Deck the Halls with Tech: A Comprehensive Guide to Setting Up Your New Holiday Gadgets

Ah, December – a month where carolers sing, lights twinkle, and folks eagerly tear into gift-wrapped boxes to discover the latest and greatest in tech. From Grandma’s new smartphone (Go, Granny!) to your cousin’s shiny smartwatch, the season of gadget gifting is upon us. But with great gifts come great responsibility, particularly in ensuring these devices don’t become the technological equivalent of tangled Christmas lights.

First Stop: Unboxing Joy (and Cables)

Remember the Christmas movie where the dad spends hours trying to untangle strands of lights? That’s you with your new device’s cables if you don’t approach this systematically. Lay out all components, and for the love of all that’s merry and bright, read the manual. Yes, I said it. It might seem as old-fashioned as fruitcake, but sometimes, those booklets do come in handy.

Securing Your Sleigh…I Mean, Device

After powering on, your immediate priority should be security. After all, you wouldn’t leave your Christmas cookies out for anyone but Santa, right?

  • Password-Protect: Choose strong passwords and avoid obvious choices like “password123” or “letmein.” If your reindeer can guess it, it’s not strong enough.
  • Software Updates: These are like the elves of the tech world. They work behind the scenes to ensure everything runs smoothly. Install any pending software updates as they often contain critical security patches.
  • Two-Factor Authentication: Like the double bolt on Santa’s workshop. It requires an additional step to access your device, making it harder for any Grinches to breach your accounts.

Connectivity: Making Sure Your Gadgets Play Nice

Ah, the joy of getting devices to talk to each other. It’s like trying to organize a reindeer game without Rudolph feeling left out.

  • Wi-Fi Woes: Ensure your home Wi-Fi is secure. Rename your network to something nondescript. “FBI Surveillance Van” might give your neighbors a chuckle, but it also gives away the brand and model of your router. Opt for something generic and boring.
  • Bluetooth Pairing: Keep Bluetooth off when not in use. You don’t want any unexpected guests connecting to your devices, much like how you might feel about that one distant relative dropping by unannounced.

App Management: Not Every App Deserves a Place on Santa’s Nice List

Be cautious of what apps you install. Some might be more interested in your data than in making your life easier. Think of them as the mischievous elves of the app world.

Some Final (Jingle) Bells and Whistles

  • Back-Up: Set up automatic backups. Because even Santa checks his list twice.
  • Limit Permissions: Not every app needs access to your camera, contacts, and location. Be stingy with permissions, like a Grinch with his roast beast.
  • Stay Informed: Subscribe to a trusted tech news site. It’s like getting weather updates from the North Pole, ensuring you’re always in the loop.

In Conclusion:

Sure, the holiday season might be about festivities and family, but it’s also an opportune time to show off our shiny new gadgets. Just remember, amidst the caroling and cocoa-sipping, that while your devices might come with some assembly (and frustration) required, a little patience and humor can go a long way. After all, if Santa can travel the globe in a single night, you can certainly set up your new tech in an afternoon.

So, as you plug in, set up, and dive into your new devices, may your Wi-Fi be strong, your passwords be complex, and your tech-related headaches be minimal. Happy Holidays and tech the halls safely!

Hello Facebook

Greg Price

Facebook’s business model is based heavily on the collection and sale of user data.

Fostering digital “friendships” and promoting likes are some of the beguiling tools used to keep you clicking and browsing your feeds – maintaining engagement equals income for Facebook.

Despite Facebook and its leader’s claims to value online privacy, the continued issues and perplexing security conundrums suggest the company is struggling to maintain a positive image.

In 2018, following the Cambridge Analytica debacle, Facebook promised to restrict developer access to user data.  Recent announcements by Facebook suggest the new privacy policies haven’t been applied to every developer – possibly over one-hundred application designers continue to have access to the personal data of users in Groups.

Data harvested by the developers include names, profile photos, phone numbers and Facebook reactions, such as your “likes “.  According to Facebook, despite the neglect and continued release of the data, the data hasn’t been abused or used inappropriately – trust me, I’m from Facebook.  Who knows if the data has been misused, most don’t know it’s being used by other firms.

The incredible irony in these continued abuses is Mark Zuckerberg’s statement that “the future is private”.  Is the statement dishonest or the result of poor engagement?

Here’s a simple fact.  If you use Facebook, your data is being sold.  Stop, don’t argue, don’t venture any further.  That’s Facebook’s primary source of income.  After all, you are allowed to use Facebook for “free”.

This week’s latest Facebook controversy involves a bizarre issue on the Facebook app for Apple iOS.

When you look at an image or video within the Facebook app, the Apple device’s camera activates on its own, for no known reason.  When the issue was reported, nobody had any idea why the app opened the camera.

When you open a photo within the app, swipe down and you will see that your phone’s camera is running live in the background.  Why?

Facebook has corrected the issue through a hastily-delivered fix to the Apple App store.  Simply visit the App store and download the latest version of the app.

The very peculiar thing for me, when I tested the app on a lab phone, was not once did the Facebook app ask for permission to launch the camera app.  At first, I thought the issue was a design intent that presented an impersonated camera interface or maybe a quick include to launch the camera interface rapidly. However, I moved the phone and the surroundings changed – the camera was live.

I could not reproduce the problem on an Apple device running an older version of the iOS; only the latest version, 13.2.2 presented the problem.

I haven’t noticed a formal notice of the issue from Facebook, simply the push of a new version of the app that appears to resolve the matter.

Was the problem the result of buggy software?

Maybe.

If you’re running the latest version of Apple iOS, you have a few options.

First, delete the Facebook app.

Not only will you resolve the current camera problem, but, you’ll tackle all future failures of the social media platform.

But, seriously, you don’t have to use the app to check Facebook.  You can use a web browser such as Safari or Firefox and interact with your account through a common tool.

If you’re not ready to abandon ship just yet, obviously, the easiest thing to do is update the Facebook app to the most current version.

Lastly, if for whatever reason, you can’t update the app, disable the camera access for the Facebook app in the phone’s privacy settings.  Simply visit the Settings app, select Privacy and then tap Camera.  Find the Facebook entry and toggle the green switch to off to disable the camera access.

While you’re there, take a look at the other apps that you’ve granted access to your camera.  See something you don’t like or don’t recall enabling?  Disable those too.

If you can’t tolerate the thought of deleting Facebook, I urge you to consider restricting what Facebook knows about you.  In order to do so, you must make your profile settings as private as possible.

Keep in mind, adjusting the settings to reduce data collection will not make you immune to the inspection and exchange of data; but, perhaps, tightening your settings will allow you to control more of your data and reduce what Facebook collects.

Facebook provides a security checkup – but, only on the desktop version, for now – you cannot perform the security checkup from the mobile Facebook app.  The security checkup is supposed to reveal what data is being shared.  As you observe those data, you can restrict some of the data.

The downside?

Your tailored, or customized ads and recommendations will be less specific to you – from my perspective, the creepiness will be reduced – not a bad thing.

How do you run the Facebook privacy checkup?

Click the question mark at the top of any Facebook page.  Then select Privacy Checkup.  Three options should appear: Who can see what you share, How people can find you on Facebook and Your data settings on Facebook.

Click each of the three options and adjust the settings based on your personal needs.

As you step through the privacy checkup, you will see which apps are sharing your data and which data is presented to the public. 

I recommended the security checkup to a friend recently.  He sought the feature within the app for a day or so before he emailed me.  Remember to use a desktop device and a web browser to check the settings and to make adjustments.  You can’t do this from within the mobile app.

Interestingly enough, after perusing the settings and associated data, he emailed me and asked how to remove the Facebook app and delete his profile.

Be careful as you look behind the curtain, you might not like what you see.

Be safe.

Protect IT

Greg Price

For the third week of National Cybersecurity Awareness Month, let’s review protecting your “IT”.

Your use of connected technology creates a digital footprint. Your footprint is composed of every click, share, text, email, post, GPS coordinate created by you and your devices. The wealth of data points are constantly updated and subsequently stored.

The digital data trail is enticing to cybercriminals.

Why?

The data is worth a lot.

Some of the wealthiest companies in the world survive on the richness of your digital footprint. Google and Facebook generate the overwhelming majority of their incomes through monetizing your digital data trail into a product: a collection of your behaviors.

Advertisers, and, others, are intoxicated by the power of the digital behavior profile. Due to the sheer volume of data that can be collected from connected systems and the relative ease by which the data can be consumed, an incredibly accurate impression of you can be rendered.

Continue reading “Protect IT”