8 Computer Tips Writers and Everyone Should Know

I’ve got my technology hat on today. Here’s my list of 8 computer tips that every writer should be aware of to stay safe.

  1. Always back up your work (to the cloud, an external hard drive, a thumb drive, etc.). There is nothing more heart-breaking than loosing your file (or your work in progress).

  2. Do NOT click on links (in emails, on webpages, or in texts) that you don’t know where they came from. This is the easiest way to get your device infected.

  3. Always update your computer, tablet, and phone with the latest patches and fixes in a timely manner. Many of these are fixes to security vulnerabilities.

  4. Reboot your computer frequently. Many patches, installs, and fixes require a reboot to take effect. Plus, computers and phones (like people) need to be reset periodically.

  5. When out, avoid using public computers and device chargers. You don’t know if they are infected or who is monitoring them.

  6. Know which of your home devices have blue tooth connections. If there is no reason to have it on, turn it off and don’t accept pairing (requests to join) from unfamiliar devices.

  7. Make sure your passwords are saved in a secure place [e.g. a software manager (software used to securely manage your information)]. They shouldn’t be in a Word file on your computer, a piece of paper, or a sticky note. It’s also not a good practice to save your passwords for websites to your internet browser.

  8. Keep removable storage devices (e.g. thumb drives, external hard drives, etc.) in a secure place.

Bluetooth Tips (And Geeky Stuff You Should Know About)

Bluetooth and wireless technology have made our lives so much easier. We’re no longer tethered to a device, and we can be portable. Bluetooth is now an every-day part of our lives in headphones, keyboards, cars, personal digital assistants, TV, and the list goes on and on. Here are some things you need to be aware of to keep your devices safe from bad actors.

Where the Name Came From - The trademark for this technology is named for King Harold “Bluetooth” Gormsson who united Denmark and Norway in 958. He had a bad, discolored tooth that led to his nickname. King Harold was one of the last Viking kings to rule over Denmark, Norway, and parts of Germany and Sweden, and he is buried in Poland.

Bluejacking - This is a term to describe when someone sends unsolicited or unwanted messages through Bluetooth on your wireless devices. It’s a nuisance, and it could be dangerous if the message has viruses or other malware.

Bluesnarfing - This describes when a hacker gets access to one or more of your wireless devices and can steal information.

Bluebugging - This is when a hacker takes control of your devices through your Bluetooth. They have full access to your device and its information. This can include anything from full access to your texts and contacts to listening or watching you through a camera.

Things You Can Do

  • If you don’t need wireless access to a device, turn it off.

  • Don’t accept pairing requests (the process that allows your wireless device to connect) from sources that you don’t know.

  • Know what Bluetooth devices you have and the ones that are paired with your network.

  • Know your environment or surroundings when you are using Bluetooth. Are you in a very public place with lots of people nearby? Remember, hackers don’t have to be at the table next to you.

  • Review your device’s security settings and security options before you pair your device. Take advantage of options to secure your devices.

Computer and Data Security for Authors

I returned from a rainy week in Orlando to buckets of rain in Central Virginia. I went to an IT conference and heard about all kinds of new technology. One of the highlights was when I had liquid nitrogen ice cream. Literally, too cool. The smoky fog (and probably all the rain outside) gave me flashbacks to the "Creature from the Black Lagoon" and "Swamp Thing."

nit.jpg

While I was there, I had the pleasure of attending Dr. Eric Cole's keynote presentation on IT Security. Many of the key points relate to authors. It's important to protect your data and your devices.

He reminded the audience that most people buy security/alarm systems AFTER a break in. Security should be a constant thought in order to defend against hacks and attacks. You need to be prepared.

As a user, you need to be aware of passwords. Don't use the same one for everything. You're giving a hacker the keys to the kingdom. Be careful what you click on and what attachments you open. You are one click away from being compromised.

The risks of compromise will always be there. You need to minimize or mitigate these risks. Don't click on strange links. Make sure that your security settings on your device are set.

Regular patching is important to ensure that known vulnerabilities are corrected. Make sure that your PC/laptop gets its regular updates. 

Know the value of your data. And know where your critical files are. He talked about his million dollar laptop. He has files and client work on his device. Add up the value of what you've stored. Data is king. What would it cost you if you lost that document. Regular backups are important.

Also, free doesn't always mean "free." Games, apps, and services that are free are often mining or monitoring your data. Read the user agreements before you access them. And watch your children's free games. Many of them monitor or share your location. 

If you're traveling to parts of the world where hacking is rampant, he suggested taking a "throw-away" device for use there. Don't access your critical information (e.g. banking, etc.). Don't use the device when you return. 

Security often becomes an after-thought in today's busy world. Be careful. The chances of being hacked are high. Be prepared and do what you can to mitigate the risks.