ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The Intersection of Home Security and IT Security

Updated on January 9, 2018
tamarawilhite profile image

Tamara Wilhite is a technical writer, industrial engineer, mother of two, and published sci-fi and horror author.

Introduction

IT security and home security are no longer two separate worlds. As our social lives move online and our gadgets gain the ability to snoop on us, our privacy and our safety is increasingly dependent on managing the intersection of home security and IT security. What can you do to improve your personal security, privacy and personal information?

Authentication methods like SecurID used along with a password are far more secure than a password alone.
Authentication methods like SecurID used along with a password are far more secure than a password alone.

Behavior and Security

Never blindly accept help from someone who calls you out of the blue and says they are from the cable company, your internet service provider, phone company or web hosting company. Do not take the word of someone who calls you without a prior help desk request and asks you to visit a website or run software on your computer.


Do not give your user account login information and password to someone calling claiming to be from a telecommunications company or home security monitoring service. Those legitimately working on the help desk for these locations either have the ability to reset your password or access your account information without any action on your part.

Privacy and security go hand in hand. Do not post information on social media sites discussing when you will be on vacation. Thieves tend to be young and increasingly computer savvy. Telling them when you will be away tells them the best time to invade your home. You can post all the pictures and stories you want after you've returned home.

There are many jokes about the use of safe words. If you are going abroad, leave a safe word with family members that indicate that you are in danger and another one to confirm your identity. If you call and use the word that indicates danger, they should call police in the area where you are located and probably the embassy. If they receive a text message or voice mail that seems to be from you requesting money and it does not include the safe word to confirm your identity, they know not to send anything.

Do not let visitors, whether they are your family members or friends of your teenagers, use your computer without restriction or supervision. They could accidentally download malicious software onto your computer, deliberately download illegal files to your computer that they cannot access at home or choose to install monitoring software on your computer in the hopes of gathering information. Whether it is a teenager who wants to snoop on a friend's activity or an in-law concerned that you are having an affair, letting someone use your computer with full privileges is an invitation to disaster. You improve your privacy and security by limiting access to your computer.

Verify that everyone in your family old enough to handle visitors knows your utility service provider, ISP, phone service provider and local law enforcement. Children too young to ask whether an officer has a warrant to enter the home should not open the door to someone dressed in a uniform that imitates that of law enforcement. Would-be thieves often dress as utility workmen to scout out the inside and outside of your home. They may even cut off phone service or disable the home security system pretending to be responding to a system generated error while saying they were dispatched to fix it.

Review the data volume on your cell phone bill and that of any child in your household. Extremely high data volumes may represent a gaming addiction or indicate that someone has installed monitoring software on the device. The monitoring software may take pictures periodically or transmit everything it hears to a third party listener.

If you own a means of personal defense like a gun, know how to use it properly. And do not brag about owning the gun online, since this makes your home a target of thieves who want one.

Young children may learn through computer games, but they do not need to be on the internet.
Young children may learn through computer games, but they do not need to be on the internet. | Source

IT Security and Your Kids

Keep very young kids off the internet. Young children do not understand that what they post is online forever, visible to almost anyone in the world and can be dangerous to share.

Your seven year old does not need to be on Facebook to make friends. And their search to find a website they heard about could land them on a mal-ware infected site or worse.

Inform any children under 18 that you have the right to review the files, logs and information on their computers at any time, including school owned computers they bring home. Then do so periodically. If your teenager is bullying others online, your child could be expelled from school while you, as the parent, could be held liable if the other child tries to commit suicide. Parents have the right to search a child's room for illegal drugs or guns. They have the same right to search gadgets for sexting, cyber-bullying, a crime in some jurisdictions and punishable by an increasing number of schools, and file sharing, illegal and sometimes a financial challenge for parents to resolve.


Replicate the IT security policy your network admin at work has onto your personal computer. Set up a limited profile for your children that prevents them from downloading software or installing anything or viewing financial software application information. Set up an adult account with most permissions except administrative rights. Set up an administrative account for the installation of software, since this will block many malicious software application installations. Use different login IDs and passwords for each account.

Comments

Submit a Comment

No comments yet.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)