Protect Bluetooth Intrusions by Elee Wright

Protect Bluetooth Intrusions by Elee Wright.


Users often receive files from unknown senders which can lead to security problems, especially with music and media sharing. Like any personal computer, these files can be malware that infiltrate and cause havoc within your laptop.
•    Sometimes, after you discover an intrusion, you are left with no option but to format your hard drive and reinstall your operating system.
•    Remember to turn off Bluetooth when you’re not using it.
•    You can protect your mobile device by preventing other devices from finding you and connecting to you.
•    Make sure the public network you are accessing is secure. If a network does not ask you to identify yourself with a password, then beware.
•    The restricted part of your LAN contains your NAS, some PCs, and other devices. The restricted part needs to exchange files among other devices on the restricted part but not with devices on the public access side.
•    In computer security, shoulder surfing refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. Shoulder surfing is particularly effective in crowded places because it’s relatively easy to observe someone as they enter passwords on a computer, fill out a form or enter their PIN at an automated teller machine (ATM).
•    Recent automated teller machines now have a sophisticated display which discourages shoulder surfers. It grows darker beyond a certain viewing angle, and the only way to tell what is displayed on the screen is to stand directly in front of it.
•    Securing computer data through encryption software has become a clear necessity for many businesses and individuals carrying sensitive information on their laptops or USB flash drives.
•    Your laptop is at as great a risk of theft as it is of spyware, Trojans and hackers infecting it. At times, the threat can be greater simply because it’s so easy to have your laptop stolen.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s