Maintain your old Siemens Hipath system

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Does she give it back, or does she explore it? If she gave it back, we wouldn't have a movie, now would we? Stacy then proceeds to identify his ex-girlfriends and contact them. Let the games begin.

Could this really happen? Of course it could. Most PDA's contain a plethora of information about a person and their activities, their digital footprints. People store contact information, appointments, meetings and midnight rendezvous'. They store passwords, login ID's and PIN numbers. They have photos of people they know and sometimes in awkward circumstances. It's a lot to have to explain. The courts are only beginning to grapple with how to handle the content in a PDA. One person's little black book can be very incriminating indeed.

For the rest of us, we have nothing as exotic; however, we are all in danger of exposure and threat. Identify theft has become one of the largest white-collar crimes. There is enough information in the average PDA for someone to take over your life. So, what's the solution? Give up your PDA? No. You face the same problem with the typical day planner. It has all of the same information, it's just not as accessible. In fact, a PDA has certain advantages over a planner. You can password protect some of the data. You can even encrypt data. Most importantly, you have a backup. The data is safely stored on your computer and archived on external media if you have taken the proper steps.

That duplication of data also means an identity thief has more ways to get to it. So, what can you do? Well, the first concern is to make sure that you backup your data. Synchronize your PDA at least daily. I synchronize my Treo 600 2-3 times each day, usually when I arrive at my office or leave it. Backing up your data means that you should be creating a copy on tape, CD, zip disk, flash ROM or other external media and storing it offsite. If you are not, you are asking for trouble and your business is at risk. If your PDA is ever stolen, you will need to restore that data on a new PDA.

Next, you need to minimize the amount of data someone can actually access. Let's face it, if a hacker really wants to get your data, they will succeed. However, not every criminal is a super hacker. Sometimes you just want to keep your information from prying eyes. Just because you labeled something as private in your PDA doesn't mean someone else can't read it. It depends on what application you synchronize with. If you sync with Outlook, records that are private on your PDA may be public in Outlook.

The best way to protect passwords and PIN numbers is to store them in a password application that encrypts the data. The best applications have both a PDA application and a desktop application that allows access to the information from either system. The trouble is converting that data from whatever format it's in currently. I've struggled with this one myself. There is no easy method I've found so far. Just set aside time to copy and paste the data into the password application. It might take a few hours to get that information into a secure application.

If you're worried about someone viewing your schedule, the best approach is to archive your past history periodically. Outlook has settings that allow you to specify to how often calendar events will be archived. This will wipe the history from your PDA also. Archives are usually stored in an external file that can be accessed later.

If you have incriminating photos, delete them. If you want a copy, save it on external media like tape, CD and flash ROM. For contacts, you can archive them or simply move the record to an external file. Outlook allows you to create a .pst file that you can use to save email, calendar, address, tasks, or other information. Once you move a record, it will be removed from your PDA.

And, don't forget to delete the cookies and memory cache on your PDA's web browser. Remember that website you checked out last week? Is that something you want everyone else to know about? I don't think so.

Don't forget physical security; keep an eye on your PDA. It's possible to take steps to protect your data and remove your digital footprints. Protect your little black book and it will protect you.

Rick Cooper, The PDA Pro, is the PDA Coach for productivity anytime, anywhere. He is a national speaker on business productivity and sales. Rick is President of StratAchieve, a company specializing in coaching services to improve productivity and increase revenues. For more information, visit his website at www.thepdapro.com or call (800) 677-6708.

In The News:

Lockdown protests intensify in China as UK journalist 'beaten and kicked by police' covering unrest
Sun, 27 Nov 2022 22:16:00 +0000
Protests against stringent COVID restrictions have intensified across China - as a British journalist was beaten and kicked by police.

Monkeypox given new name by World Health Organisation
Mon, 28 Nov 2022 11:27:00 +0000
Monkeypox has been rebranded 'mpox' by the World Health Organisation (WHO).

Chinese Communist Party faces threat not seen since protests that led to Tiananmen Square massacre
Sun, 27 Nov 2022 19:11:00 +0000
These protests are momentous. Wherever they lead, they are already hugely significant.

What's being done about 'murder-for-hire' sites on the dark web, and how dangerous are they?
Sun, 27 Nov 2022 05:05:00 +0000
At some point in our lives most of us have done something to upset someone.

Plane crashes into live power lines
Mon, 28 Nov 2022 09:34:00 +0000
Two people, who spent nearly seven hours trapped 100ft (30 metres) above ground after their plane crashed into live power lines, have been rescued.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More