Which Privacy Tools Do You Need

Did you miss the headline? “Millions Affected by Massive Data Breach” If so, just wait until tomorrow, when another example of how many companies are with your privacy will be announced. Many consumers are seeking additional means to protect their privacy themselves, disregarding pious assurances from companies that obviously don’t care or don’t know how to protect their customers. Here are some of the most often recommended privacy-protection tools, and some thoughts about how well you can expect them to work…

Yet Another Breach of Your Private Information?

In just one of many recent examples, over two BILLION customer accounts were stolen in March 2019 from Verifications.io, an email marketing firm. Forbes reported that the stolen data includes emails, phone numbers, addresses, dates of birth, social media account details, credit scores and mortgage data.

Like I said, that’s just one of many. The Identity Theft Resource Center publishes a monthly Breach Report that identified over 80 data breaches in January 2019. The report shows the name of the company where the breach occurred, the types of data compromised, and the number of affected records. This handy infographic summarizes the data breaches from 2017 and 2018. Business, healthcare, and banking were the most common targets in the 2,800+ breaches from that time period.

Were you affected by any of those breaches? With a total of over 2.5 billion consumer records affected in the past two years, and over a billion Yahoo accounts compromised in 2016, I’d say you would be lucky to escape with your privacy unscathed. Valuable data such as account passwords, social security numbers, financial data, and credit card information is sold by the pound on the Dark Web. Check out the privacy tools below, for some tips on identifying if, when or how you may have been affected. I’ve also got some tips on how to protect what’s left of your digital privacy.

Have I Been Pwned: Enter your email address and this site will tell you if it has been compromised at any time in the past. (The term “pwned” is geekspeak for “owned,” or “defeated.”)

Protecting your online privacy

BreachAlarm is a similar, but more proactive service that allows you to check anonymously if your email account has been hacked, leaked or compromised. They comb the dark corners of the Internet in search of stolen password lists that have been posted online. You can sign up for email notifications about future password hacks that affect you.

Outline VPN by Alphabet, Inc., parent of Google, is a life-saving boon for journalists and activists in countries with repressive governments. It is somewhat effective for ordinary citizens free-roaming the Internet.

A VPN (Virtual Private Network) provides encrypted connections between two or more computers to keep communications between them private. But all of the computers on a given VPN must have the same VPN client software and permission to be on this private network. You may have VPN client software on your machine, but that “cat” video site where you spend most of your work day does not. The connection from the video site to the VPN server is wide open and can be traced back to you. However, it is neither easy nor quick, and random citizens are not worth that much of a hacker’s time and trouble while so many of them fall for traps easily set.

More Privacy Tools (and one to avoid)

The Facebook Container Add-on For Firefox is nothing more or less than a private/incognito browsing window fitted into a browser tab. When first installed, the add-on deletes all cookies set by Facebook, including cookies set by other sites where you have used your Facebook ID to register, comment, or like. You interact with Facebook only in this special, blue-colored tab. In other tabs, you can interact with other sites and Facebook will not be able to track your Web activities. The downside is that you won’t be able to “sign in with Facebook” on other sites or share their pages to your Facebook page. Oh, and you’ll have to use Firefox, eschewing the many advantages of Chrome.

Password managers are vital tools for privacy, security, and remembering passwords. If you’re not using a password manager, you are probably violating most of the rules for keeping your accounts secure. Here’s an article Can This Robot Manage Your Passwords? has links to Roboform and some other recommended password manager apps.

The Google Password Checkup tool will alert you on the spot if the username and password you are about to enter on a website have been compromised. Password Checkup is a Chrome browser extension that checks your input against a database of four billion login credentials that Google knows have been compromised.

Privacy.com is a service provider of single-use debit card numbers. You sign up by giving Privacy.com the keys to your checking account – username, password, and answers to security questions. I just did it myself. Wait, what?! NO, I did not, and neither should you! That’s not how virtual payment card numbers are supposed to work.

A virtual payment card number is, essentially, a non-physical version of your “chipped” credit or debit card. It’s a random number that fits the required pattern of a valid credit/debit card number, generated at the point of an online sale. It is tied to your real card number for one transaction only, after which it won’t work for any payment. Credible institutions such as American Express, Bank of America, Capital One, and Citibank offer virtual card number services. Never get such things from strangers on the Internet, even if your uncle Joe knows a guy in a nearby city who lives near a police station, and he met a nice lady who recommended them.

What steps do you take to protect your online privacy?

Have a great week from all of us at ZI

Delay the Windows 10 Spring 2019 Update?

This year’s first major feature update to Windows 10 (Version 1903) is expected to arrive in April. Microsoft allows some customers to delay major updates for up to one year. Are you among those chosen ones? Should you postpone major updates or let them happen on schedule? Read on to learn the answers to these and other burning questions about how to defer the Windows 10 Spring update…

Should You Postpone Windows 10 Updates?

First, if you activated Windows 10 less than 30 days before any major update is due to happen, you get a pass; the update will not come to such “young” Windows installations. Presumably, that’s because infant Windows 10 installations are born current.

Second, if you have not been updated to the last major update, then the next one will not be delivered to you, and you will not be able to install it manually. The 2018 Fall Update is Version 1809 (Each Version number consists of the year [‘18] and month [09 – September] of the update’s scheduled release). It is important to have Version 1809, else Version 1903 will not install. (You may see references elsewhere to the “April 2019 Update” or “Version 19H1” — both are alternate or code names for Version 1903.)

You can check to see if Version 1809 is installed by typing “winver” in the “Search Windows” box and pressing Enter. You should see “Version 1809” on the second line of small type, under “Microsoft Windows.”

Windows winver windows version

If you need to install Version 1809, use the Media Creation Tool to do an automated re-install of Windows 10; it’s the easiest and most foolproof method. You can find instructions on Microsoft’s Download Windows 10 page.

If you have the Home Edition of Windows 10, you cannot postpone major updates. Only users of Windows 10 Pro, Enterprise, and Education Editions are allowed to delay major updates, presumably because their IT departments carry more weight with Microsoft than your family does. However, some Home users might be able to upgrade to Pro for free. See the ZDNet article How to upgrade from Windows 10 Home to Pro for free for details.

According to some beta testers of Version 1903, though, there is some relief for Home users who wish to defer updates. On the Windows Update settings page, there is a new option which allows Windows 10 Home Edition users to “Pause updates” for up to 35 days. This won’t help if you’re a Home user wanting to delay the 1903 update, but it will help when the next update rolls around in the Fall.

Should you defer major updates if your Edition of Windows 10 permits it? It depends on how well Version 1809 is serving you right now. If you remember, Version 1809 rollout was kind of a nightmare. Some users lost files from their Documents and Pictures folders. Others were having audio problems, or experiencing the Blue Screen of Death. There were also some glitches in the Version 1803 (Spring 2018) update process. Those problems were eventually fixed, but Microsoft was rightly criticized for a lack of quality control. The company says they’ve taken steps to make sure that future updates are fully tested and will roll out smoothly.

I don’t feel that any of the new features in the Version 1903 Update (see below) are so important that I must have them as soon as it becomes available. So just to be safe, I will defer the Version 1903 update a few months to give Microsoft time to iron out the inevitable wrinkles.

What’s Coming in the Windows 10 Spring Creators Update?

Pureinfotech has an exhaustive (and exhausting) review of all new features coming in Version 1903. Here are a few that I found interesting:

  • You’ll find a “acrylic effect” on the sign-in background. The translucent texture looks cool and moves the controls closer to the password box.
  • The Start menu has a simplified default layout, using a one-column design with reduced top-level tiles.
  • The taskbar will show a “disconnected” icon when there’s not an internet connection (ethernet, wifi, or cellular) on your device.
  • The taskbar notification area includes a new microphone icon which appears when your microphone is in use, shows which app is currently accessing it.
  • Updates to File Explorer include a new taskbar icon, “friendly” file date formats, and an improved Downloads folder which shows the most recently downloaded files at the top.
  • Windows Sandbox is a new feature that used hardware virtualization to safely run untrusted applications in an virtual machine environment without harming your computer.
  • Windows Security includes a new “Protection history” feature that shows information about virus detections, and Tamper Protection for Windows Defender.
  • The list of new features gets a little tedious. If you can live without those goodies few months, you might avoid the pain of a new version’s bugs.

How to Defer Windows 10 Updates

So let’s see exactly how to defer the Windows 10 Version 1903 Update, The following instructions assume you have Version 1809 (Fall 2018 Update) installed.

Go to Settings > Update & security > Windows Update, then Advanced options. You will see three options.

Option 1 lets you defer updates until Microsoft declares them “business ready.” That’s a little fuzzy, but you can expect it to give you 2-4 months after an update’s initial release. To enable this deferment, simply change “Semi-Annual Channel (Targeted)” to “Semi-Annual Channel.”

Option 2 works only on Enterprise, Education, and Pro Editions of Windows 10. It lets you add additional time to the update delay set by Option 1. You can add as many as 365 days, in which case you won’t see any major updates until mid-year, 2020.

Option 3 has nothing to do with Spring or Fall feature updates. Instead, it lets you defer important security updates for up to 30 days after their release date. I would pick about one week, giving Microsoft time to fix any bugs while limiting the time my system remains vulnerable.

If you plan to ride out the (quite possibly imaginary) storm of the update, the first two weeks of April should be a time of heightened backup discipline. Create a new System Restore Point at least once a week until you get Version 1803. Make a system image file on an external drive, or store it in the cloud. (Have you make a backup recently?)

Remember, 99% of the things we worry about never happen. Just be prepared in case they do.

Have a great week from all of us on the ZI Staff

What Did I Just Watch? Meet Mrs. Mayo

Meet Mrs. Mayo: Foul-Mouthed Old Avatar Hilariously Rants & Advises About Second Life Drama on YouTube

While most Second Life You Tubers are focused almost entirely on virtual fashion and avatar poses (near exclusively emceed by avatars in their early 20s), Mrs. Magnolia Mayo stands out in the crowd: Old, cranky, frequently dropping F bombs, always entertaining, she’s an advice columnist for the metaverse, responding to questions sent anonymously to her blog right here.

Watch another recent video below, but you’ll probably just want to subscribe and watch them all (some of which are more serious than others).

 

 

Thanks to Cajsa for the tip!

Now while I never watch much youtube in secondlife or about secondlife I found this amusing to say the least. I can’t think of a time I laughed more except back in the Esteban Winsmore days. Lets face it this was annoying but it still showed that having a sense of humor outweighed the drama in the everyday life of SL. Laughter Is Truly The Best Medicine. But do we need more of this? YES! YES! YES!

Have a great week from all of us on the ZI Staff

Is VR Likely For Second Life?

VR for Second Life™? Hamlet just wrote about SL and VR. See Is Second Life Too Technically Limited To Create A VR Version For It?

One of the people that came to SL from Myst Online, Adeon Writer, is quoted and has opined in the article’s comments about what is technically possible.

 

Like most things, anything is possible. But that doesn’t say anything about whether it is likely or reasonable. Both likely and reasonable are generally matters of opinion and the answers are a matter of who you ask. And in matters of opinion, there is generally no final or definitive answer. So, it is a matter of understanding another viewpoint and reasons for their opinion.

So, will we have VR or can we have VR? The will and can questions have very different answers… probably. We know we can have VR because it has already been done. So, that answer is out of the realm of opinion. The Lab made a VR viewer for SL years back. Two more VR viewers have been made since then. One shortly after the Lab discontinued their VR viewer. Another just recently. So, can? Yes. As a fact, it has been done.

The will question is more complicated. To some extent, it depends on how one defines VR and where one sets the standards. While the ‘standards’ are a more objective measure human factors contribute and often dictate our personal experience and preference. Simulator Sickness is real. Some people can tolerate more and others less. So, we have a ‘how many’ question to factor in. The gaming industry has a set of standards they believe fit the majority, with majority meaning 90%+.

On a top of the line gaming-computer, SL can meet the industry standards… mostly. However, the SL user base is not running on top end gaming machines. Only a small percentage are. So, it is fair to say for the majority of users that SL does NOT meet the industry standards. Consider this a strike against VR for SL. But, with time, that will change. Thus the i9 images.

Then there is a technical challenge, which is the reason Sansar is being developed. And here we get deep into what VR-users are expecting. VR users want or expect a more immersive experience. Head and hand-arm animation of the avatar is expected by some to be a real-time thing of VR. You move your RL hand and everyone that can see your avatar sees its hand move. Your motions are transmitted to others via your avatar in real time. Even in Sansar, this is not 100% what happens. In SL we are nowhere near it. This is a problem inherent in the way SL was built.

Consider the tech. Our avatars move using animations. They have nothing to do with what we the avateers (like puppeteer) are physically doing. The mechanics of the system are simple enough. The viewer tells the server what we are doing, standing, walking, running, etc. It also tells the server which animations to play for that activity. The server tells everyone else what we are doing and what animation to play. It gives us and them the animation from the asset collection.

In SL we are not all in sync. When I walk putting my right-foot forward others may see my left-foot moving forward at that same instant or see me mid-stride. Those synchronized line dances… those are a fluke of how the viewer works. The system literally makes no attempt to sync things up in everyone’s viewer. It just hands out animations and says play as fast as it can.

Remember. An animation file contains the instructions for how to move each bone of the avatar. So, we can only move in ways that are ‘on file’ and in a specific file in the asset warehouse. Every movement has to be pre-scripted.

So, real-time animation anywhere in VR is rare. High-Fidelity, Rosedale’s new project, is attempting to add real-time facial expressions. Sansar isn’t, AFAIK. In SL we have facial animation HUDs that control avatar expressions and no effort to do any real-time animation. In SL we FAKE it, like the news.

So, VR… virtual REALITY isn’t likely… for most uses we call VR, not just SL. This isn’t something just SL has a problem with. It is an industry problem.

SL may get a simulated VR… we really need a more definitive name for what we see in Sansar and Second Life. We are watching a simulated virtual world via a 3D-rendering-headset we call a VR Headset that in our case, the SL case, has no component of reality. The headset doesn’t make what we are seeing virtual reality, which seems to be how everyone is using the term to hype their products.

Will Second Life get VR? In the literal meaning of the term, NO. Never… at least not until we get quantum-entangled network cards and more bandwidth. Quantum CPU tech for desktops would be nice, while they are at it. More speed and power are needed.

Will Second Life get what I am calling simulated VR? Probably. We are reasonably close now. But not real soon™.

The Lab is moving the server-side of the system to the cloud. That opens the possibility of more computer power at less cost. Desktops are currently looking toward Intel’s top gaming CPU the i9-9900k (3.5GHz which overclocks to 5GHz, with 8 cores and their threading thing making for 16 threads using 14nm tech). This year we will see the 10th generation CPU’s expected to use 10nm tech. So, more power and speed are coming.

For me the question isn’t will, but when?

Have a great week from all of us on the ZI Staff

[DO IT NOW] Google Password Checkup

 

I thought it would be a good idea to share this post I read about Google Password check. A new Chrome browser extension from Google will alert you if the username and password you are about to enter on a website have been compromised. The Password Checkup extension checks your credentials against a database of four billion login credentials that Google knows have been compromised. I recommend that you give it a try, read on to learn the details…

What is the Password Checkup Extension?

Password Checkup is an optional add-on for the Google Chrome browser that helps you identify online accounts that have been affected by data breaches. If you’re not familiar with the term, a data breach occurs when hackers break into a poorly secured website, and steal personal information stored there. Unfortunately, this happens with alarming regularity, and can impact tens of millions of users, revealing some combination of names, addresses, phone numbers, social security numbers, birth dates, driver’s license data, and of course usernames and passwords. That data is bundled up and sold on various black markets online.

Dashlane, which offers a popular password manager, published a list of the 20 Biggest Data Breaches of 2018. Among them are Marriot (500 million records including names, addresses, phone numbers, email addresses, passport numbers, and dates of birth); Exactis (340 million records including names, addresses, email addresses, phone numbers, and other personal information such as habits, hobbies, and the number, ages, and genders of the person’s children; and Twitter (330 million plain-text passwords). Going back to 2017, there was the horrific Equifax breach which affected 143 million Americans, and included names, social security numbers, birthdates, addresses and, in some instances, driver’s license numbers and credit card numbers. And those are just the highlights. If you’ve done business with Uber, Verizon, Under Armour, Panera Bread, T-Mobile, Saks, or Lord and Taylor, your personal information may be “out there”.

Wherever you sign-in, if you enter a username and password that is no longer safe due to appearing in a data breach known to Google, you’ll receive an alert. Please reset your password. If you use the same username and password for any other accounts, please reset your password there as well.

If you get an alert, you should change your password right away, even though password resets are complicated and time-consuming. When it’s time to choose a new password, let Chrome suggest a strong one; right-click while your cursor is in the password box and select “Suggest strong password” at the top of the context menu. If you choose to use the suggested password, Chrome will enter it and save it to your passwords list.

It’s not clear where Google got its four billion compromised credentials. The company says that it has reset over 110 million Google account passwords in the past two years; presumably, those compromised passwords are in the database. Google doesn’t say

where the rest come from or how quickly they are added to the database. But my guess is that they keep tabs on the major data breaches and incorporate that information into their service.

Password Checkup addresses the problem of password re-use. If you follow the best practice of using a unique password on every site, you only have to reset one site’s password if your password is compromised. But if you have re-used a password on multiple sites, you probably don’t recall which ones need to be reset. Password Checkup will alert you each time you try to use compromised credentials. So it is of great use in plugging the very common password re-use vulnerability.

Google is not the first to market with a password checker. For nearly a year, the 1Password password manager has integrated with Troy Hunt’s Pwned Passwords database, which currently contains about half a billion compromised credentials.

Unlike Google, 1Password downloads all of the compromised credentials to each user’s machine. While this avoids uploading a user’s credentials to 1Password’s server, it puts an ever-growing burden on the user’s computing resources. Google, instead, works in the cloud with encrypted copies of user data, so Google never knows what the user’s credentials are. Google’s password manager is free, while 1Password costs about $3 per month for a single user.

Google addresses the privacy issue of Password Checker thusly: “Password Checkup was built with privacy in mind. It never reports any identifying information about your accounts, passwords, or device. We do report anonymous information about the number of lookups that surface an unsafe credential, whether an alert leads to a password change, and the domain involved for improving site coverage.” You can learn more about how Password Checkup works.

This is the first public release of Password Checkup; even Google admits there’s room for improvement in the future. Making it work with more log-in screen formats is a high priority. I would like the extension to check all of my saved passwords in one batch and show me which ones need to be changed. Some automation of tedious password-reset routines would also be very welcome.

But what would really make my day is the elimination of passwords altogether. I long for the day when bio metric or hardware key security becomes the universal norm. Then we will have much less to remember, maintain, and worry about. A lot of progress has been made on the mobile device side, with fingerprint, voice and face identification options.

Have you checked to see if your email addresses and/or passwords have been compromised?

Thanks to Bob for this post as always

From all of us on the ZI Staff have a great week.

 

Why Backup? Here Are NINE Good Reasons

It’s a really good question… why should you bother to make backups? It’s especially understandable if you’ve never experienced any sort of data loss. But I’ve got a list of NINE reasons, some of which may surprise you. Read on for that list, and ANSWERS to some of the best questions I’ve received about backups…

Do I Really Need to Back Up My Files?

I’m passionate about making sure that important files — programs, documents, emails, contacts, music, photos, and financial records — are NEVER lost due to a data disaster.

My goal was (and is) to teach people how to make backups easily, inexpensively, and automatically.

Over the past several years, I’ve received some really great questions about backups. I’m going to answer some of those questions here, but first, let’s get into my list of reasons why you need to make backups.

NINE Good Reasons for Backups

1) Hard drives don’t last forever. — Studies on hard drive life expectancy show that 22% of hard drives will fail in the first four years, due to factory defects, random failures, and parts that wear out. Failures due to factory defects tend to happen in the first 18 months of service. How old is your hard drive, and how lucky do you feel?

2) Viruses, power surges, and natural disasters happen. — Ransomware is spreading like wildfire online. It will lock all your files, and permanently delete them if you don’t pay a hefty ransom within a few days. Power surges can scramble data or zap files. Fires, floods and F5 tornado’s can tear the stuffing right out of your shiny gadget.

3) Stuff gets lost or stolen. — Even the most reliable hardware and top-notch virus protection won’t help if your laptop, tablet or smartphone falls into unfriendly hands. Only a backup will save your bacon.

4) Mobile gadgets break or get wet. — Have you ever dropped your mobile phone in a dirty slush puddle, or treated it to a wash/spin/dry joyride? I have. Have you ever dropped your laptop, watched it fall in slow motion, hoping that it will survive the fall? Been there, too.

5) Passwords get lost. — You followed the advice of the experts to use unique, secure passwords for your computer and your online accounts. But then you forgot… was it “2Much-L0ve4U” or “2Much-4U-2Love”? Dang it!

6) Accounts are compromised or frozen. — Your password was “PASSWORD” and you’re surprised you got hacked? Sometimes for no discernable reason, people get locked out of their Gmail, Yahoo, AOL, Facebook or other online accounts. Was it a software glitch, a denial of service attack, or did a hacker gain access to your account? You may never know. And without a backup, you may never again see your saved emails, contacts or files.

7) Data breaches are becoming commonplace. — Every week, it seems there’s another high-profile data breach, resulting in millions of usernames, passwords and other critical data becoming public. Equifax, Yahoo, Target, Chase Bank, American Express, Home Depot, Apple, Sony… who’s next, and how will it affect you?

8) Human error. — None of us are immune to the occasional finger fumble, brain freeze, or senior moment. Files or folders may be accidentally deleted, and sometimes you don’t notice until it’s too late.

9) Incorrect assumptions. — I’ve learned that some people just assume that their computer is automatically making backups. If you didn’t do something to make it happen, it’s not happening. And many users who have some sort of backup routine are not backing up the right files, or all the ones that need protection.

Your Backup Questions Answered

I’ve received hundreds of questions about backups. I can’t answer all of them here, but I’ll highlight some of the most interesting and common ones below:

Q: “Which free backup software do you recommend? Also, is there a paid product that you would recommend?”

Macrium Reflect backup software

A: My current favorite is Macrium Reflect. There’s a free version which is quite good, and a paid version that adds some extra features I like. Windows 7 includes the Backup and Restore feature, but I find it a bit clunky. If you have Windows 10, the File History feature is a really good option for PARTIAL backups. I used Acronis True Image (paid software) for years, but the recent versions have become bloated and buggy. Lots of people tell me they like EaseUS Todo Backup (also free) but I’ve not used it enough to recommend it.


Q: “What exactly is ‘The Cloud,’ and how safe is it?”

A: Cloud storage or cloud backup refers to files that are stored on an Internet website (sometimes called a server) instead of your computer’s hard drive or other local storage. The term “cloud” is used to create the impression of a giant hard drive in the sky, which provides convenient access to files that reside on the Internet. Examples of cloud storage providers are Google Drive, Microsoft One Drive, and Dropbox.

I maintain that data stored in the cloud is MUCH safer than files stored on a local hard drive. Do you use 256-bit encryption for your sensitive files at home? Do you have a staff of highly-trained professionals constantly monitoring your computer for break-in attempts? How about strong physical security that includes gated perimeter access, 24×7 on-site security guards, and security cameras? Do you have a fire detection and suppression system, backup power, and a disaster recovery plan in the event of hurricane, flood or earthquake? You can bet your cloud storage provider has all that and more in place to safeguard your data. It’s probably much easier for the NSA to hack into your home computer than to get into any one of these cloud servers. Some people point to all the high-profile breaches reported in the news, but it’s important to note that none of those compromised companies were cloud service providers, who focus on data security above all else.


Q: “What is the difference between a full system backup and a file backup? What is the difference between what *should* be backed up and what *must* be backed up?”

A: In a nutshell, a full system backup (or image backup) includes EVERYTHING on your hard drive — the operating system, program files, and your personal files. A file backup usually refers to a backup that only includes personal files such as documents, spreadsheets, music, photos, etc. That’s better than no backup at all, but my recommendation is to make regular image backups, followed up with a series of “incremental backups” that catch any changes since the full image backup.


Q: “If I get hit with ransomware or other malware, will that also affect the backups on my external hard drive, thus making recovery impossible?”

A: Yes, that can happen. That’s why I recommend backing up your backup. One way is to have two external drives, which you swap out weekly or monthly. That’s unfortunately a manual process, but I discuss other options in my ebook.


I Object!

I’ve heard lots of reasons for not doing backups. The most common one is “I’ll do nothing and HOPE for the best.” But there’s a problem with that. (Actually 9 problems, see above.) HOPE is the strategy of the fearful, the uninformed, and the procrastinator. In this case, “doing nothing” is almost certain to lead to disaster. BUT… if you knew you could protect ALL your information on ALL your devices with little or no expense, and make it happen automatically, wouldn’t that be great? Wouldn’t it be awesome to have CONFIDENCE instead of HOPE?

Other people say “Backups are too complicated or time consuming.” That might have been true 10 or 15 years ago. My first backup system used a tape drive that took forever to run, was prone to error, and was hard to set up. After that, I tried making backups on diskettes, CDs and DVDs. That was a hassle, and I never remembered to do it as often as I should have. But today we have “plug and play” devices that will start making automatic backups as soon as you plug them into your computer. Getting started with an online backup service is almost as easy, and both options can be configured to run at night, or when your computer is idle.

Another one I hear often is “Backups are too expensive.” As I mentioned earlier, there are some really good free backup software options, and some clever ways to access gobs of free online storage. Don’t trust your data in the cloud? A 1-terabyte external hard drive costs less than $50 now. Still too expensive? How about a 128GB USB flash drive for about $20?

Have a great week from all of us on the ZI Staff