Archives

Where Do You Display Your Christmas Cards?

December 23, 2017

 

Everybody has their favorite aspects about Christmas. There’s much I enjoy this time of year, but nothing MORE than celebrating friends and displaying their cards on my office doors by my white Santas.  Every time I get one, I jump for joy – Yippee –  and quickly add it to my collage of friendship blessings.  With each card, I’m reminded of several things.  Someone had “me” on their treasured list of people to remember.  Someone wanted “me” to know I was special to them. Someone wanted “me” to recognize that I was worth a 49 cent stamp. And in return, I, too, am reminded of God’s great design in letting our paths not only cross but keep in touch year after year after year.  I LOVE THAT!

So for any of you who sent me a Christmas card, I THANK YOU!  Your friendship means the world to me.

Merry Christmas!

Proverbs 27:9 – A sweet friendship refreshes the soul.

 

Are you a single mom? I “GET” You!

December 5, 2017

I saw a single mom at church last Sunday. A dear lady. Friend. Professional business woman I respect greatly. We chatted two seconds in the hallway of the ladies rest room (Why is that a good place to bond)? And within seconds, without her saying a word, I saw into her soul and knew that the holidays were a hard time (families everywhere, “single”ness glaring her in the face, with the challenge of meeting her former in-laws for lunch soon for the kids’ sake).  Yet, without her saying a word about any of this, I just knew, and out of my mouth blurted, “I get you. I just get you!” Continue Reading…

The Long-Handled Spoon

November 9, 2017

I had the opportunity to share at an annual holiday event one of my favorite messages called “The Long-Handled Spoon.”  I don’t know why I love this silly little story so much, but I do. It just makes my heart warm.  The story goes like this. Continue Reading…

Frazzled? Join me for this 4 week study!

September 25, 2017

One thing is for sure.. if you’ve been a mother for very long, you KNOW the definition of these words… STRESSED OUT…As a mom, you’ve likely had more than one opportunity JUST TODAY to practice its meaning: you know…drained over the never-ending schedule, unsettled over the well-being of the children, unnerved over your own emotions, feeling deficient and likely overwhelmed. You just feel like your brain has too many tabs open. Amen? Continue Reading…

Three Lessons Learned from the Edmond Dancing with the Stars

September 11, 2017

 

Have you ever been asked to do something and your first instinct was, “NO WAY!” That happened to me five months ago when Sherry Jordan, President of the Edmond Chamber of Commerce, asked me to be one of their six contestants in the first ever Edmond “Dancing with the Stars” fundraiser on September 7th.  I thought, “WHO ME?” (I could already see the image of me embarrassing myself which made saying NO all the easier.) They wanted to pair these six participants with a professional dance studio for private lessons. Well, I eventually say yes, and I was surprised what I learned. Continue Reading…

5 Ways to Keep Hackers Away

July 10, 2017

My computer was hacked July 4th. With an excessive amount of emails, texts and phone calls to both my husband and me, asking if we were OK or if I really needed a favor or money, my eyes were opened that hacking can happen to anyone. I read an article by Kim Komando  – Special for USA Today – that I wanted to post. Perhaps it might give a few ways you can safeguard your system.

————————————

Article: by Kim Komando –

Right now, millions of hackers, spammers and scammers are hard at work. They’re after your Social Security number, bank account information and social media accounts. With any of these, they can steal your money or trick your friends into giving up theirs.

The scary part is that anyone can be a hacker. For as little as $3,000, you can buy a complete and fully operational exploit kit. This kit does most of the illegal work for you automatically. You get to sit back and rake in the cash, until you get caught.

Between semi-amateurs with automated systems and serious hackers who are masters of technology and trickery, how can you possibly hope to stay safe?

The best way is to know how hackers do what they do. Once you know that, you can counter their malicious acts. Here are five popular hacker strategies.

  1. Phishing scams

Lucky you! A Nigerian prince has selected you to help smuggle millions out of his country. For a little bit of effort — a few simple wire transfers — you’ll get a substantial cut. What could be easier?

I bet you’re asking yourself, “Who would fall for that?” Well, tens of thousands of people do every year. That’s why Nigerian scams, known as 419 scams, are still very popular.

Other versions might say you won a contest or have a job offer. Maybe someone wants to meet you, or you can make money for shipping some goods.

The catch is that you have to send in personal or banking information, or pay a fee. Of course, your information and money is going straight to hackers.

Use common sense before reacting to any e-mail. Scams rely on making you act quickly. If you think about things long enough, you can usually see through them. Just remember the old saying, “If it looks too good to be true … ”

  1. Trojan horse

Many hackers want to slip a virus on your computer. Once installed, a virus can record everything you type and send it back to the hacker. It can send out spam e-mail or attack other computers.

To do this, the hackers disguise the virus as something harmless. This is called a Trojan horse, or just Trojan.

One of the most popular ways to deliver a Trojan is a variation of the phishing e-mail scams.

For example, the e-mail might say it’s from a shipping service, bank or other reputable company. There’s been a problem with a transaction! To learn more, you have to open an e-mail attachment.

The attachment might look like a normal file, but it really contains a Trojan. Clicking on the file installs it before you can do anything.

Similar scams appear on Facebook and Twitter. You think you’re going to watch a funny video your friend posted. Instead, a popup tells you to update your video player. The “update” file it provides is really a Trojan.

The key to defeat this tactic, as with phishing e-mails, is common sense. However, up-to-date security software is essential as well. It should detect and stop most Trojans before they can install.

  1. Drive-by downloads

Security software is good, but it isn’t always enough. Programs on your computer might have weaknesses that hackers can use to bypass security software.

To take advantage of these weaknesses, hackers set up websites embedded with viruses. You might get there by clicking a malicious link in a phishing e-mail or on social media. You can even find these sites in a search for popular programs or topics.

It isn’t just malicious sites, though. Hackers can sneak malicious code on to legitimate websites. The code scans your computers for security holes. If it finds one, a virus can download and install without you doing anything.

To stay safe, you have to keep your programs up-to-date. Every month, Microsoft releases updates for Windows and Internet Explorer. These updates close critical security holes that hackers exploit.

Other critical programs to patch are Adobe’s Flash and Reader, and Oracle’s Java. Using old versions of these programs is like sending hackers an engraved invitation.

You should also be using the latest version of your programs. Anyone using Internet Explorer 6, 7 or 8 needs to update or switch browsers immediately.

  1. Bypassing passwords

In Hollywood movies, hackers are masters of guessing account passwords. In the real world, however, very few hackers bother.

Instead, they go around passwords. They might get your password from a data breach at a company or website you use.

It’s important that you use a different password for every account. That way, if a hacker discovers one, they can’t get in to every account.

Perhaps the hacker slipped a virus on to your system. It records your passwords and sends them to the hacker; no guessing needed.

As I mentioned above, you can stop viruses with up-to-date security software and programs.

A hacker might tackle your account’s security question. Most security questions can be answered with information people post publicly.

You should change how you answer security questions. Give a random answer that has nothing to do with the question. That way, no one can guess it.

  1. Using open Wi-Fi

I’m sure you have a Wi-Fi network at home. Is it encrypted? If you don’t know the answer, then it’s probably, “no.”

That means hackers, and neighbors, can connect to your network from outside. They can see and record everything you do. They can surf to bad websites and download illegal files on your connection. You might be getting a visit from the police.

You need to take a few minutes and secure your network. Trust me; it’s worth it. The instructions will be in your Wi-Fi router’s manual.

 

Kim Komando hosts the nation’s largest talk-radio show about consumer electronics, computers and the Internet. To get the podcast, watch the show or find the station nearest you, visit: http://www.komando.com/listen. To subscribe to Kim’s free e-mail newsletters, sign-up at: http://www.komando.com/newsletters.