You are here: Home

OlympusNet News

by admin last modified Jan 15, 2018 03:41 PM
Mary Robson and Cladonia fimbriata
Mary's passion for lichens is well known among PNW Master Gardeners.
In the enlarged Cladonia image, on the left side is an Amaryllis. To its right is a 
cluster of Cladonia. These charming, delicate 1/4" long cups would fit at an Alice in Wonderland tea party. This Amaryllis-Cladonia pairing was made by Mary.
Mary talks with Craig Weir about lichens starting at 9 minutes into one of
her Nature Now broadcasts at KPTZ. You may hear it at her August talk at Nature Now - Lichens with Mary Robson and Craig Weir.

The recent net-neutrality deregulation restores Internet consumer protection back to the FTC. In 2015 the FCC wrested Internet consumer protection from the FTC. If the Internet worked OK for you in 2015, it will likely be OK for you in 2018. Note that the Justice Department shares antitrust authority with the FTC. The upcoming rollouts of LTE version 5 wireless moves the Internet toward an increasingly competitive environment. The heart of the Net-Neutrality debate centers around weak competition in various regions. It may take years to find out whether this deregulation was a success or failure.

SANS OUCH! for January: Creating a Cybersecure Home
Several years ago, creating a cybersecure home was simple; most homes consisted of nothing more than a wireless network and several computers. Today, technology has become far more complex and is integrated into every part of our lives, from mobile devices and gaming consoles to your home thermostat and your refrigerator. Here are four simple steps for creating a cybersecure home.

Your Wireless Network
Almost every home network starts with a wireless (or Wi-Fi) network. This is what enables all your devices to connect to the Internet. Most home wireless networks are controlled by your Internet router or a separate, dedicated wireless access point. They both work the same way: by broadcasting wireless signals. The devices in your house can then connect via these signals. This means securing your wireless network is a key part of protecting your home. We recommend the following steps to secure it:
  • Change the default administrator password to your Internet router or wireless access point. (Whichever one is controlling your wireless network.) The admin account is what allows you to con gure the settings for your wireless network.
  • Ensure that only people you trust can connect to your wireless network. Do this by enabling strong security. Currently, the best option is to use the security mechanism called WPA2. By enabling this, a password is required for people to connect to your home network, and once connected, their online activities are encrypted.
  • Ensure the password used to connect to your wireless network is strong and that it is different from the admin password. Remember, you only need to enter the password once for each of your devices, as they store and remember the password.
  • Many wireless networks support what is called a Guest Network. This allows visitors to connect to the Internet, but protects your home network, as they cannot connect to any of the other devices on your home network. If you add a guest network, be sure to enable WPA2 and a unique password for the network.
Not sure how to do these steps? Ask your Internet Service Provider or check their website, check the documentation that came with your Internet router or wireless access point, or refer to their respective website.

The next step is to use a strong, unique password for each of your devices and online accounts. The key words here are strong and unique. Tired of complex passwords that are hard to remember and dif cult to type? So are we. Use a passphrase instead. This is a type of password that uses a series of words that is easy to remember, such as “Where is my coffee?” or “sunshine-doughnuts-happy-lost”. The longer your passphrase is, the stronger. A unique password means using a different password for each device and online account. This way, if one password is compromised, all your other accounts and devices are still safe. Can’t remember all those strong, unique passwords? Don’t worry, neither can we. That is why we recommend you use a password manager, which is a special security program that securely stores all your passwords for you in an encrypted, virtual safe.
Finally, enable two-step verification whenever available, especially for your online accounts. Two-step veri cation is much stronger. It uses your password, but also adds a second step, such as a code sent to your smartphone or an app on your smartphone that generates the code for you. Two-step verification is probably the most important step you can take to protect yourself online, and it’s much easier than you think.

Sometimes, no matter how careful you are, you may be hacked. If that is the case, often the only way you can recover your personal information is to restore from backup. Make sure you are doing regular backups of any important information and verify that you can restore from them. Most mobile devices support automatic backups to the Cloud. For most computers, you may have to purchase some type of backup software or service, which are relatively low-priced and simple to use.