In this era of hacking, data theft and cybercrime, even the greatest tech knacks for adults can turn your loved one into a Grinch if they get hacked. So this year, don’t really offering your loved ones any old-time electronic plaything — give them the gift of security.
This security-focused anniversary gift guide furnishes you, the versed certificate professional, some tips-off and intuitions for holiday shopping that can grant security to your less technological family and friends. They get a great gift, and you get the peace of mind that comes with knowing they’re protected.
Here are six enormous tech endowments for adults looking to gift security this anniversary season.
1. A Security and Privacy Smartphone
A smartphone is the ultimate device for being hacked and saw on. Everyone is concerned about security and privacy, more we all willingly buy and carry a device packed with cameras, microphones, radios for exchanging data wirelessly and strong processors capable of performing malware on the manoeuvre. Then, we download apps from who-knows-where that may have been created by unknown performers for potentially nefarious intents. Many of these apps exist to track, surveil and transfer data from the smartphones they’re installed on privately, and we deepen this issue when we connect to unsecured public Wi-Fi networks.
Smartphones( and how we use them) are the ultimate hacking assets. One nature to multiply smartphone security and privacy for a loved one is to gift them a security and privacy phone — especially if they’re frequent travelers.
While the average phone rolling iOS is generally more secure than the average Android phone, the reality is that nearly all purpose-built security telephones lope Android because Android is more OEM-customizable.
Security-specific smartphones frequently encrypt everything with strong encryption and proposal hardware-assisted security containing specific hardware for storing cryptographic keys and other assure data. They communicate on cellular networks and Wi-Fi through an always-on virtual private network( VPN) and too render good biometrics for authenticated expend, boot and runtime certificate checks and extreme” privacy procedure” access, which disables Bluetooth, the camera and the microphone. A protection smartphone will also install security patches as soon as they become available.
Security smartphones do everything a regular smartphone does and also protect the phone and its user from spoofing, surveillance and data theft.
2. A Video Doorbell With Cloud Storage
One of the greatest additions to the physical security measures of dwellings in recent years has been the video bell. These devices normally supersede the doorbell lay near the breast doorway of a residence. They’re inexpensive and easy to install, and they can improve security in three ways.
First, they act as a discouraging. Anyone from the boldest burglar to the most feeble hall pirate can see the camera from a distance, and by the time they see it, their face has already been captivated. They can then decide if they want to commit a crime based on the knowledge that video evidence of them doing so had already become captured.
Second, they’re great at captivate crimes in progress, so is not simply can they send you a notification on your telephone to call the police, they can also capture crimes on video for evidence in courtroom later on.
And, third, they form uncertainty about whether you’re at home. Many burglars pealing the doorbell to see if anyone’s home before breaking and entering. Fortunately, you can answer a video buzzer from your smartphone and interact with anyone who comes to your doorway. Would-be burglars can’t tell if you’re in the house or on the other side of the world.
Some video bells don’t automatically come with cloud storage for their video footage, so you should ever utter a shadow subscription as one of the purposes of the endow. The conclude for this is that the vapour magnifies the effectiveness of the doorbell. Even if crooks clothe, divulge or steal the video buzzer itself, the video evidence will be instantly uploaded and residence beyond their reach.
Here’s another gratuity: Give a video buzzer to someone even if they already have one. Video doorbells are great for advance. Your loved ones could use them when they’re staying at Airbnb lives by mounting them with putty to install them temporarily. When they return to their leased gap after being away, they can check the cloud-stored video to see if anyone entered the house while they only apart before they walk in. And, if they have to leave a laptop or other gear in the inn area, a video bell can be a evident and effective deterrent that also provides evidence in case anyone opens your room to tamper with or steal your manoeuvres. Note that industrial espionage attacks on business travelers often occur when laptops are left unattended in hotel rooms.
3. A Personal, Portable Phone Faraday Bag
Every form of wireless communication is theoretically( if not actually) hackable, and cell phones tend to have them all. Your average garden-variety smartphone is open to communication via Wi-Fi, cellular networks, Bluetooth, NFC and other boulevards, and each of these is vulnerable to multiple attack techniques.
Of course, you have been able selectively turn these off, but that takes a lot of protruding at arranges, and it can be easy to forget to do. That’s why a Faraday cage — or, more precisely, a Faraday bag — is a great gift that generates instant, total wireless security in high-risk environments such as airfields, inns, discussions and more. These pockets are extremely prevalent in hacker-centric security testifies like Black Hat and DEF CON. A Faraday bag is made from conductive textiles that block electromagnetic fields of all kinds. When a smartphone is in a Faraday bag, it can’t transmit or receive any wireless communications, including phone calls.
You can buy these in the form of purses, briefcases, knapsacks or stand-alone handbags, the latter of which are most practical for most people because they can be sat anywhere. They’re also great for retaining wireless auto key fobs safe from so-called ” relay strikes ,” “replay attacks” or” rolljam onslaughts ,” that enable robbers to use a key fob from inside your house to steal your gondola from the driveway.
4. Cloud Storage
Everyone should have enough cloud storage to keep a duplicate of all their data. Even if the government has backups, preventing a redundant, encrypted copy of everything is a good idea, as cloud fakes can save your loved ones from a variety of modern accidents and attacks.
For example, if they’re criticized with ransomware, and a cybercriminal requirements coin in exchange for decrypting and restoring files( and there’s never a guarantee that they’ll actually do this ), a full photocopy of the data can be restored much faster than mas backups can. It’s always reassuring to have redundant options for storage — one cloud backup and another mas copy.
Another scenario can develop at the border when we travel. U.S. Custom-mades and Border Protection( CBP) are getting increasingly active with their digital huntings, which can involve downloading everything from your telephone, tablet or laptop. That’s another fake of the data in the wild, and there’s no telling what might happen to it. Nonetheless, the CBP will never stroke cloud data, even if it’s accessible through the invention they’re probing. It’s good rehearse to travel with reformatted inventions devoid of data and to access them from the shadow when you’re abroad — over lock, encrypted directs, of course.
Yet another good reason for having abundance of shadow storage is the need for space to store photos and videos. Most parties nowadays make gigabytes of word-paintings and videos and then automatically back them up to a photo service. These services often let you accumulate unlimited photos, as long as they can be contracted. As a solution, most people have access exclusively to a single imitation of their most precious photos, and those fakes are constricted different versions of the originals. Access to abundant vapour storage implies people can store a second, redundant mimic in the original, uncompressed form.
5. A Keystroke-Encrypted Keyboard
It’s possible to spoof a wireless keyboard from 100 meters away, and a PC keyboard can disclose everything — usernames, passwords, credit cards items — anything typed online, in private emails and secure text words is feasible to captivated via keylogging and relayed to cybercriminals.
That’s why a keyboard with strong encryption makes a great gift. Make sure the keyboard comes from a highly reputable merchant and can be updated with the most recent developments defence patches.
6. Encrypted Mobile Storage
Legendary movie director Francis Ford Coppola famously get stripped in Argentina in 2007. Robbers is not simply stole his laptop, but also his backup drive, which contained his only copies of family photographs, movie ideas and other documents. The reading in Coppola’s story is often expressed as:” Ever have gloomed backups , not just regional backups .” — and it’s a critical lesson.
But there’s more to learn from this case, as Coppola didn’t only lose his data; the burglar likewise gained it. In addition to backing up redundantly and remotely, Coppola likewise ought to have encrypted the local data. That channel, when the burglar embezzle his drive, they wouldn’t have access to it.
Anyone with data to keep can benefit from a regional storage drive that encrypts its contents.
What These Talents Have in Common
Since you’re reading this article, you’re in the minority of people with a high degree of awareness around protection, how it wields and why it’s important. But if statistics are any indicator, your loved ones may be less inclined to make specific actions necessary to provide for their own security. Changing behavior is hard, but buying self-assured inventions is easy.
What these tech endowments for adults have in common is that they provide security without knowledge or behavioral conversions. The security is built into the products, which are capable of automatically offer the benefits of cloud backups, encryption or physical defenses against intruders and malware.
In other paroles, you can give the gift of security without lecturing loved ones on their behavior or prescribing restrictions on what they can and cannot do. Fortunately, by simply yielding them the freedom talents, you can enhance their personal security significantly. Secure machines like these not only make for a great holiday season, but also a happy brand-new year.
Read more: securityintelligence.com