luggage: Invest in high-quality luggage that is durable and has strong locks. Hard-shell suitcases are often more secure than soft-sided ones, as they are more difficult to cut open.
  2. Use TSA-approved locks: Use TSA-approved locks to secure your luggage. These locks can be opened by TSA agents without damaging your luggage, which can save you time and money if your luggage is selected for inspection.
  3. Keep your valuables with you: Keep your valuables such as your passport, money, credit cards, and electronics with you at all times. Use a money belt or travel pouch to keep your valuables close to your body, or use a small backpack or purse that you can carry with you.
  4. Don’t put all your eggs in one basket: Divide your cash and credit cards into multiple places. If you lose one set of cash or cards, you will still have some left.
  5. Be aware of your surroundings: Keep an eye on your surroundings and be aware of any suspicious activity. Avoid leaving your luggage unattended in public areas and be cautious of pickpockets in crowded areas.
  6. Use hotel safes: Use the hotel safe to store your valuables when you are not using them. Make sure to use a unique code or password to ensure that your belongings are secure.
  7. Don’t trust strangers: Be wary of people who offer to help you with your luggage or belongings. Scammers can use this as an opportunity to steal from you.

By following these tips, you can help ensure that your belongings are safe and secure while traveling. Remember to always be aware of your surroundings and trust your instincts if something feels off.

For More Security Tips And Solutions, Stick With Boyd & Associates.

If you’re looking for more ways to keep yourself, your family, and your belongings safe, check out our home security and automation services at Boyd & Associates. We offer a wide range of home security options to protect you and your family.

If you’re ready to discuss our custom solutions, contact us today to learn more about our services and how we can help you prepare for what’s next.