UPDATED 10/21/14  Home Page
  
Click HERE to contact us

               

____________________________________________________________________________________

Meet our newest friend Amira. She won our Captain America prize pack, including the new Winter Soldier DVD, at the 9th Annual Oerther Foods Safety Day at McDonalds on Kirkman Rd Sat 9/27/14.
 
                      


This is our fourth year as a National Cyber Security Awareness Month Champion. This initiative is more important than ever.Throughout October we'll be bringing you cyber empowerment both here and on our Twitter feeds. Please also visit http://www.staysafeonline.org/ncsam to learn how you can become involved. 
Twitter Feeds   @StaySafeOnline   @MOSTCyberTeam   @MASTCyberTeam 

Securing Your Home Network   
Courtesy of http://www.staysafeonline.org

A protected home network means your family can use the Internet safely and securely.

Most households now run networks of devices linked to the Internet, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access wireless networks. To protect your home network and your family, you need to have the right tools in place and confidence that family members can use the Internet safely and securely.

The first step is to Keep a Clean Machine and make sure all of your Internet-enabled devices have the latest operating system, web browsers and security software. This includes mobile devices that access your wireless network.

Secure Your Wireless Router
A wireless network means connecting an Internet access point – such as a cable or DSL modem – to a wireless router. Going wireless is a convenient way to allow multiple devices to connect to the Internet from different areas of your home. However, unless you secure your router, you’re vulnerable to people accessing information on your computer, using your Internet service for free and potentially using your network to commit cybercrimes.
Here are ways to secure your wireless router:
•Change the name of your router: The default ID - called a service set identifier” (SSID) or “extended service set identifier” (ESSID ) – is assigned by the manufacturer. Change your router to a name that is unique to you and won’t be easily guessed by others.
•Change the pre-set password on your router: When creating a new password, make sure it is long and strong, using a mix of numbers, letters and symbols.
•Review security options: When choosing your router’s level of security, opt for WPA2, if available, or WPA. They are more secure than the WEP option.
•Create a guest password: Some routers allow for guests to use the network via a separate password.  If you have many visitors to your home, it’s a good idea to set up a guest network.
•Use a firewall: Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don't permit. Your operating system and/or security software likely comes with a pre-installed firewall, but make sure you turn on these features.

Protect Yourself with these STOP. THINK. CONNECT. Tips:
•Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
•Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
•Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware.
•Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.
•Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure.
•Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.
- See more at:
http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/securing-your-home-network#sthash.g1iS0pzM.dpuf
_____________________________________________________________________________________________


The Animalistic Nature of Lowlifes
By: M.O.S.T. FIELD TEAM

The phrase 'It's a jungle out there' is indeed accurate. Our outdoor environment is comprised of friendly creatures, and predators. The purpose of this article is to help you avoid becoming the prey. As in the wild, being aware of your surroundings is more than half of the battle. You see, lowlifes do not want to engage someone who provides them a challenge They want the most distracted, weak, and high value targets they can acquire. Here are some tips to make yourself less of a target.

Keep your head up and your senses tuned in. If you are looking down at your cell while listening to I-Heart Radio,that's your sight and hearing compromised and you've raised your target potential. It is a psychological truth that a criminal is less likely to attack someone who is making eye contact with them, although they may still attack. This will also help you to provide a better description to police should you become a victim.

Don't advertise what a great target you would be. Count your money behind closed doors, not walking downtown. Don't display your phone needlessly. Also remember that at night your in-use cell phone advertises your exact position to those who may be lying in wait.

Have a plan. Know the shortest distance between two destinations and walk with purpose. This includes making a mental, or physical, note ahead of time as to where you parked. A lost person can be spotted easily. The person approaching you to help you find your way could be sincere when they say you look lost and they want to help, or it could be a pretext to get closer to you for an attack. If you knew where you were going you would reduce the likelihood of being approached at all.

Stand and fight until it's time to run. This will be hard for some of you to believe, but we're being brutally honest here. If a criminal tries to get you to go with them to another location/enter a vehicle or face the consequences, it is better to stand and fight where you are than to comply. That lowlife wants you elsewhere because where you are makes them nervous. It's either too public for them, too close to where they live or too far from their cohorts location. It is better to get shot then and there with the hope of being heard/seen/discovered,/assisted than being driven to the deep woods where nobody will know you are being eliminated. Lowlifes know this principle. Embrace it as equally as they do.

Understand the realities of violence. Many are freaked out by the sight of their own blood in a fight. It's a psychological trigger for mortality and you don't necessarily have a chance to see how badly you are bleeding. Until you can find out, stay calm. Maintain your breathing. You'll want that breath to call for help if you need to.Common folks get gassed out quickly in a fight and ,unlike television, many fights go to the ground in the first minute. Prepare yourself for the possibility of getting grounded. Maintain your breathing, stay focused. Don't panic over any blood. Flee if you can, but be very cautious about fully turning your back to a attacker. 

Don't typecast. While you want to avoid situations and characters that make you feel uncomfortable, the 220lb kid you're worried about with the Insane Clown Posse shirt and ear gauges may not be the threat. It could just as easily be the polo shirt ,khaki pants 40 year old you're about to encounter.
_____________________________________________________________________________________________

Predator/Offender Searches & Alerts
Florida Department of Law Enforcement offers resources

The F.D.L.E. database contains public record information on offenders classified as sexual predators and sexual offenders under Florida law because of a conviction for a sex-related crime and/or a specified crime against children. This information is made available to interested citizens to help them educate themselves about the possible presence of such offenders in their local communities. The placement of information about an offender in the F.D.L.E.database is not intended to indicate that any judgment has been made about the level of risk a particular offender may present to others. This information is made available to assist interested persons in forming their own risk assessments based on the offender's personal circumstances and conviction history. Click HERE to get to the main page.

You can use the F.D.L.E. web site to subscribe for an e-mail alert in the event that an offender or predator moves close to any address in Florida you choose to monitor. For example, your home, workplace, school, daycare, etc.You can also subscribe to receive an e-mail alert in the event that the offender or predator reports updated address information in the registry. To get started, click HERE
____________________________________________________________________________________________

G R A F I TT I

We do not care about persons who paint graffiti on a sanctioned wall with the owner's permission. However, we detest cowards who paint property without consent. That changes the classification from art to vandalism. However, the vandals will still try to justify what they do by claiming it's free expression. They often try to vilify those who oppose them by labeling them oppressors of that free expression. Meanwhile, those same vandals cause hundreds of dollars in damage, drive a businesses customers away and lower property values.
 
We often ask if a graffiti goon would still call it "art" if it was their property being defaced without permission.

Graffiti can also have a more serious meaning due to being gang related. Gangs can use graffiti to mark territory,advertise drug sales, mourn deceased members, announce alliances and issue threats. All the more reason to report and remove it immediately.

If you see tagging in progress dial 9 1 1

For recent graffiti in Orlando report it to (407) 254-GRAF (4723) or click HERE

For recent Orange County graffiti dial 3 1 1. You may also report it on the free app OCFL 311

M.O.S.T. strongly advises you to remove tags immediately after they get documented by law enforcement. We feel it is bad advice for anyone to advise you to leave the tags up a week or two to prevent retaliation. Letting tags remain sends a message of tolerance, lowers the property value for both you and your neighbors and can drive away your customers or potential property buyers. Not to mention that each day you look at the tag is a reminder of how your property was violated. Who needs that kind of aggravation ?