Protecting yourself online dating
If a person's smart phone is lost or stolen, they may now contact the carrier and ask to have that device remotely disabled. Army Criminal Investigation Command, or USACIDC, initiative to partner with the Army community by providing a conduit for members of the Army family, to help prevent, reduce and report felony-level crime.These "Bricked" phones are of little or no use to thieves because they can't be reactivated after being sold on the black market. The USACIDC, commonly known as CID, is an independent criminal investigative organization that investigates serious, felony-level crime such as murder, rape, sexual assault, robbery, arson, fraud, and even cyber crime or intrusions into the Army networks (see CID Cyber Lookout).Ensure all portable electronic devices are properly password protected, especially any device with personal communications account information (email, Facebook, Twitter, Linked In, etc.). In recent years, roughly 40 percent of all robberies now involve smart phones and/or tablet computers (i Pad, Kindle Fire, etc.).Thus endangering the security of the personal information on the stolen devices.
Also, ensure your antivirus software program updates automatically and scans your computer on a recurring schedule. Current Department of Defense employees (excluding contractors, retirees, and family members) with an active AKO account can download antivirus software for free by logging in to the United States Army Computer Emergency Response Team website and selecting the Antivirus link. When signing up with an app store or downloading individual apps, you may be asked for permission to let them access information on your device.Users can and should change this by accessing the Privacy Settings/Profile Information usually found under the respective Account tab. Never disclose private information when using social networking websites.Be very selective about who you invite or accept invitations from as cyber criminals use false profiles to gain access to personal and private information, such as birthdates, marital status, and personal photographs.Sometimes, even the amicable ex can turn spiteful and downright nasty when the other starts dating, for example.
Because you never know what can happen, it’s vital to protect your money and assets from the potential ravages of divorce.This will remove your public preview from Google, Bing, and Yahoo search returns.