It’s Not So Simple

2013-1204 Computer Spy VirusAlthough I have not heard it for a while, I believe it is still true. The path to recovery for many brain injury survivors consists of two primary tasks: 1) simplify your life, and 2) implement the compensation tools you need to succeed. While the two-step recovery plan is extremely simple to understand and follow, one problem is that survivors tend to oversimplify by taking too many shortcuts. For example, many survivors tend to remove passwords from their internet-enabled devices, create obvious passwords, neglect to use or run antivirus software, create backups, and follow the news regarding internet safety. In an attempt to simplify my life, I definitely made some oversimplification mistakes.

According to the article “2 million stolen passwords for Facebook, Twitter, Google, Yahoo and others leaked online,” written by Helen A.S. Popkin for NBC News, “More than 2 million passwords for some of the most popular spots on the Internet — including Facebook, Twitter and Google — are now a matter of public record, according to a fresh report from SpiderLabs, a research arm from security firm Trustwave. The passwords were not leaked by Facebook and the like, but from thousands of infected computers that collected the data when users logged onto their accounts.”

Now would be a great time to install, update, and run antivirus software on your computer. After you check and remove any virus on your computer, you might also consider this moment to be a great time to change all of your online passwords (email, social media, cloud, etc.).

What Do You Think?

Even though complex passwords will not prevent an attack from a highly skilled hacker, a complex password will prevent attacks from many novice hackers.

  • Are you taking the basic steps to protect yourself on all internet-enabled devices?
  • Have you installed and updated antivirus software on all internet-enabled devices?
  • Have you scheduled automatic antivirus updates?
  • Do you schedule reminders to back-up your pictures, music, and important files?
  • Do you change your passwords at least four times per year?
  • Do you use passwords with upper case letters, lower case letters, numbers, and symbols?
  • Are your passwords at least eight characters in length?
  • Do your passwords use non-repetitive and non-sequential characters?


Click here to read another Beyond Adversity post.

Thanks to Helen A.S. Popkin for writing the article upon which this post is based, NBC News for publishing the article, Yahoo for enabling me to find the article, Trustwave, SpiderLabs, and all the other people who either directly or indirectly made it possible for me to use the picture and text I used in this post.

Click here to read another Beyond Adversity post.

Leave a Reply

Your email address will not be published. Required fields are marked *