Delete your Phone from a Car

Unpair your phone from rental, friend’s and relative’s cars, because until you do, your contacts database is driving around.

Would anything bad actually come from leaving it?  Probably not. In the same way, if you left a copy of your contacts on a USB key * at your friend’s house, it’d probably be fine too. But why do that.

Some infotainment systems can save more than one phone. This one saves 4.

Alena is clearly the most popular.

Don’t name your phone your name. Here’s why.


 (* if you say, ‘I use FB for my contacts list’, please leave my blog)



For Public Computers – it’s a Privacy Mat

How it works:

Step on and enter personal information (shipping address, phone number) then

Step off and the last session is instantly erased. Step back on, a new fresh form awaits.

Clever eh!  Why don’t we see more of these.

How about libraries, airport terminals, internet cafes and store loyalty program signup kiosks.


Spotted at Lee Valley Hardware, that store’s cool eh. I was there buying magnets, and from 2008-10 I included one of their pocket screwdrivers in my thank you cards.



3 – 6% of your IT Budget = Security

About 3 – 6% of your annaul IT budget should be allocated to security.

That’s the finding of the 2014 TELUS-Rotman IT Security Study. Which also found that spending more didn’t necessarily equate to better security. Spending less is an obviously bad idea.

Unfortuantely, the security budget is usually the first thing to get cut.  Which makes no sense, because why bother building something, if you’re not going to protect it?

Moreover, as a small business owner you have a responsibility to protect your customer’s information, especially if you’re processing credit card numbers.

How much are you currently spending?

Compare yourself to the rest of Canada:

About 30% of organizations spend the minimum, I hope you’re higher than that.

Protect your kingdom guys!

Because always remember,
it’s not IF you’re breached, it’s WHEN.

Blog tag = TELUS Security


This is an excerpt from my interview with Hernan Barros, Directory of Security Solutions at TELUS, and Walid Hejazi, Associate Professor, Rotman School of Management, University of Toronto, about their new study, the 2014 TELUS-Rotman IT Security Study.

More about that here.



Lock Picking Tools look like This

Set of lock picks

The L-shaped ones on the right are “torsion wrenches”. Use one of those simultaneously with one of the “picks” on the left.

A lock pick gun

It automates the above process, and while often seen in movies, it’s not that seamless.

It’s way noisier than you’d like it to be, and causes more damage to the lock than picks, leaving evidence of your presence.

(always be mindful of where you leave fingerprints.)

Spotted at SecTor 2014



The ‘Rule of Thumb’ for WiFi Range

An average router’s signal will travel:

– 150 ft inside a structure (eg. your home)
– 300 ft outside

Even if you’re living in the centre of a barren, 1,000 foot field (why are you doing that?), still password protect your WiFi (your SSID) using WPA2.

A good password looks like this:

And change your router password, because when was the last time you did.