Kyle is working from home and wants to beef up his home network security. Leo says that Kyle's work is probably using "endpoint security," which uses software on Kyle's computer to protect him. So he wants to be careful not to compete with that. Being on a home network with IoT devices, though, could be a weak link.
security and privacy
Ed rented a car recently and it came with Apple CarPlay. Is that secure? Leo says it is because Apple makes it really difficult to break encryption. You just want to be sure to remove your device after you're done with the car rental. Select "Forget Device." Or don't use the car's internal telematic systems. Just the CarPlay.
There's also a setting in Apple CarPlay that says "do not copy my contacts" to the car. Make sure you enable that so your contacts won't get transferred to the car's hands-free system.
Lori googled how to remove remote access apps on her Mac, and she was able to remove them after Apple walked her through it. But she's worried that she didn't get it all. Leo says that if Apple took them off, it's a good chance Lori is fine. It's easy to get paranoid about a computer because it does a lot of things we don't understand. The only concern is that when Lori gave the original technician remote access, that he could've installed something else she doesn't know about. If she's really worried, she can always back up her data, format her hard drive, and then reinstall macOS.
After getting a phishing scam email, Karen ran a malware scan with Windows Defender and it found a "severe threat" called a Trojan-Downloader. Windows Defender blocked it, but is she still compromised? Leo says that everyone gets those, and it's not a side effect of a virus on your system. So if Defender found one and blocked it, you're safe from it.
Glen wants to know if ransomware can happen if you unplug your backup from the network. Leo says not until he plugs it back in. But it's less likely with a home-based system than say, a commercial network. So clean up the infected computer before reconnecting the backup, otherwise, it could infect it. A lot of ransomware also has time-released capability. It may not infect right away. So if Glen has backup unplugged from the network, he should keep it that way until he's wiped the hard drive and removed the ransomware.
Dwayne wants to know more about virtual private networks. Leo says that VPNs essentially burrow an encrypted tunnel through the internet so that nobody can see what you're doing online. It's ideal when you're at a coffee shop and want to stay secure and private. People can see you're online, but not what you're doing.
Dan wants to encrypt all his data, so nobody can ever see it once he's gone. He already uses VeriCrypt and BitLocker. But he also has DVDs with image files and he wants to encrypt them. ISOs? Leo says that Dan can create ISOs of his DVD data. You import the data onto your hard drive and then destroy the DVD. Then you can encrypt the files using VeriCrypt or BitLocker the hard drive.
Ed is worried because he got a warning that his data has been found on the dark web. What can he do about that? Leo says you can't really do anything. Data breaches happen all the time. You can change all your passwords, and Leo recommends doing that with your bank, and if your credit card number has been compromised, you can change that. But in most cases, the dark web compromise is mostly your email address, and that's it.
Check out HaveIBeenPwned.com to see if your email information has been grabbed.
Pete heard about a device to keep his iPad private called NextDNS. Does it use a VPN? Leo says that DNS is essentially the internet address system in IP numbers. DNS is the phone book for it. NextDNS bypasses your ISP so that they don't know what you're browsing on. It will encrypt the traffic to NextDNS and back. But your browser is still visible. The thing about VPNs is that they are a tunnel that encrypts everything and slows things down. Leo uses NextDNS on all his devices, but you'll go through the free tier pretty quickly. But it's not very expensive.
Dino uses a label program to create address labels. But after an update, it stopped working. Support wants him to uninstall the Adobe Flash Security option. Leo says that's a problem because flash is a security issue itself and turning off the security app makes you vulnerable. Leo also recommends exporting out data and then finding a better label program.