OlympusNet News              

Russell Jacqua at City Hall Part 2 of 3
Last week we saw Russell Jacqua’s design for Port Townsend City Hall’s stairway railings transformed into iron by Steve Lopes. We quoted Russell …

“People have asked about the railing’s motif. It is an allusion to the stamped metal ornamentation on the upper exterior of the original building. I realize it’s a subtle echo from old to new. Not many will notice. But I like to imagine the satisfaction of the person who discovers the repetition of the decorative gesture, reaching across one hundred years as if to say, ‘Greetings! We the people of Port Townsend are still here….and we still care about beautiful things.”

Alas we don’t have photos of the original City Hall that show that ‘stamped metal ornamentation’. The photo above shows the ‘Jacqua motif’ that adorns our present City Hall.

Next week, we conclude the story by learning from Willene Jacqua McRae about her recent gift to the City of Russell’s final design, For Willene.

SANS OUCH for February: Securing Your Mobile Devices
Your mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since your devices are such an important part of your life, here are some simple steps to keep you and your devices safe and secure.

Securing Your Devices
It may surprise you to know that the biggest risk to your mobile device is not hackers, but most likely you. You are far more likely to lose or forget a mobile device then have someone hack into it. The number one thing you should do to protect your devices is enable automatic locking of the screen, often called a screen lock. This means every time you want to use your device you first have to unlock the screen, such as with a strong passcode or your fingerprint. This helps ensure that no one can access your device if it is lost or stolen. Here are several more tips to help protect your devices:

Updating
Enable automatic updating on your devices so they are always running the latest version of the operating system and apps. Attackers are always looking for new weaknesses in software, and vendors are constantly releasing new updates and patches to them. By always running the latest operating system and mobile apps, you make it much harder for anyone to hack into your devices.

Tracking
Install or enable software to remotely track your mobile device over the Internet. This way, if your device is lost or stolen, you can connect to it over the Internet and find its location, or in a worst-case situation, remotely wipe all of your information on it.

Trusted Apps
Only download apps you need and from trusted sources. For iPads or iPhones, that means download apps from the Apple App Store. For Android, download apps from Google Play; for Amazon tablets, stick with the Amazon App Store. While you may be able to download apps from other sites, these are not vetted and are far more likely to be infected. Also, before downloading an app, check to make sure it has lots of positive reviews and is actively updated by the vendor. Stay away from brand new apps, apps with few reviews, or ones that are rarely updated. Finally, regardless of where you got your app, once you no longer need or actively use the app, we recommend you delete it from your device.

Privacy Options
When installing a new app, make sure you review the privacy options. For example, does the app you just downloaded really need to have access to all your friends’ and contacts’ information? We also recommend you disable location tracking for everything, then enable location for only the apps you feel need it. If you are uncomfortable with the permission requirements of an app, find a different one that meets your needs. In addition, periodically check the permissions to ensure they have not changed.

Backups
Always back up your data. For mobile devices, a great deal of your information is often backed up automatically, such as your photos or messages. However, backups also store your configurations, apps, and other device information, making it much easier to recover from a lost device or transition to a new one.

Work
When at work, be extra careful and never take any pictures or video that may accidentally include sensitive information, such as pictures of whiteboards or computer screens.

Your mobile devices are a powerful tool, one that we want you to enjoy and use. Just following these few simple steps can go a long way to keeping you and your devices secure.

Download from …