Articles in Category: Security
Many employers can and do monitor the technological activity of their employees. Here’s what you need to consider doing.
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated.
You want more than a password; you want encryption. Encrypting an external drive can be done with the right software.
There are many software programs that protect your system. I’ll review how I make my decisions and give you my advice.
Digital fingerprints are another way that websites might track you, should they want to. What can you do? Should you be worried?
Smishing is simply text-messaging spam. Learn to recognize and respond appropriately to it.
Messages that indicate you have a problem and recommend a specific download as a solution are immediately suspect.
If you’re sharing private or sensitive information, end-to-end encryption is an important term you need to understand.
The best password manager is the password manager you’ll use (within reason, of course).
Clearing cookies is an annoyance, but it protects your online accounts in case your machine is stolen.
Even with up-to-date anti-malware tools, you can still fall victim to malware. I’ll explain why by comparing your computer to your… bathroom?
Travel is exciting, but be sure to plan ahead for your technology to avoid things going wrong.
A portion of LastPass was breached. Here’s why it’s not a disaster, and why I’m not leaving LastPass.
The biggest risk to your security might just be you. Learn why and what to do.
Scams are everywhere, it seems. I’ll cover some common ones, and share the single most important rule to protect youself.
Data breaches rarely expose multiple accounts. There are rare scenarios where multiple accounts might still be at risk, though.
When you think about the complexity of today’s systems, it’s kind of amazing that we don’t have more breaches.
Leaving your computer on 24 hours a day rarely increases risk significantly, as long as you follow a couple of simple guidelines.
Password vaults are sometimes unable to auto-fill fields. There are several ways to work around this.
If you’ve lost your password, there may be recovery steps. If you’ve also lost your email address, recovery becomes significantly more difficult.
My phoned died, and with it, all the two-factor authentication methods I’d used it for. Here’s how I recovered.
Another week, another breach. What steps should you take in the wake of the latest large-scale data breach?
One of the challenges with current online safety advice is keeping track of multiple different secure passwords. LastPass not only does that, but does it securely across multiple devices.
If you’ve been told to change your password, do so, but do so in the right way. I’ll explain what that means and why it’s important.
If your device is not physically secure, neither the machine nor your data is.
There are forms of malicious software that attempt to travel from machine to machine on your local network. There’s good news, though.
Even with all the right things in place, stuff happens. I’ll review the additional steps you can take to protect yourself.
The Google Account Recovery process may be able to help you get your account back. Maybe.
Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?
Tracing the privacy and security of the path from your fingertips through the services you use to your information’s final destination.
Scanning your nuclear power station’s Windows computers for malware can present some challenges if the machines have been secured properly.
Every day, I’m asked to reset lost passwords, recover hacked accounts, or retrieve lost information in them. Here’s my answer.
All malware is scary, especially ransomware due to the damage it can inflict. Here’s how to avoid a repeat performance.
VPNs protect from certain types of surveillance and more. I’ll discuss what they’re good for and what to consider when selecting one.
There is no such thing as absolute safety. But there are definitely steps you can take to be as safe as possible.
When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Many of those people are wrong.
Your Windows log-in password gets you surprisingly little real security. I’ll look at why that is, why you might still want one, and what I do instead.
Regardless of your initial thoughts, every account is important, and we are all targets.
A full scan scans things a more common “quick scan” bypasses. Here’s how to run one using Windows Security.
For some reason, many people’s gut reaction to a malware infestation is to consider getting a new computer. That’s unnecessary.
Another day, another report of hackers exploiting vulnerabilities. Here’s how you stay safe.
A password tool may bypass a few keyloggers, but not all. Think about your overall computer and account safety first.
Online harassment is common problem, and prevalent among children. I’ll review some of the issues and steps to be taken.
Passwordless authentication removes the need for a password and replaces it with something else. But can that be secure?
There just isn’t a best. Knowing that will (hopefully) lead you in a safer direction.
As few as three random words make better passwords than strings of random characters — but not, perhaps, for the reasons you think.
Password vaults are a common recommendation by security professionals to improve your online security. Why do so many resist?
Another day, another breach. What should you do if you’re involved?
Erasing your hard drive before you give it away is important. Exactly how thorough an erase you need depends on your data and level of paranoia.