With all the negative media attention today, we need to truly look at what's really going on in the world. The economic fallout of 2001, 2004 and 2008 took its toll on all of us, leaving a majority of people frustrated and powerless. Pensions have been attacked, stocks dropped and companies have gone out of business, taking away jobs and retirements upon which many had planned.

With these financial losses occurring, more of us have taken on new means in obtaining income by getting second jobs, working new jobs that are paying a fraction of what we use to make or are now making businesses from what once was a hobby in order to pay our bills.

Cost of living, unemployment, no raises and stress have continued to elevate the issues in the household and financial stability. We must do what it takes to survive, and work to get ahead.

Most of us will work hard and live life by honest means. Unfortunately, there is a small fraction of the population who are not honest and are out to harm us and our systems for their own selfish needs. It is because of that small fraction of criminals out there, I write this to keep our readers safe, secure and protected the best we can — through education and reminders.

Technology security

Today, technology has become more affordable and easier to use as more of us have gravitated to the use and benefits of computers to simplify our lives on a daily basis.

From young elementary kids using tablets and smartphones, to the middle-aged carrying laptops as they travel to conduct business, to much older adults coming out of their comfort zones to use these same devices to email family and friends, join social media services or manage their finances through online banking.

Much of our personal information is being shared daily with others and often unintentionally. Given the enormous amount of personal information available through the Internet and our wireless devices, one can easily locate private information about a potential victim with a few keystrokes and mouse clicks.

Unfortunately, criminals have become more sophisticated, increasing their use of computers using unsecured Wi-Fi locations and various websites. These criminals are establishing their own fraudulent websites to make them look like a legit business where many people share their personal information without confirmation of legitimacy of business.

The world has become much more complicated for protecting our personal information and ourselves. We must take the precautions necessary in securing our information to significantly reduce our chances of becoming a victim. Limiting personal information and creating strong passwords that are at least 12 characters long, using uppercase and lowercase letterings, incorporating symbols, and not writing these passwords down is just a small step in your security.

At least 70 percent of devices that make up the Internet of Things (loT) are vulnerable to attack, according to research by Hewlett-Packard's security unit released July 2014. According to their studies, those vulnerabilities identified weak passwords, unsecured systems (passwords not being set or used) and poorly protected credentials, to name a few.

The development of the Internet has been without a doubt the most profound change in the way we communicate and collect and share information, since the invention of the printing press.

Once your personal information is breached and compromised, it will be within criminal circles within seconds, and all your creditability and financial freedoms may be ruined. Because of this, we must learn how to better secure our personal and financial information or spend years in trying to fix the mess created by those who used our information without our approval.

Many criminals take advantage of opportunities available to them. Criminals and computer attackers are increasingly sophisticated at stealing passwords and often use automated machines to crack credentials.

Finding better ways to create stronger forms of authentication such as the iPhone's Touch ID using your biometric fingerprint — is important. Apple's new "Apple Pay," is even more secure as it uses a unique Device Account Number that is assigned and encrypted and securely stored rather than the credit card number itself.

In fact, by using devices such as Apple Pay, you never have to show your credit card or debit card numbers, reveal your real name or the security code to others keeping your cards more secured.

Traveling and technology security

While traveling, limit your use of nonsecured WiFi locations and public computers. If you're not using Apple Pay or similar systems, use credit cards not debit cards as a criminal with access to your debit card can possibly drain your account before you realize it. In addition, credit cards have additional protections many debit cards do not have.

Prior to traveling, call your bank and let them know what areas you will be traveling to and what duration. If there are any purchases outside the areas you are in, the bank will immediately flag these as suspicious, and they will contact you for verification or approval.

When paying with credit cards, limit those who have access to your credit cards by always keeping them within your sight. While at restaurants, pay at the register terminal rather than your table with your waiter, thus eliminating your credit card information from being compromised. Or settle your bills using traveler's checks or cash while only keeping moderate portions of them on you.

As you travel, stay alert and pay attention to your surroundings. Don't discuss your plans in public, with strangers nearby, and never post your travel plans on social media. Using these tips will help reduce your chances of becoming a victim.