SecurityWhen we work together, I treat your stuff like it’s my stuff. And I’m extremely thoughtful about my stuff.
To live, work, and play in the digital world means taking precautions against malware, viruses, and ransomware. It also means being prepared for hardware failures and digital mishaps. Here are the protocols and practices I have in place so you can be confident in how I manage your important content.
I work in an Apple environment, using a combination of iPhone SE, iPad Pro, MacBook Pro, Apple Watch, and iMac. I have a maximum lifecycle of 3 years for my hardware. Besides the performance benefits of modern machines, I can take advantage of new hardware security measures that are introduced.
I do almost all of my work on the cloud, using services from Apple, Amazon, Google and Dropbox. This means that all of the files stored on my computer are automatically synced to online services and storage. I can access the work I’m doing for you from any of my devices at any time, or online. Note that this doesn’t mean you have to work with any of the services I use, only that my files have redundant storage.
The only files that don’t get stored in the cloud are very large files, like when I’m working on a video production. More on that in a bit.
I use passwords that are automatically generated with software tools whenever I create new accounts. These are random, complex strings of characters that I don’t choose – a machine does. This creates incredibly strong passwords that can’t be easily guessed or hacked, even with sophisticated hacking tools. New passwords are generated for any new account I create online – if a security breach happens on some site where I exist in their database, hackers won’t be able to use that password to access anything else I do online.
I use Two Factor Authentication (2FA) whenever it’s available from any service I use online. 2FA requires that if an account or service I use is accessed from a new or unrecognized computer, it takes more than just a password to get in – it also takes a secret code that is sent only to my devices.
Finally, all the passwords I use are encrypted and stored securely in a few different tools I use. These tools also notify me if any website I have a password to has experienced a data breach, so I can change the password for that site or account.
Sometimes as we work together I create subscriptions, make purchases, or otherwise need to create a password on your behalf. I’ll use the same protocols explained above to do this, and/or I’ll create a complex string of characters for initial password setup and then direct you to change the password to something of your own when I pass ownership over to you. Anytime I need to store passwords that you provide me, I do so in a secure, encrypted file that’s stored in a digital vault.
All of my computers are protected by powerful anti-virus protection software for Mac and scanned weekly for viruses. This software protects from all Mac related threats, and also prevents any systems from passing on PC viruses. The software uses award-winning technology to protect against online threats including viruses, Trojans, adware and spyware.
This anti-virus software is also actively protecting my iOS devices like iPhone and iPad, protecting and notifying me of things like infected emails coming in to my phone. It even lets me know if an email address in my contact list may have been involved in a security breach somewhere online, so I can keep an eye out for anything suspicious coming from that address.
I have multiple backup protocols in place. the online storage services I use (mentioned above) back up the latest versions of files I work on and also saves all prior versions for 30 days. In addition, I use a robust online backup service that backs up all of my files (including the big videos files I mentioned earlier) and stores them, encrypted, in a secure datacenter. I don’t rely on any external drives for meaningful backups. This means if my office burns down or all of my devices explode or something gets lost or stolen, the files we work on together are safe and sound and can be restored with the touch of a button.
Finally, all of my devices are protected with biometric measures and/or passcodes. In the event a device is lost or stolen, I have multiple tools at my disposal to immediately lock those devices so they’re inaccessible, wipe the devices entirely of files if necessary, and locate them with GPS so I can work with authorities for recovery.