This page contains a Flash digital edition of a book.
6 The Hampton Roads Messenger


Volume 10 Number 9


Chief Rabbi Jehu August Crowdy, Jr. of Historic Temple Beth El Passes


tenants Chief


of Judaism, Rabbi Jehu


August Crowdy, Jr., Executive


Leader


of the Church of God and Saints of Christ, life


passed this on Sunday,


April 10, 2016. He was the Executive Leader of the Church for fourteen years following


(14) his


predecessor, Rabbi Levi


Plummer. The Chief Executive Rabbi of


the oldest and largest congregation of African Americans ascribing to the


Cyber Home FROM PAGE 1


bank and other financial accounts. These measures include using "strong" user IDs and passwords by choosing combinations of upper- and lower-case letters, numbers, and symbols that are hard for a hacker to guess.


Don't


use your birthdate, address or other words or numbers that can be easy for con artists to find out or guess. Don't use the same password for different accounts because a criminal


who


obtains one password can then log in to your other accounts. Keep your user IDs and passwords secret, and change them regularly. Make sure to log out of financial accounts when you complete your transactions or walk away from the computer.


Consider using a separate computer solely for online banking or shopping. A growing number of people are purchasing basic PCs and using them only for banking online and not Web browsing, emailing, social networking, playing games or other activities that are more susceptible to malicious software — known generally as "malware" — that can access computers and steal information.


As


an alternative, you can use an old PC for this limited purpose, but uninstall any software no longer needed and scan the entire PC to check for malicious software before proceeding.


financial account information to third


online. some people use online


Take precautions if you provide parties


For example, "account


aggregation" services that, from one website, can


provide a convenient


way to pay bills, monitor balances in deposits and investment accounts, and even keep track of your frequent flyer miles. While these websites may be beneficial, they can also present potential issues related to the security of the account information you have shared with them.


If you want to use


their services, thoroughly research the company behind the website, including making sure that you're dealing with a legitimate entity and not a fraudulent site. Also ask what protections the website offers if it experiences a data breach or loss of data.


Periodically check your bank


accounts for signs of fraud. If you bank online, check your deposit accounts and lines of credit at regular intervals to spot and report errors or fraudulent


Crowdy is survived


by his wife, St. Christel; children, St. LaToia, Sis. Taylor, and Bro. Jehu, III; sister, St. Jesyl Crowdy-Volkens;


transactions, just as you would review a paper statement.


makes it easier and faster to monitor your accounts.


Federal laws generally Online banking This is important,


because the sooner you can detect a problem with a transaction, the easier it should be to fix.


limit


your liability for unauthorized use of your debit, credit and prepaid cards, especially if you report the problem to your financial institution within specified time periods, which vary depending on the circumstances (see How Federal Laws and Industry Practices


Limit Losses From


Cyberattacks). A good rule of thumb is to check your accounts online once or twice a week. Also, many banks make it easier for customers to keep track of their accounts by offering email or text message alerts when balances fall below a certain level or when there is a transaction over a certain amount.


Basic Security Tips: Keep your software up to date.


Software manufacturers continually update their products to fix vulner- abilities


or security weaknesses


when they find them. "All of your software should be checked and updated as generally recommended by the manufacturer or when flaws are found," explained


Kathryn


Weatherby, a fraud examination specialist for the FDIC. "This advice goes for everything from your operating


word processing software, Internet browsers, spreadsheet


system to your software,


and even your digital photography applications. A vulnerability in one piece of software, no matter how insignificant it may seem, can be exploited by a hacker and used as a pathway into your whole computer."


Some software manufacturers may issue "patches" that you need to


install to update a program.


Others may simply provide you with a completely new version of the software. "Before installing any update you receive, make sure it is legitimate, especially if it is emailed to you," said Benardo. "Check the software manufacturer's website or contact the company directly to verify the update's validity. Criminals have been known to imitate


software


vendors providing a security update when, in fact, they are distributing malware. Once you confirm that an


that


Solomon Rabbi


brother-in-law, Elder Asher Volkens; nieces, Sis. Leah Mattie and Sis. Rachel Lovey; mother, St. Sylvia W. Crowdy; aunts, St. Mary Elizabeth Crowdy and St. Audrey Wooten; cousins, relatives, and friends. He leaves to cherish his precious memory a host of devoted congregants throughout the United States, Africa, and Jamaica.


congregants converged on Northern Suffolk


month. The religious


A pilgrimage of thousands of last


organization, the Church of God and Saints of Christ, Temple Beth El, has been a part of the fabric of Hampton Roads for more than a century.


great


The church’s re-establisher, the grandfather of the deceased,


William Saunders Crowdy was a


update is legitimate, install it as soon as possible to correct whatever security flaw might exist."


Install anti-virus software prevents,


malicious computer


programs. hackers


are developing new malware that


detects and removes Crooks and always can


access computers and steal information, such as account passwords or credit or debit card numbers.


These programs


also may be able to destroy data from the infected computer's hard drive.


Malware can enter your computer


in a variety of ways, perhaps as an attachment to an email, a downloaded file from an infected website, or from a contaminated thumb drive or disk. Fight back by installing anti-virus software that periodically


runs in


the background of your computer to search for and remove malware. Also be sure to set the software to update automatically so that it can protect you from the latest malware. See Beware of Malware: Think Before You Click! for more information.


Use a firewall program to prevent


unauthorized access to your PC. A firewall is a combination of hardware and software that establishes a barrier between your personal computer and an external network, such as the Internet, and then monitors and controls


incoming and outgoing


network traffic. In simple terms, a firewall acts as a gatekeeper that helps screen out hackers, malware and other intruders who try to access your computer from the Internet.


from


Only use security products reputable


companies. Some


anti-virus software and firewalls can be purchased, while others are available free.


Either way, it's a good


idea to check out these products by reading reviews from computer and consumer publications.


Look for


products that have high ratings for detecting problems and for providing tech support if your computer becomes infected. Other ways to select the right protection products for your computer are to consult with the manufacturer of your computer or operating system, or to ask someone you know who is a computer expert.


Take advantage of Internet safety


features. When you are banking online, shopping on the Internet or filling out an application that requests sensitive personal information such as credit


runaway slave who purchased 40 acres of land near route 17 in 1903, to build a church home for the organization’s members. That land was a place of refuge for generations of Blacks who created a self-sufficient town once revered as Belleville, VA. Through some of the most turbulent


times


for people of color in U.S. history; Belleville was a Mecca for the disen- franchised.


For the past 14 years, the late


Rabbi Jehu A. Crowdy, Jr. , known for his kind and gentle manner of leadership, continued the legacy of his heritage living a spiritual life of service to a multitude of people while developing the land of his fathers for the betterment of all mankind.


card, debit card and bank account numbers, make sure you are doing business with reputable


May 2016


companies.


You also can have greater confidence in a website that encrypts (scrambles) the information as it travels to and from your computer.


Look for a


padlock symbol on the page and a Web address that starts with "https://." The "s" stands for "secure."


Also, current versions of most


popular Internet browsers and search engines often will indicate if you are visiting a suspicious website or a page that cannot be verified as trusted. It's best not to continue on to pages with these kinds of warnings. Review your Internet


browser's user instructions


and explore the "tools" and "help" tabs to learn more about the security settings and alerts offered.


Be careful where and how you connect to the Internet.


A public


computer, such as at an Internet café or a hotel business center, may not have up-to-date security software and could be infected with malware.


Similarly,


if you are using a portable computer (such as a laptop or mobile device) for online banking or shopping, avoid connecting it to a wireless (Wi-Fi) network at a public "hotspot" such as a coffee shop, hotel or airport. Wi-Fi in public areas can be used by criminals to intercept your device's signals and as a collection point for personal information.


The bottom line, especially


for sensitive matters such as online banking and activities that involve personal information, is to consider only accessing the Internet using your own computer with a secure, trusted connection,


and to only connect


laptops and mobile devices to trusted networks.


For more tips on computer and


Internet security for bank customers, watch the FDIC's multimedia presentation "Don't Be an Online Victim: How to Guard Against Internet Thieves


and Electronic includes Scams."


Also, visit www.OnGuardOnline. gov for information from the federal government on how to be safe online. The site


videos from the


Federal Trade Commission on what to do if your email is hacked or if malware attacks your computer.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16