05 Sep 2018


Using a computer is not generally thought of as being one of the most hazardous activities to engage in. Yet health and safety risks do exist for both adults and children.

The newer the technology, the more challenging regulating it becomes. Tech companies are collecting new types of data, such as voice data from always-on voice technologies like smartphone virtual assistants and smart home speakers. There are also new, highly advanced ways of processing data, such as artificial intelligence.

Some tech leaders argue that we need to start regulating AI and developing ground rules, while others say that regulation will smother innovation. Members of Congress have already introduced three bills related to AI. Two of them deal specifically with driverless cars, and the other proposes creating an advisory committee for AI-related issues.

More than 400 million people trust Google with their e-mail, and 50 million store files in the cloud using the Dropbox service. People manage their bank accounts, pay bills, trade stocks and generally transfer or store huge volumes of personal data online. Who is ultimately in charge of making sure all this information is secure: the government, the companies or the users?

Knowing how to protect the information that you store on your computer or smart phones is important. You don’t want to give access to this information to just anyone and without proper protection, you could be doing just that!

Hacking and malware

Cyber threats like hacking and malware have been around for some time, so regulations in this area are further along than those in some other areas. Cybersecurity is not something you can just set and forget though, as the threats are constantly evolving. It requires constant vigilance and adaptability. One argument in this space is whether private industry or the government should be leading the way regarding setting cybersecurity standards. The ways in which terrorists use social media to recruit and spread information is one area of concern for the government. Social media has enabled terrorists to reach people all over the world and inspire attacks by homegrown, violent extremists. In United states of America for example where they have the Federal Bureau of Investigation, (FBI), the FBI watches online activity suspected to be related to terrorism to prevent attacks.

How Do you keep Your Computer Safe?

Keep technology locked up literally and virtually. For instance, don’t leave laptops or tablets in the car visible or out at an open houses.

Install a tracking device on valuables.

Install the same anti-virus software and protections as you would on your home or office PC on your phone. Smartphones are susceptible to the same viruses as computers. Moore emphasized that since agents rely on phones and laptops as everyday business tools, a virus can have a devastating financial impact on your livelihood.

Apple has created new technology to protect iPhones called Activation Lock. David Bakke, Editor at Money Crashers Personal Finance and technology expert with a strong knowledge of the real estate industry is excited about the new product often noted as an iPhone “kill switch.” Activation Lock will be released in late 2013 and according to Bakke, the device allows owners of an iPhone to erase all information from their smartphone and turn it off from a remote location (if lost or stolen). The only way the devise can be reactivated is by entering the user ID and password.

keeping the information on your smartphone safe if it has been lost or stolen is to install a tracking device on it. A tracking device can also be installed on laptops and notebooks. Key features to look for in a good tracking device include:

Remote storage and/or secure cloud storage options.

Encryption feature with a permanent delete (quarantine) option.

Anti-theft features which remotely locks or wipes data from a missing/stolen device, and tracks the device via GPS, Wi-Fi, and phone signal. A bonus feature is that some can remotely take picture through the device’s camera to catch any thieves in the act of using the device.

Real-time internet threat protection to block dangerous text links and keep agents safe online while uploading a new listing to their property website and blocks dangerous links sent to agents.



Article by: Busayo Tomoh

Leave a Reply

Notify of