Keeping data secure is important. Being able to password protect a folder seems an obvious approach. Unfortunately, it’s not that simple.
It’s important to back up LastPass, because unexpected things happen. What you do with that backup, however, is critical.
Your LastPass password vault is full of exceptionally important data. Add additional security with two-factor authentication.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
Password-strength meters don’t always agree. My take is to avoid them completely.
One of the largest data breaches in history has left many wondering what to do next.
It’s possible to get malware, even with anti-malware tools installed. Why the heck is that true?
We’re often enticed or directed to websites we’ve never been to before. We’ll look at a couple of tools to help identify safe websites.
So many sites require a password, it’s very tempting to use only a single password everywhere. That’s dangerous, and there are alternatives.
Letting your anti-malware subscription lapse is never a good idea. I’ll look at why that is, and available alternatives.
You want more than a password, you want encryption. Encrypting an external drive can be done with the right software.
Hacking into someone’s account is often seen as an answer to some problem. In reality, all it does is open a can of worms and put you at risk.
Any software company with ties outside the U.S. comes under scrutiny. Should you be worried?
Google will use your mobile phone number for verification if you lose access to your account. Some people don’t want to provide that information to Google.
You can’t rely on yourself as a malware detector. Learn how to be a malware avoider.
Making sure your anti-virus program and its definition database are up-to-date is the best way to make sure it can recognize and remove viruses.
There are many different terms that relate to software with malicious intent. Ultimately, however, there’s only one you really need to know, and several things you need to do.
A zero-day attack is very simple: it’s the exploitation of a vulnerability before there’s a fix for it. I’ll review the timeline.
While it’s not typically easy, your internet traffic can be monitored at or near your router. I’ll look at how this might be done.
Wherein we consider how much information we “give away” in our daily lives online.
Microsoft’s response to the recent Windows Defender zero-day vulnerability was an example of how the system is supposed to work.
SMS two-factor authentication may be flawed, but it’s still worth using if it’s the only practical alternative.
There’s a lot of misinformation, and even paranoia, relating to keystroke logging and privacy. Much of it, however, is based on small kernels of truth.
We spend a lot of time on software-related issues, but malicious activities and privacy violations can happen via hardware as well.
Do you need a VPN? And if so, which one should you get?
Here are the steps you need to take to prevent losing your account – forever – to a hacker.
VeraCrypt makes is easy to encrypt whole drives, making it safer to travel with your data. Here’s how to safely encrypt and then access your data.
In an apparent contradiction in terms, anything you post online is there forever… yet if you delete something, you also can’t get it back.
The biggest risk to your privacy is probably not what you think it is.
If you’re using an internet connection from a source you don’t trust, there are a few alternatives.
If your device is not physically secure, neither the machine nor your data is, either.
Sometimes, the best way to remove malware is to reboot your system and run a completely separate tool. I’ll list some of the most popular.
When malware prevents your anti-malware tools from working, the built-in Windows Defender Offline is your first line of defense.
Everything you download adds risk. Be safer using my three guidelines.
Privacy is a complex and far reaching topic. One of the most basic and often overlooked players: the operating system on your device.
Should you want to use BitLocker on a machine or virtual machine that doesn’t support TPM, there’s a single hoop to jump through.
Before giving away a machine or returning a loaner, it’s important to remove personal information from it. That’s both harder and easier than you think.
Remote access to allow someone to fix your machine is appealing. The risks are significant, especially since scammers have become involved.
Privacy and security: tracing the path from your fingertips through the services you use to your information’s final destination.
It’s important to consciously choose which software and online services to trust – whether they are directly related to security or not.
Should you trust your security software to make the right recommendations? Typically, yes, as long as you’re using reputable software.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
For many, it’s important to be able to encrypt a disk entirely. Particularly if a portable machine contains sensitive data, whole-disk encryption is key.
It’s not uncommon to want to encrypt a folder and all it contains. There are several techniques to encrypt a folder, each with pros and cons.
Since most encryption tools are designed to encrypt collections of files, the best approach to encrypt a file isn’t always obvious. I’ll look at a couple of alternatives.
You avoid ransomware the same way you avoid any malware. On top of that, a full backup can save you not only from ransomware, but from a host of other problems as well.
It may seem like privacy is a thing of the past. I believe we misunderstand privacy, and can control more than we think.
Laptops are portable, convenient, and easily lost. If lost, all the data could easily be available to the finder. Encryption is the answer.
Internet Safety is difficult, yet critical. Here are seven key steps to keep your computer safe on the internet.
I see people lose access to their important accounts all the time. Most frustrating is that it’s often their own fault that they can’t regain access.