Do you backup your data on a regular basis?
A new survey from a leading online backup provider found that PC and Mac users are backing up sensitive files and documents more regularly than they have in the past. Approximately 10 percent of computer users now back up their systems daily, compared to only 6 percent in 2011.
“These are the best results we’ve seen since we started tracking data backup five years ago,” online backup expert Gleb Budman said.
While not everyone backs up his or her computer on a daily basis, many people are doing so more frequently than in the past. The study noted that approximately 20 percent of computer users back up sensitive documents and applications roughly once a week, compared to only 14 percent in 2011 and 2 percent in 2008. Another 36 percent of survey respondents said they duplicate sensitive files roughly once a month, compared to only 26 percent who did so in 2008.
“It’s great to see that the desire to protect photos, videos, music and other data is becoming an everyday part of using a computer,” Budman said.
The survey also revealed, however, that roughly 29 percent of U.S. computer users have never used online backup tools to bolster data protection and minimize the chances of unnecessary data loss. The study noted that this trend varies between age groups, as roughly 35 percent of individuals older than 55 never use remote backup, while only 24 percent of 18- to 34-year-olds neglect to duplicate sensitive documents.
If you are backing up your data, what tool(s) do you use?
- 5 Little-Known Factors To Consider When Choosing An Online Backup Service (techattitude.com)
- How I Became a Believer in Online Backups (lockergnome.com)
- 10% of computer users only backup their data regularly putting 90% of all computer users’ still risk data loss. (stellarphoenixs.wordpress.com)
Interesting, but not surprising.
The demand for tablet computers such as the iPad is growing so quickly that shipments of them are projected to surpass notebook shipments by 2016.According to market research firm NPD DisplaySearch, the mobile PC category is poised to soar from 347 million units in 2012 to more than 809 million by 2017. Tablets will be leading the way for that massive growth in the next few years.Tablet shipments are expected to grow from 121 million units to 416 million units by 2017, compared to 208 million shipments in 2012 to 393 million shipments in five years. Tablets will likely surpass notebook shipments in 2016.
- iPad Sales To Pass Notebook Sales Within Four Years (webpronews.com)
- Media Tablet Shipments to Surpass Notebook PCs by 2016 (geobrava.wordpress.com)
Some great basic tips for the average user to protect your computer:
Firstly, the most important computer security tip is to have anti virus software. These programs will not let your data be lost in case some viruses enter your system. They make backup files as well which allows you to retrieve any files that you lose. However, make sure that the anti virus you use is good software. Do not settle for any substandard program for it may harm your PC instead of doing any good to it.
Another very important point pertaining to computer security is that you should not open attachments with emails which you receive from unknown senders. Many of these emails are intended with the purpose of transferring viruses into your system. They can damage your files or the entire computer so better not open them.
Using strong passwords is also a very important tip to secure your computer. You should use long passwords with a mixture of digits and alphabets so that they cannot be easily hacked.
One major addition to this list that I would make is:
Change your user account so that it is NOT an Administrator account.
This is a must read.
Do you know how to guard against scareware? How about Trojan horse text messages? Or social network data harvesting? Malicious hackers are a resourceful bunch, and their methods continually evolve to target the ways we use our computers now. New attack techniques allow bad guys to stay one step ahead of security software and to get the better of even cautious and well-informed PC users.
Don’t let that happen to you. Read on for descriptions of 11 of the most recent and most malignant security threats, as well as our complete advice on how to halt them in their tracks. (Source: Infoworld)
Here are the threats:
1. Shortened URLs
2. Data Harvesting
3. Social Network Impostors
4. Web Snooping
6. Trojan horse texts
7. Lost laptops, exposed data
9. Weak Wi-Fi security
10. Endangered data backups
11. Unpatched software
Go here to learn about the threats and how to protect against them. And learn about 5 security myths as well.
Related articles by Zemanta
- 5 Top Tips on How to Stay Safe While Using WiFi Abroad (travelblissful.com)
- Fake Spyware Blockers Are the New Internet Threat In 2010 (prweb.com)
- Pop-Up Security Warnings Pose Threats (deurainfosec.com)
The best way may be encryption.
Well, if you want to take a significant step in keeping prying eyes away from your electronic correspondence, one good encryption technology that predates Google altogether is worth looking at. It’s called public key encryption, and I’m sharing some instructions on how to get it working if you want try it.
Unfortunately, better security typically goes hand in hand with increased inconvenience. But some human rights activists who used Gmail right now likely wish they’d put up with a little hardship to help keep hackers at bay. I’m not going so far as to recommend you use e-mail encryption, but I think this is a good time to take a close look at it.
Just be prepared for a major drawback.
Weighed against the encryption advantages of privacy and message signing is the fact that you’ll lose access to service you may like or depend on.
When you see an encrypted e-mail in the Web-based Gmail, it’s gibberish. Google doesn’t index it, so Gmail search doesn’t work. And the strong points of cloud computing–reading your e-mail from your mobile phone, your friend’s computer, a computer kiosk on the airport–isn’t possible. You’re once again anchored to your PC with the encryption software installed. (Source: CNET)
In the end it all depends on the importance of the data.
Related articles by Zemanta
- Want really secure Gmail? Try GPG encryption (news.cnet.com)
- Google Turns on Gmail Encryption to Protect Wi-Fi Users (wired.com)
- The Lock That Says ‘Pick Me’ (nytimes.com)
A new survey by Samsung has uncovered what it claims is an alarming lack of security awareness among UK workers when it comes to printing documents.
Just under half of all employees are regularly exposed to sensitive data, such as a document abandoned on a printer, and Samsung warned that awareness of the issues this presents must be improved.
Around 14 per cent of respondents admitted seeing salary details, 22 per cent had seen performance appraisals and 34 per cent had seen CV information.
UK organisations which deal in a large number of sensitive documents, such as the banking and finance sector, saw the most incidences of data exposure, with 40 per cent claiming to have seen sensitive documents on the print tray.
Samsung warned that eight in 10 UK respondents were not aware that printers store all recent documents on an easy to remove hard drive, while over three-quarters did not know that a networked printer is as easily hacked as a PC.
“The potential for security breaches is vast, and can only be overcome if employees are educated about the pitfalls of leaving abandoned documents, and with the help of a controlled printing process,” said Geoff Slaughter, director of Samsung Print in the UK. (Source: Companies blind to printer security risks – V3.CO.UK)
With all the functionality present in printers today, any security plan must treat them the same way computers and other network hardware are treated.