• Mail
  • Facebook
  • Twitter
  • LinkedIn
  • About Us
  • Tactical Gear
  • Blog
  • Job Opportunities
  • 0Shopping Cart
  • Home
  • Training Center
    • Training Calendar
    • Teach a Course
    • Training Center Instructor | Application
      • Academy
        • Training Center Calendar
        • 20 Hour (OPOTA) Course Private Security Firearms Certification
        • 4 HR (OPOTA) Annual Qualification
        • Child Self Defense Classes
        • Conductive Energy Weapon Training Program
        • Impact Weapon (Tactical Baton)
        • O.C. Spray Certification
        • Ohio CCW Classes and Firearm Training Courses
  • Home Security
  • Technology
    • 24Hr Monitoring
    • AI Proactive Gun Detection
    • AI Video Security Analytics
    • Access Controls
    • Bee-Safe Mesh Wifi 6
    • Connected Car
    • Gunshot Detection
    • Multi-building Surveillance
    • Smart Security Cameras
    • Wireless Alarms
  • Security Officers
  • Sectors
    • Campus Security
    • Cell/Radio Tower Security
    • Factory Security
    • Power Substations
    • Mobile Patrol
    • School Security
  • Camera Kits
  • Contact Us
  • Menu Menu
Home1 / Cybersecurity
bee safe password security

🔐 Password Security | A strong password is one of the best defenses against hackers

January 28, 2023/in Cybersecurity/by Bee-Safe Security

Password security is an essential aspect of keeping your online accounts and personal information safe. A strong password is one of the best defenses against hackers, who often use automated tools to try common passwords and gain access to accounts.

One of the most important things to keep in mind when creating a password is to make it long and complex. A strong password should be at least 12 characters long and include a mix of uppercase and lowercase letters, numbers, and special characters. Avoid using easily guessable information such as your name, birthdate, or common words.

Another important aspect of password security is to use a different password for each of your online accounts. This is important because if a hacker gains access to one of your accounts, they will not be able to use that password to access your other accounts. It can be hard to remember multiple complex passwords, so consider using a password manager to generate and store your passwords securely.

Another best practice is to use multi-factor authentication (MFA) whenever possible. MFA adds an extra layer of security by requiring a second form of authentication, such as a fingerprint or a code sent to your phone, in addition to your password. This makes it much more difficult for a hacker to gain access to your accounts.

It is also important to keep your computer and mobile devices updated with the latest security patches and software. This can help protect against known vulnerabilities that hackers might exploit.

Finally, be vigilant about suspicious emails or text messages. Be wary of clicking on links or providing personal information unless you are certain the message is legitimate.

In conclusion, keeping your passwords secure is an essential aspect of protecting your online accounts and personal information. Use strong, unique passwords, a password manager, multi-factor authentication, and stay vigilant about suspicious emails and text messages. And always stay updated with the latest software, so you can protect yourself against known vulnerabilities

https://beesafesecurity.org/wp-content/uploads/2023/01/Bee-safe-password-security-scaled.jpg 1707 2560 Bee-Safe Security https://beesafesecurity.org/wp-content/uploads/2020/05/Bee-Safe-Security-Logo-1.png Bee-Safe Security2023-01-28 04:47:132023-01-28 04:54:55🔐 Password Security | A strong password is one of the best defenses against hackers

How to test if your phone is spying on you

January 14, 2022/in Cybersecurity/by Bee-Safe Security

Imagine scrolling through your Facebook when you see a weird ad. It’s for something you know you’ve never been interested in. You shrug it off as poor ad targeting until you start seeing it again and again. Then it clicks — hey, isn’t this something your friend mentioned recently when talking to you? It seems like the only way your phone could’ve thought you’re interested in this topic is if it was listening to all of your conversations.

Setting a trap for your phone

First, I’d like to tell you the story of our experience with this test. My co-workers and I picked a couple of topics we were sure that none of us had discussed recently and had never searched for on Google:

  1. Laura chose traveling to Alaska;
  2. I chose buying a new Volvo;
  3. Peter chose getting a pet lizard.

We put our phones on the table and talked about every topic for a couple of minutes three days straight. Starting from Alaska’s wilderness, sled dogs, and upcoming holidays, followed by different Volvo models, and finishing with geckos and chameleons.

We all agreed to closely monitor the ads we’d get on our phones to see if any of them relate to the chosen topics.

How to test your phone

  1. Select a good topic. It should be something quite far from your comfort zone that couldn’t be associated with your personality.
  2. Isolate the topic from your phone. It is critically important that you don’t select this topic within earshot of your phone or any other devices. Do not use your phone to search for info on this topic. The best way to do it is to think of it in your head. If you can’t do that, turn off your phone completely or hide it in a soundproof space before discussing your idea with anyone. Make sure you have never Googled this topic;
  3. Select keywords. Think of a list of keywords that could trigger search engines. Let’s take Alaska as an example. Some keywords might include “holidays in Alaska”, “Alaska tours”, “flights to Alaska”, “hotels in Alaska”, or “what to do in Alaska”;
  4. Discuss the topic out loud next to your phone. You can do this alone or with someone else for several minutes at a time. Do this a few days in a row. Make sure you don’t search for the topic in any way — your phone’s only contact with it should be hearing you talk about it.

What we discovered

The test results were mixed.

None of us bumped into reptile ads. Peter owns a dog, and he’s constantly bombarded with advertisements of local pet shops, veterinarians, and dog trainers. He never receives ads about cats, parrots, or other pets, which implies that his phone knows exactly what Peter needs.

Alaska also didn’t appear in our feeds. Laura and I got a few ads offering flight tickets, but the holiday season was approaching and we were both avid travelers. It’s hard to say whether these ads were linked to our office discussion.

But just when I thought that these rumors about our phones listening to us is a hoax, I started seeing Volvo ads. I have no interest in owning a car and have never searched for cars online. Peter and Laura didn’t see any ads related to any car manufacturers.

What does this prove?

Imagine how much information search engines know about us: our age, location, sex, hobbies, work history, and favorite restaurants. Based on the things we reveal about ourselves online and our search history, marketers can paint a detailed picture of our personalities.

I’m in my thirties, I live in a city, and I work at a cybersecurity company. I often read about the latest tech, and I occasionally watch Formula One. Would this be enough to trigger Volvo ads? It’s possible, but not probable. I can’t tell for sure if my phone was listening to me, analyzing me for speech, and targeting me for ads, or if it was just a mere coincidence.

The test results may also depend on the device you’re using and your settings. Since our blog’s readers are likely to be more concerned about their privacy than the average internet user, your results may vary. Results may also vary from person to person, as ad targeting may use a host of different data points about people, but in some cases, the matches are quite uncanny.

The secrets of virtual assistants

When you trigger a special command on your smartphone, it recognizes your voice and prepares to execute your orders. Amazon, Microsoft, Google, Apple and other tech companies then analyze some of the data you provide to your virtual assistant to improve their services. Some critics say they do this even if the user has restricted their permissions.

Tech giants have denied multiple times any accusations that they may be listening to you even then your virtual assistant is in sleep mode. However, this is not exactly true. A report has revealed that Apple’s Siri can be mistakenly activated and then record private matters. With the right settings enabled, they will also reserve the right to use this data to serve you ads.

Can you trust Google?

In 2019, Google admitted that 1,000 recordings of customer conversations were leaked from a third-party contractor to a Belgian news outlet. Some recordings contained private information, such as home addresses, medical conditions, and even business calls.

Some recordings contained enough data to identify some of the people speaking. The company’s spokesperson claimed the leak happened because one of their contractors violated their security and privacy policies.

If Google can’t trust their own contractors, how can we trust them with our data?

How to protect your privacy

  • Review your app permissions. Some apps might want to access your microphone without any reason. This might allow bad actors to spy on you in the background, or collect ad targeting data on you when you don’t want them listening. Go though your smartphone’s settings and make sure that apps can access only resources needed to do their job.
  • Delete your activities. Apple, Google, and other service providers allow you to delete your dictation history. You can also turn off audio recordings and thus avoid ending up in the middle of the leak some day.
  • Don’t share too much with your virtual assistant. We recommend carefully choosing the information you dictate to your phone. The less it knows, the better.
  • Use a VPN. Installing a VPN on your smartphone and enhancing your privacy is also not a bad idea. A VPN encrypts your internet traffic and hides your IP address, therefore if somebody has intercepted your data, they wouldn’t be able to view it and reveal your location.

With NordVPN, you can protect up to six different devices. Since not only smartphones, but also laptops, tablets, and even smart speakers are vulnerable to snoopers, a VPN could help you keep prying eyes away.

https://beesafesecurity.org/wp-content/uploads/2022/01/unnamed.gif 338 600 Bee-Safe Security https://beesafesecurity.org/wp-content/uploads/2020/05/Bee-Safe-Security-Logo-1.png Bee-Safe Security2022-01-14 00:32:222022-01-14 00:32:22How to test if your phone is spying on you

3 tips to avoid online stalking

August 3, 2020/in Cybersecurity/by Bee-Safe Security

Use of this unethical tracking software has surged during lockdown, but here’s how you can protect yourself

Compared to January and February this year, before lockdown measures took effect, March through June saw a surge in the use of stalkerware, an insidious kind of software that allows users to track both the physical and digital moves of others, sometimes accessing photos, videos, and emails, sometimes even tapping into their WhatsApp and Facebook accounts.

It’s a sad truth that domestic violence incidents have increased since stay-at-home orders were issued, but that abusive behavior seems to have carried over into the digital world as well. Avast Threat Labs observed a 51% increase in spyware and stalkerware from March through June, in comparison to the first two months of the year.

“Stalkerware is a growing category of domestic malware with disturbing and dangerous implications,” said Jaya Baloo, Avast CISO. “It steals the physical and online freedom of the victim. Usually installed secretly on mobile phones by so-called friends, jealous spouses, ex-partners, and even concerned parents, stalkerware tracks the physical location of the victim, monitors sites visited on the internet, text messages, and phone calls.”

Chart for Marina

The increase in connected devices and the availability of stealthy spy- and stalkerware apps are another way for abusers to exert control over their victims who have been unable to leave their home due to coronavirus preventative measures, according to Erica Olsen, Safety Net project director for the National Network to end Domestic Violence (NNEDV), a social change organization dedicated to creating a social, political, and economic environment in which violence against women no longer exists.

“Stalkerware, which is designed to operate in stealth mode with no persistent notification to the user of the device, gives abusers and stalkers a robust and invasive tool to perpetrate harassment, monitoring, stalking, and abuse,” said Olsen. “This can be terrifying and traumatizing for the person. During this public health crisis, there have been several reports documenting the increased detection of stalkerware, which could be indicative of increased access to personal devices during lockdown or stay-at-home orders. It could also be reflective of an abuser increasing or changing their tactic if the victim is now actually out of the house more often, if they are an essential worker in healthcare, for example.”

Follow Bee Safe Security on YELP

Since March 2020, Avast has protected over 40,000 users from such malware across the globe. In order to mitigate against the threat of stalkerware, we’re providing the following simple, actionable steps:

Rule #1: Secure your phone against all unauthorized physical access

Use the lock screen on your device. It takes less than a minute to install a stalkerware app, and, according to Pew Research, more than 25% of mobile users fail to use lock-screen protection on their smartphones. That kind of easy access helps suspicious partners to install stalkerware without being noticed. Do not lend your unlocked phone to anyone unless you fully trust their intentions.

Rule #2: Install a trusted antivirus on your mobile phone

A good mobile antivirus will treat stalkerware as a PUP – potentially unwanted program – and give you the option to remove it. Avast Mobile Security keeps your mobile device secure from stalkerware in addition to other malware and potentially malicious apps. Avast worked with Google to remove eight of the biggest stalking apps from the Play Store last year, and we are continuing this work as new developments in stalkerware arise.

Rule #3: Look for hotlines and victims’ services providers.

However, if you don’t feel safe, trust your instincts. If you need to source help and support fast – you should not hesitate to seek it. Organizations such as Operation Safe Escape can help.

Operation Safe Escape is a victim support organisation that provides valuable support and education for victims of domestic violence and abuse, and can help with issues of personal, physical and digital safety. If it’s possible your device has been compromised by stalkerware, avoid using it to contact support. If you are able, use an anonymous device such as a library computer or a friend’s phone in order to avoid alerting the stalker.

“Across the globe, it’s been reported that the number of domestic violence cases have consistently increased during lockdown,” added Baloo, “and that tallies with what we’re seeing. We’re committed to doing all that we can to protect our users from this rising threat.”

Source: https://blog.avast.com/stalkerware-use-surges-during-lockdown-avast?utm_content=404539&utm_term=164712316_278_205&utm_medium=email&utm_source=sfmc&utm_campaign=c_oo_paal_a_a_20q3_jj_news07avast2

 

https://beesafesecurity.org/wp-content/uploads/2020/08/unnamed.png 840 1800 Bee-Safe Security https://beesafesecurity.org/wp-content/uploads/2020/05/Bee-Safe-Security-Logo-1.png Bee-Safe Security2020-08-03 15:16:462020-08-03 15:16:463 tips to avoid online stalking

Follow us on Facebook

About Us  |  News/Media  |  Contact Us  |  Privacy Policy  |   Terms of Use  |  Careers | Tel: (419) 318-7233

17 Findlay St,

New Riegel, OH 44853

(419) 318-7233

©2021 Bee-Safe LLC. | Ohio LIC: 201121001900 | Federal Contractor Cage Code: 7V9B3 | NAIC: 238210 – 561612 – 561621 – 561622 – 611519

Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

Accept settingsHide notification onlySettings

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Accept settingsHide notification only