Directive Blogs
Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Wearables: How Yours Could Be Infiltrated
Did you know your wearable device could be silently connecting to Bluetooth devices and Wi-Fi networks you never approved of?
In this Micro Training, we’ll explore how hackers exploit these invisible connections, as well as how to lock down your wearable and keep your sensitive information out of the wrong hands.
Quick Tips
- Disable auto-pairing, making it so approval is required for a Bluetooth connection.
- Avoid public Wi-Fi, but if you must use it, make sure to connect to a confirmed Wi-Fi network provided by an establishment.
Comment for this post has been locked by admin.
Comments
No comments made yet. Be the first to submit a comment