Are Your Kids Outsmarting Your Parental Controls?

It’s the struggle that repeats generation after generation. Parents set the rules, only for kids to accept the challenge and find a way to work around them. Perhaps this is the dynamic that drives evolution and technological advancement – which is exactly what can give them an edge in this day and age, as kids often are more familiar with new tech than their parents, and have the time to figure out workarounds to any parental restrictions you might set up.

Of course the content you choose to restrict is up to you, but we put together some tips to help you ensure the content you decide to block from specific apps or services is done effectively.

1. Apple iOS Parental Controls

Apple’s Screen Time tool allows you to restrict adult content, prevent unauthorized purchases, and even set time limits for the device or specific apps. Considering 87% of teens use iPhones or iPads, this may be the primary tool you need.

Kristy CooperAre Your Kids Outsmarting Your Parental Controls?
read more

What You Should Know About Choosing The Best Wi-fi Router For Softcom Internet Service

Your Wi-Fi router is the invisible glue that holds your smart home together. Wi-Fi routers have come a long way in the past few years or so, but not many people really know what a Wi-Fi router is or why the router you choose matters. We thought we’d put together a quick overview, as choosing the best Wi-Fi router has become all the more important for keeping us online and connected throughout the ongoing pandemic.

Kristy CooperWhat You Should Know About Choosing The Best Wi-fi Router For Softcom Internet Service
read more

Simple and secure ways to share your Wi-Fi password with guests

We easily take Wi-Fi access for granted these days. Until we’re no longer connected, that is. Part of being a good host when you have guests is making sure your guests can connect to your Wi-Fi and their digital lives remain uninterrupted. Or perhaps you got a sweet new smart device and need to connect it to your home network.

Either way, we’ve all rolled our eyes the moment that we realize we have no idea what our Wi-Fi password is or where to find it. Maybe your gut sank. Might have even shed a tear, anticipating the upcoming frustration. Been there. But there’s a better way, and we’ll show you how.

Kristy CooperSimple and secure ways to share your Wi-Fi password with guests
read more

4 Tips for Creating and Remembering a Secure PIN

Have you ever been on the phone with customer service and when they asked you for your Secure PIN, you totally blanked out? You’re not alone. While passwords take the main stage when it comes to accessing accounts and security, PINs are important too. These short and sweet codes are an important part of protecting your private information, but many people find them hard to keep track of. That’s why we’re sharing these pointers for creating and remembering effective PINs.

What is a PIN?

First, let’s discuss what is the difference between a password and a PIN. A PIN, short for Personal Identification Number, is a numerical code set up to allow you to authenticate your identity and allow access to secure accounts such as banking, credit cards, or cell phones. In this era where identity theft and computer fraud has become prevalent, many people make the mistake of creating overly complicated or random PINs when they first set up an account, causing headaches down the road when it’s time to access them later.

Kristy Cooper4 Tips for Creating and Remembering a Secure PIN
read more

Don’t Fall Prey to These Common Broadband Privacy Scams

You can probably picture that image of a ghastly Mark Zuckerberg sweating bullets testifying in front of Congress in your mind’s eye, with all the pressure that’s been on the questionable behavior of internet giants like Facebook, Google, and the usual Silicon-Valley suspects. And for good reason. But according to a new report by the FTC, many broadband internet service providers have been just as terrible when it comes to consumer data privacy.

Most internet service providers will tell you they don’t sell your data, but what they don’t tell you is they still allow it to be transferred and monetized by other businesses. Any required disclosure of such practices is often hidden in fine print.

Kristy CooperDon’t Fall Prey to These Common Broadband Privacy Scams
read more

The Only Backup Strategy Guide You’ll Ever Need

You know you need it, so you join the gym, start the diet… all those new year, new you resolutions that will protect your health and save you heartache down the line. But what about your digital health? Almost all of us have experienced that heart stopping moment when the screen goes blank. When the device slips past our grip and shatters on the ground.

The moment when we go from thinking, “&*%# !” to “When’s the last time I made a backup?”

Why not take advantage of the lull in the holiday season and start fresh for the new year totally organized and secure? We’ll help you with this simple strategy that ensures you’ll never have to survive an unexpected digital life crisis ever again. It’s a backup strategy called the 3-2-1 method, and we put together this guide to help you get started now.

Kristy CooperThe Only Backup Strategy Guide You’ll Ever Need
read more

The newest online scams

It’s unfortunate, yet inevitable, that as technology gets better, the criminals who use tech get better too. The best defense, as always, is knowledge and quick action.

Recognizing online scams

Cybercriminals main goal with any type of online scam is to try to trick you into giving them personal information. This is done through a variety of methods including: email (phishing), phone calls or voicemail (vishing), texting (smishing), or money muling.

Spotting a potential scam begins with vigilance in recognizing red flags that might indicating the communications you’re receiving may not be truthful or legitimate. A quick red-flag list should include the following:

Kristy CooperThe newest online scams
read more

6 signs your phone might have malware, and what to do

Has your phone been slow to respond lately? Or maybe your battery is draining much faster than normal? It could be mobile malware. Malicious software can be harder to spot on a phone than a computer, but it can do just as much damage. As people rely on their phones to handle more and more of life’s daily activities for home, work, and school, malware is becoming an increasing problem infecting phones and causing all kinds of havoc.

What is mobile malware?

Besides creating annoying popups that make it hard to use your phone, mobile malware can do much worse, like access private information and use it against you. Common targets include:

  • banking credentials
  • device and app log in and password information
  • personal phone numbers and emails
  • contact lists

Once hackers have accessed this kind of information using malware, they can use it for everything from identity theft to draining your bank accounts to sending out malware threats to your entire contact list and infecting them too.

Kristy Cooper6 signs your phone might have malware, and what to do
read more

The Best of Softcom in 2020

This year was definitely one for the books. But the bottom line is that we stuck the course, stayed true to our mission of putting our customers first, and continued to provide the best service we can. So as we say goodbye to 2020, we thought we’d take a look back at the best we shared. Miss anything? Here’s your chance to catch up.

Online safety and security

We’re always looking out for our customers and community, so we often share articles that not only give you knowledge to understand what’s going on out there, but information to take action to protect your home, family and business.

Kristy CooperThe Best of Softcom in 2020
read more

How routers sold at Walmart, Amazon and Ebay might be leaving you vulnerable to hackers and fraud

We post regularly about the importance of staying up to date on security knowledge and practices for everyone in your family who uses the internet. We even have a whole section of our blog dedicated to it that you can access by clicking here. Today, we’re sharing with you recent news of how some routers sold at Walmart, Amazon and Ebay might be leaving you open for hackers and fraud.

In a collaboration between CyberNews Sr. Information Security Researcher Mantas Sasnauskas and researchers James Clee and Roni Carta, suspicious backdoors have been discovered in a Chinese-made Jetstream router, sold exclusively at Walmart as their new line of “affordable” wifi routers. This backdoor would allow an attacker the ability to remotely control not only the routers, but also any devices connected to that network.

Kristy CooperHow routers sold at Walmart, Amazon and Ebay might be leaving you vulnerable to hackers and fraud
read more