We Put Our Members First.

Online Security

Cyber security is a huge concern for everyone who uses the Internet. You may find the following articles and links helpful:

Effectively Erasing Files:
Before selling or discarding an old computer, or throwing away a CD or DVD, you naturally make sure that you've copied all of the files you need. You've probably also attempted to delete your personal files so that other people aren't able to access them. However, unless you have taken the proper steps to make sure the hard drive, CD, or DVD is erased, people may still be able to resurrect those files.

Guidelines for Publishing Information Online:
Remember that the internet is a public resource. Avoid putting anything online that you don't want the public to see or that you may want to retract.

Understanding Bluetooth Technology:
Many electronic devices are now incorporating Bluetooth technology to allow wireless communication with other Bluetooth devices. Before using Bluetooth, it is important to understand what it is, what security risks it presents, and how to protect yourself.

Real-World Warnings Keep You Safe Online:
Many of the warning phrases you probably heard from your parents and teachers are also applicable to using computers and the internet.

Supplementing Passwords:
Passwords are a common form of protecting information, but passwords alone may not provide adequate security. For the best protection, look for sites that have additional ways to verify your identity.

Understanding Web Site Certificates:
You may have been exposed to web site, or host, certificates if you have ever clicked on the padlock in your browser or, when visiting a web site, have been presented with a dialog box claiming that there is an error with the name or date on the certificate. Understanding what these certificates are may help you protect your privacy.

How Anonymous Are You?
You may think that you are anonymous as you browse websites, but pieces of information about you are always left behind. You can reduce the amount of information revealed about you by visiting legitimate sites, checking privacy policies, and minimizing the amount of personal information you provide.

Risks of File-Sharing Technology:
File-sharing technology is a popular way for users to exchange, or "share," files. However, using this technology makes you susceptible to risks such as infection, attack, or exposure of personal information.

Reviewing End-User License Agreements:
Before accepting an end-user license agreement, make sure you understand and are comfortable with the terms of the agreement.

The information contained in this portion of Members1st.org is provided by an outside agency. Clicking these links will take you to a web site outside of Members1st.org.