Beware of scammers impersonating energy and telecommunications companies 24 April 2018 The ACCC is warning consumers to beware of scammers impersonating energy and telecommunications providers and demanding payments.
Scamwatch has received 5000 reports of fake billing scams in the last 12 months, with reported losses of close to $8000.
“The scammers typically impersonate well known companies such as Origin, AGL, Telstra and Optus via email, to fool people into assuming the bills are real,” ACCC Deputy Chair Delia Rickard said.
“They send bulk emails or letters which include a logo and design features closely copied from the genuine provider. The bill states the account is overdue and if not paid immediately the customer will incur late charges or be disconnected.”
I have a very light and simple laptop stand. It is a strip of Corflute board purchased from a stationery store for about $5 and used for a number of projects.
I cut a strip with the (tubes running upwards) 480mm wide and 130mm high. I sliced half way through it vertically at the half-way point resulting in two wings 280mm wide by 130mm high that can bend around like the covers of a book. I added a strip of cloth tape down the fold to strengthen the bend. I now have a light stand 280mm wide, 130mm high and about 10mm thick weighing a barely discernible 57 grams or 2 oz.
This can be opened into a triangular shape to support a laptop, opening facing forward. The size may have to be adjusted for your laptop and height. It supports the laptop perfectly, but requires an external keyboard and mouse.
For a long mobile working session, this is a very small price (in weight) to pay for arguably the best keyboard and mouse on the market.
The mouse and keyboard both charge via a Micro-USB port, so I can charge them with the Chromebook charger, or from a USB port on the Chromebook. One charger can handle the HP 11, my phone, the mouse, keyboard and my Bluetooth headset. I carry a couple of extra leads and can charge the HP Chromebook 11 while using it, or while it is suspended, and also charge devices from one or both USB type A ports. I have written about the brilliant HP Chromebook 11 here.
These devices have probably been replaced by later models, but are the best lightweight, quality devices I could find at the time. I have written about the Logitech Ultra-thin mouse here
As you can see from the Photo, I have cut two pairs of notches in the front part of the stand. This fits my tablets, and at a pinch my phone. It allows me to use a tablet (or phone) at eye level to watch video.
I can also use my Windows 8.1 tablet with Keyboard and mouse as a full PC if I need to. (more on the tablet later, it is still under review)
When I fly, the folding stand goes in a pocket in my SCOTTeVEST jacket in front of my tablet screen, if I am carrying one. It protects it from impacts that may break the screen, and adds zero weight. I use two thin rubber bands to keep them together in transit.
You want your documents and data to be secure, accessible everywhere and easy to access. As the saying goes, You can have any two of those requirements you want, but never all three at once. It is simply impossible to have all three. Unfortunately, most people choose easy over secure, and then complain bitterly when their documents are stolen and made public. Or simply deleted.
The dream of instant access to all of you documents is now a reality with cloud based services such as Google Docs and Drive, Dropbox and a host of other services.
You can sit down at any computer or tablet and access almost all your documents immediately.
But there is a downside to that. Others can also access documents from the cloud if they have your login details. They can access your documents if they can access your computer.
So how do you ensure the security of cloud hosted documents? Let’s look at the ups and downs of adequate security.
1. Choose a Good Password
Number one on the list is the level of security we have on our cloud account. The most obvious question is, how good is your password? If your password is 123456 or monkey, secret, letmein or similar, you have a major problem. Security breaches over the last few years have resulted in millions of passwords being leaked. These passwords have been analysed by both good guys and bad guys, and now everyone knows the million or so most used passwords.
For the curious, I have listed the 12 most common passwords of 2013. If you are using one of these, bow your head is shame, and know that any time a hacker wants your data, he will have it in minutes…
Clever passwords are not so clever. If you think s3cret is more secure that secret, think again m0nkey and monkey are pretty much the same when someone decides to use a password list of a million common passwords to crack your account. Use a long, random, different password for every site you visit. If you cannot remember passwords, use a password manager app or plugin for your computer or browser. I use Lastpass, and have had no problems with it. I let Lastpass generate passwords for me. Lastpass is highly respected, well designed and a Trust No One (TNO) app. Lastpass cannot give your passwords to anyone, because they do not have them. they are encrypted for everyone but you.
Don’t Save The Password on Your Computer. Do NOT write your passwords down in a file named Passwords and save it on your desktop. Just read about the Sony hack to find the down side of that approach.
Add Two Factor Authentication
Then, for better security add two-factor authentication.
For Google, Dropbox and Lastpass, and many more online services, an authenticator app like Google Authenticator or Authy work perfectly. I prefer Authy because I can make it require a PIN when it starts up. There is a little effort involved in getting an Authenticator working, but they are well documented. Just be prepared to spend 10 or 15 minutes setting it up on your devices
You need the app running on your phone or tablet, preferably both, and when you log into your cloud service from a new computer, or every few weeks, you must authenticate by providing a six-digit code that changes every 30 seconds. This means you need the password and the mobile phone with the authenticator to log into your cloud account.
Print out a few “Get out of jail” keys so you can log in without your device in an emergency. But secure these printed keys well. See the documentation for your cloud provider.
Secure Your Computer, Phone and Tablet
This makes it very difficult to get into your cloud accounts from another computer. However is someone steals your laptop, phone or tablet while they are unlocked, they will have access.
So make sure you have a password or PIN that is strong enough to keep a thief out. Ensure that a PIN or password is required to access your computer whenever it starts or comes out of standby.
Remember, if someone steals your phone and can access your cloud accounts and your Authenticator, they can change the password. So keep that phone or tablet secure.
I always close the lid of my laptop or HP Chromebook 11 when I walk away from it is a shared space. In fact I rarely get more than a couple of meters away in public or shared space.
I have made a habit of putting everything into a pocket or bag when I put it down in a public or shared space. Basically I treat a laptop, phone or tablet the way I treat cash. I NEVER leave it lying around unattended.
Here is an example of why…
If you work in an office or have a desktop computer, make sure you lock it when you get up and walk away. Having a screensaver that locks it after a few minutes is probably enough in an office environment. I work largely alone in my home office, so I simply set
the screensaver to come on after five minutes. If I was is a co-working space or an office with a lot of people, I would (and have) activated the screensaver manually when I walk away. This is easy to do on computers running Linux. I think it also an option on later versions of Windows. On Chromebooks and Chromeboxes, it is in the bottom right corner of the status window.
Remember the simple security rule. If someone can access your unsecured hardware, they can do pretty much anything. A running, logged in PC is the crown jewels for a thief. Don’t assume everyone in your office is trustworthy.
Follow these three steps, and you will be well on the way to having secure and safe access to your cloud based files and documents.
There is a price. It takes a little longer to log into your account, there is a bit more friction. But after a few days it becomes second nature.
Identity theft is having someone steal enough personal information from you that they can impersonate you well enough to obtain a credit card, bank account, apply for a loan, register a car, get a drivers licence or apply for a passport or mobile phone account in your name.
The danger is, all of these things can result in you being liable for unpaid debt, crimes or other fallout from someone posing as you behaving badly or illegally.
A lot of identity theft is performed on-line, but in this article, I want to discuss the more personal and local version. Your garbage bin.
Much of this information can be gleaned from papers you throw in the garbage. We all get mail every day with personal information. From bank statements and Centrelink documents to invitations to get new credit cards or increase our credit limit. Most come with much of our personal information pre-printed. These are absolute gold to an identity thief. They raid letter boxes on a daily basis, looking for this kind of information.
When I started my last business, we advertised it locally (and laboriously) by trudging from house to house around much of Launceston area putting flyers in letterboxes. I once received an irate phone call from someone telling me we had stolen a letter from his box when we dropped off the flyer.
When I explained the the fliers were being distributed by me, my wife and my son, and leaving a flyer after robbing the box would not have been the brightest idea for us, he apologised and hung up. He had lost a piece of vital mail that day…
The Australian Federal Police have an excellent on-line resource under the title Identity Crime. It is worth a read. There are many other resources, but for Australians, this is a pretty good one.
I was prompted to visit this subject by an excellent post on Unclutterer.com about shredders. I am sitting looking at my shredder, a Fellows P-35C purchased from Officeworks.
It replaced a series of cheap shredders that failed when fed too much paper, or just burned out. I have never been one to overload my shredder, but the cheap, low powered models are prone to choking and jamming if paper is fed in off-centre.
The fact is, with care, even the cheapest shredder will do its job, but spending a bit more is well worth the cost. My current shredder will handle five sheets of paper and cuts it into confetti rather that strips. It cost around $70.
Shredders need to be maintained. I spread a little 3 in 1 oil on a sheet of paper and feed it through the shredder occasionally.
We recently had an episode here in Australia where the opposition turned up in parliament with a sensitive document that a government minister had shredded. The document was retrieved from the bin and taped back together and produced in parliament to much laughter and hoots of derision. I decided that my next shredder would be a cross-cut shredder!
For those home based, a bonus of shredding is the ability to turn shredded paper and other junk mail into Paper Log/Briquettes and use them in the fire. There are a number of tools to do this, unfortunately most of the are US based, and freight is expensive.
For those on the road, papers can be used as fire starters or soaked, screwed up into logs, dried and burned. The simple option is to simply burn any papers with personal information. A smoky option, but a simple one.
On the road, we tend to use fires or braziers, and paper to get the fire going is always in short supply, so save those personal documents and feed them to the fire
The key is, DO NOT put anything with personal information in the bin. Grey Nomads have been fined for disposing of waste in public bins based on papers found by council inspectors, and any paper can lead to identity theft. Dispose carefully!