So recently in the news it Facebook had terrible storage of passwords for users. Which is absolutely terrible passwords should stored safely and not in readable text documents. And facebook book employees had access to this so they could potentially access all users profile. so basically there is a privacy issue here.
Are Biometric a Safe Security Safe?

Some of you use biometrics as a pass on a daily baisis for example from your phone you may have a fingerprint reader, Face Scanner, Voice recognition, Iris Scanner etc. Do you guys ever wonder how safe it really is? In an article written by a very well known antivirus company Nortan tells us that your biometrics is safe because no one can take your face or your eyes because its apart of your specific DNA. For an example when police grabs DNA for evidence at a crime scene then will match it up with the criminal. No one can steal that information because that is apart your DNA.
Mobile Phone Payments
Since Mobile phone payments at major stores are getting so popular how safe is it to pay from your phone at store from big companies like Apple pay and Google pay?
In a recent article written by Thebalance they tell us that Mobile Payments are much safer because it makes it much harder for hackers. They say that…..

“That’s because your actual financial information isn’t transferred during the transaction. Instead, a coded version of your credit card details is used to authorize payment”
And the way we can protect our selves from this issue is. Only use it when it is a trusted platform, Download only trustworthy apps, Being able to Lock your phone remotely,Use a strong Password, Don’t Send Sensitive Information Through Public Wi-Fi, Use a Credit Card because you could be able to challenge it if it is fraud activity.
https://www.thebalance.com/tips-for-safe-mobile-payments-4137835
The Need For Computer Security
1. Email is the primary mode of communication
Email serves the same purpose at most organizations that phone calls and corporate memos did in the 1990s. Because there is proprietary information being passed back and forth, each organization assumes the responsibility of ensuring every email account is secure.
Security specialists may be asked to help onboard the system, and then protect the organization from potential risks as they arise. In the event that an employee’s email is breached, it’s up to the specialist to identify – and eradicate – the problem. Once that’s done, the next priority becomes ensuring that all the other in-house accounts remain secure from that threat as well.
2. Online searches are essential
Employees at many organizations are required to do some online searches. The problem is that the more searches that are done, the higher the risk that an individual might click on a contaminated link. Within minutes the entire computer could be infected.
Network specialists are trained to set up firewalls that can either warn users of a potential threat before allowing them to access a page, or forbid them from accessing any unsecure pages altogether. This minimizes the organization’s exposure and forces every user to think twice before clicking.
3. The occasional breach is unavoidable
The larger the organization, the more common it is for a simple virus to infect the system. Network specialists are there to put out the fire when it does occur, and they’re essential to the organization in that manner. Depending on the specialist’s role, this may mean accepting the occasional independent contract, or it may mean working for an employer full-time.
The most important duty for a full-time specialist is to keep an eye out for emerging threats before they arise. Lost or breached information can represent a major expense, and the more vigilant a networking specialist, the less exposed any organization will be.
Based on the article from BanFord Hall
https://www.branfordhall.edu/3-reasons-why-computer-security-is-important/
Cloud Storage and safety of it
The cloud. It is getting so popular now days. there have been many concerns and how safe our data really is in the cloud. We are basically forced to to believe that our data is safe with these big cloud storage companies. for an example iCloud on your Iphone. You are storing your phones back up on that cloud storage. We are basically trusting there services with our data. But how do we know how data is safe with them? there have been many cases with phones been hacked via the cloud. So in the article by SmidCloud tells us there are 5 Safety Concerns with the cloud.

1.You’re relying on someone to safeguard your data
2.No standardization among cloud storage providers
3.Safety Concern 3: Cyber Attacks
4.Safety Concern 4: Data Ownership
5.Shared Technology
https://blog.malwarebytes.com/101/2016/04/should-you-store-your-data-in-the-cloud/
Huawei Security Problem

Recently in the United States a big Tech company from China named Huawei has been under fire by the U.S Government. they have have supposedly been a security threat. Some of the security threats would be the chinese Government for hacking and what not. Android authority said
“To make matters worse, the numerous claims made against the company remain unsubstantiated. If Huawei specifically, and Chinese security threats generally, is the new “red peril,” why isn’t the U.S. acting more strongly?”
Article link here
https://www.androidauthority.com/huawei-security-890708/
I think that the united states should just take action and make the final call if we should allow the use of Huawei made phones or have the company fix their security issues and threats so.
The Importance of Computer Security
“To protect yourself and your computer from fraudulent behavior the best defense is education and common sense. Be alert to efforts by criminals to access your information and always use your best judgment. To help you learn more about common scams and attempts to gain access to information we have included a number of helpful resources. We hope this helps you stay safe online.” So this you always need to keep your self protected when surfing the web and on social media.

Source – https://securitybaron.com/blog/online-security-and-safety-information/