Everyday Cyber Safety Practices

by Spencer Coursen

Recent news has once again shed light onto the ever increasing need to engage your cyber security with the same vigilance as your personal security.  All too often, our own complacency leaves us vulnerable to the exploitation efforts of the less than noble.  You don’t need to be a skilled practitioner of computer science or a tech guru to keep yourself safe.  You just need to know and employ the basics as discussed below:

  • Install strong virus and malware protection for all computers that access social networking sites.  Be sure to update the software whenever possible.  When the pop-up screen for an update is available try to always click “download and install” rather than “remind me later.”  Cyber probes and attacks increase greatly in the timeframe between software updates when they have figured out the old system, but have yet to figure out the new.  Don’t tip the advantage to the favor of your adversary.

  • Passwords should be strong and frequently changed.  It is important to not use the same password for more than one site, nor is it good to keep the same passwords in rotation.  Strong passwords are at least 6 characters long and combine numbers, symbols and letters (in varying case)  Do not use any passwords that contain anything that might be found in a dictionary or which have a personal association i.e.; your SS #,  school sports number (Jordan23) or anything with your day, month, year of birth.  The stronger a password, the more difficult it will be to be guessed or hacked.  4U@7Yu is a much stronger password than pass123word

  • Do not visit unknown websites sent to you via private messages and emails from persons you don’t know know - this also goes for website invites which may seem out of character for those persons you do know.  Your mom is very likely not recommending you buy pharmaceuticals from Korea.  If it seems like a fraud...it’s a fraud.

  • Social Media should never include private information.  Don’t put anything on your social media page you would not be comfortable sharing with everyone.  Privacy settings on websites like Facebook, LinkedIn, Twitter, Instagram and a variety of other social-sharing sites change often.  Familiarize yourself with the site’s privacy settings and be sure take advantage of the options offering you the most privacy.  Pictures of your home, car, and associated geotags are all useful pieces of information a potential hacker may use to exploit your cyber identity.

  • Create unique answers to password recovery questions.  Inevitably we will all at one time or another forget a password.  When setting up your recovery options, it is perfectly acceptably to answer the generic questions with something completely random. These answers are not checked for truthfulness and are simply in place to protect your information from unauthorized attempts at gaining access.  Cyber criminals are quite skilled at finding out the real answers to these password challenge questions from friends, colleagues, or from information you or your online acquaintances have previously posted online.  For the purposes of password recovery,  “Abracadabra” is a perfectly acceptable answer to “What is your mothers maiden name?” Your own imagination is often times your best security option.

  • Do not “jail break” your mobile device.  Doing so requires the user to disable the intrinsic security features of the device which means malicious applications will have access to all facets of information on your phone - regardless of your permission.  Applications downloaded from verified vendors like Apple’s App Store have requirements that help protect the user.  These requirements are bypassed once the jailbreak has taken place, which means the applications will no longer need to ask your permission before granting access to your contacts, GPS location or information associated with other files on your phone, like your pictures, text messages and emails.

  • Do not engage in illegal downloads.  Unlicensed internet services offering free downloads, zip files, or torrents of movies, music and other software packages often contain malicious spyware that is specifically designed to exploit your cyber security.  These illegal downloads are often the main distribution method for delivering a virus or a trojan horse to your system.

  • Create specific email addresses for specific uses.  Avoid using the same email account for all of your internet activity.  Employing task-specific email addresses will reduce your vulnerability by having your activities compartmentalized into those specific email accounts, and will limit the amount of damage any one compromised account can do to your overall cyber security.  There is no limit to email addresses you may create.  Trust me, you’ll still be able to find the friends you want to follow, it just won’t be as easy for them to find you...this is a good thing. Having one email account for Facebook, one for twitter, another for correspondence, and yet another for e-commerce is perfectly acceptable and encouraged.

  • Do not label folders or sub-folders with titles that promote intrigue or interest.  Labels such as “Passwords”  “Bank Account” and “Important” are all specifically targeted items of interest in cyber attacks and probing mechanisms.  Instead, label things with specific meaning to you with names of seemingly unrelated associations.  If you’re favorite dessert is chocolate cake this may be the name of your favorites folder, whereas the food that gives your heartburn may be the appropriately named folder associated with your annoying co-worker.  This practice also works great for the “notes” application on your mobile device.

  • Utilize “Drafts” in an unassociated email account.  With every website requiring a unique sequence of usernames, passwords, and additional log in features, it is often hard to keep track of them all - especially when they are all independently changed at varying intervals. Creating an additional email address known only to you, and then storing this information in a “Draft Email”  will afford you a secure online hiding place for your information that you can access globally.

  • Log out of accounts when done.  You don’t have to shut down your computer, but the simple act of logging out of accounts especially on shared wifi, networks or computers (think Starbucks free wifi) will prevent the unfavorable access of your private information.

Following these everyday practices will reduce your own likelihood of being victimized, and will help you to prepare today for a safer tomorrow.

Everything comes down to the two Senate runoffs in Georgia. If we lose both races, we lose the country. Democrats know this and are pouring in millions to usher in a Marxist agenda.

As the Left tries to hide how radical the two candidates really are, Glenn takes us inside the Democrat war room to expose the wolf in pastor's clothing, Raphael Warnock, and America's Justin Trudeau, Jon Ossoff. Socialism, the Green New Deal, and "defund the police" are all on the table. And Glenn warns of what's to come if conservatives don't activate: Chuck Schumer will weaponize the Senate, and the radical Left will launch an all-out assault to ravage the Constitution.

Watch the full special below:

The election and its aftermath are the most important stories in America. That's why we're offering our most timely discount ever: $30 off a one-year subscription to BlazeTV with code "GLENN." With BlazeTV, you get the unvarnished truth from the most pro-America network in the country, free from Big Tech and MSM censors.

Sen. Ted Cruz (R-Texas) joined the "Glenn Beck Radio Program" to explain how mail-in ballots are typically disqualified during recounts at a far higher rate than in-person, Election Day ballots, and why this is "good news" for President Donald Trump's legal battle over the election.

"One of the things that gives the greatest cause for optimism is, this election ... there's a pretty marked disparity in terms of how the votes were distributed. On Election Day, with in-person voting, Donald Trump won a significant majority of the votes cast on in-person voting on Election Day. Of mail-in voting, Joe Biden won a significant majority of the votes cast early on mail-in voting," Cruz explained.

"Now, here's the good news: If you look historically to recounts, if you look historically to election litigation, the votes cast in person on Election Day tend to stand. It's sort of hard to screw that up. Those votes are generally legal, and they're not set aside. Mail-in votes historically have a much higher rate of rejection … when they're examined, there are a whole series of legal requirements that vary state by state, but mail-in votes consistently have a higher rate of rejection, which suggests that as these votes begin being examined and subjected to scrutiny, that you're going to see Joe Biden's vote tallies go down. That's a good thing," he added. "The challenge is, for President Trump to prevail, he's got to run the table. He's got to win, not just in one state but in several states. That makes it a lot harder to prevail in the litigation. I hope that he does so, but it is a real challenge and we shouldn't try to convince ourselves otherwise."

Watch the video clip below to catch more of the conversation:

Want more from Glenn Beck?

To enjoy more of Glenn's masterful storytelling, thought-provoking analysis and uncanny ability to make sense of the chaos, subscribe to BlazeTV — the largest multi-platform network of voices who love America, defend the Constitution and live the American dream.

Subscribe to BlazeTV today with our BEST DEAL EVER for $30 off with promo code GLENN.

Fox News senior meteorologist Janice Dean is perhaps even more disgusted with New York Gov. Andrew Cuomo (D) for his coronavirus response than BlazeTV's Stu Burguiere (read what Stu has to say on the subject here), and for a good reason.

She lost both of her in-laws to COVID-19 in New York's nursing homes after Gov. Cuomo's infamous nursing home mandate, which Cuomo has since had scrubbed from the state's website and blamed everyone from the New York Post to nursing care workers to (every leftist's favorite scapegoat) President Donald Trump.

Janice joined Glenn and Stu on the "Glenn Beck Radio Program" Tuesday to ask why mainstream media is not holding Gov. Cuomo — who recently published a book about his leadership during the COVID-19 pandemic — accountable?

"I'm vocal because I have not seen the mainstream media ask these questions or demand accountability of their leaders. [Cuomo] really has been ruling with an iron fist, and every time he does get asked a question, he blames everybody else except the person that signed that order," Janice said.

"In my mind, he's profiting off the over 30 thousand New Yorkers, including my in-laws, that died by publishing a book on 'leadership' of New York," she added. "His order has helped kill thousands of relatives of New York state. And this is not political, Glenn. This is not about Republican or Democrat. My in-laws were registered Democrats. This is not about politics. This is about accountability for something that went wrong, and it's because of your [Cuomo's] leadership that we're put into this situation."

Watch the video excerpt from the show below:

Want more from Glenn Beck?

To enjoy more of Glenn's masterful storytelling, thought-provoking analysis and uncanny ability to make sense of the chaos, subscribe to BlazeTV — the largest multi-platform network of voices who love America, defend the Constitution and live the American dream.

As America grows divided and afraid to disagree with the Democrats' woke plan for America, Megyn Kelly is ready to fight back for the truth. For nearly two decades, she navigated the volatile and broken world of the media. But as America leans on independent voices more than ever, she's breaking new ground with "The Megyn Kelly Show."

She joined the latest Glenn Beck Podcast to break down what's coming next after the election: Black Lives Matter is mainstream, leftists are making lists of Trump supporters, and the Hunter Biden scandal is on the back burner.

Megyn and Glenn reminisce about their cable news days (including her infamous run-in with then-presidential candidate Donald Trump) and to look into the chaotic and shady world of journalism and the growing entitlement it's bred. For example, many conservatives have been shocked by how Fox News handled the election.

Megyn defended Fox News, saying she believes Fox News' mission "is a good one," but also didn't hold back on hosts like Neil Cavuto, who cut off a White House briefing to fact check it — something she never would have done, even while covering President Obama.

Megyn also shared this insightful takeaway from her time at NBC: "Jane Fonda was an ass."

Watch the full podcast here:

Want to listen to more Glenn Beck podcasts?

Subscribe to Glenn Beck's channel on YouTube for FREE access to more of his masterful storytelling, thought-provoking analysis and uncanny ability to make sense of the chaos, or subscribe to BlazeTV — the largest multi-platform network of voices who love America, defend the Constitution and live the American dream.