[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-general-personal-security\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-general-personal-security\/","headline":"The Ping: General Personal Security","name":"The Ping: General Personal Security","description":"Keeping your business security up-to-date is extremely important, but are you using the same security measures in your own home?","datePublished":"2019-05-08","dateModified":"2019-05-08","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/05\/fingerprint-1382652_1920.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/05\/fingerprint-1382652_1920.jpg","height":1920,"width":1536},"url":"https:\/\/univista.com\/posts\/the-ping-general-personal-security\/","about":["android","bluetooth","internet","iPhone","malware","safety","Security","smart devices","The Ping","virus","vulnerability","wifi"],"wordCount":625,"articleBody":"ShareTweet                                        We\u2019ve talked a lot about what you can do on a smaller scale to keep your home and personal IoT (Internet of Things) devices secure, but what about your home network? While it might not seem like it, your home has its own network infrastructure. Most people assume that if their network is up and running and they can connect to the internet, then everything is okay. Like your car, assuming that it is running fine is not the best way to handle it. You need to maintain your network and check up on it regularly. So you are probably asking, what exactly does that entail?Home DevicesNowadays, most manufacturers have a built-in End of Life (EOL) date to their devices. What that means is they assume (or ensure) that you\u2019re going to be replacing the device within a couple of years. With that assumption in mind, they stop providing updates and patches for that version of hardware you have. So, how does this affect you? If your device is no longer being updated, it becomes vulnerable to exploitation. These vulnerabilities can create holes in the devices security therefore allowing cyber criminals on your network, thus allowing access to your most private information. If you have cameras in your home, said criminals could hijack them and spy on you or your family &#8211; even allowing them the knowledge of when you are not home.Everyone with internet in their home has a modem and router of some form. More recently, your ISP (Internet Service Provider) might attach a sticker to these devices containing your Wi-Fi Login information, along with steps on how to access your internet (default) gateway. It is important to log in to your internet gateway from time to time in order to look for notifications about critical security updates. The internet gateway is often overlooked when setting up internet in your home, but is useful as it can be used to change the name of your Wi-Fi network in your home as well as the password used to connect. Physical security can be just as important for securing your home network; if the sticker containing your Wi-Fi and gateway login information is visible in plain view, any questionable visitors that intend to hijack your network have a free pass to do so.Mobile PhoneNow that you have a better understanding of how to keep your home secure, how do you keep yourself secure while using your phone? Recently it\u2019s been found that location data from cell phones is being shared with not only the app you\u2019re using, but also different law enforcement agencies. Someone knowing where you are at all times sounds scary, right? Unknowingly, we often allow apps that we download to access our location at all times. This means they can find out where you are at any point-in-time, but also that it could potentially be draining your battery in the background. Now, if you\u2019re trying to use the map app to get directions for example, you can limit the location function to only access you while you\u2019re using the app.For an iPhone, you can check which apps have location services activated by following these steps:Settings&#8211;&gt;Privacy&#8211;&gt;Location ServicesThis will bring you to a page that shows you which apps you\u2019re sharing your location with, listing never, only while using the app, and always.For an Android, you can check which apps have location services by following the following steps:Settings&#8211;&gt;AppsClick the 3-dot drop-down in right cornerClick App permissionsClick LocationFor more information about app security, check out The Ping: 2FA.Your UniVista Team*Celebrating 20 Years of Customer Satisfaction*&nbsp;ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: General Personal Security","item":"https:\/\/univista.com\/posts\/the-ping-general-personal-security\/#breadcrumbitem"}]}]