Unless you’re paid to be clued into security measures, it can feel like a big undertaking to consider and prepare for the growing range of cyber-security needs. If you’re like most of us, electronics and related security matters bump along in a semi-automated function. When an app or operating device such as a phone or desktop suggests an upgrade, it’s easy to hit “ok” with little thought to what’s happening behind the scenes. Just such a scenario is ideal for hackers who plan on challenging the status quo when least expected. Continuing Vigilance Not surprisingly, much of the cyber-security information released at the beginning of the year warned of more security breaches to come and the need for efficient procedures to counteract lurking security threats. An article published on AnalyticsInsight.net said, “99% of vulnerabilities exploited will keep on being ones…