Articles in Category: Security

Virus Detected!

Where Do Viruses Come From?

Email viruses come from many sources, and it's not easy to trace them.

Brute Force

How Can a Hacker Try All Possible Passwords If Systems Block Failed Login Attempts?

Some hackers go for the low-hanging fruit and try the most common passwords, but there is one scenario where brute force works very well.

1password.com homepage.

Setting Up 1Password

How to get started with 1Password and the most important action to take.

Password list

Your 6 Strongest Practical Password Techniques, Ranked

Six practical approaches to generating passwords, ranked from best to worst.

A Long Password

How Long Should a Password Be?

For years, the standard practice has been to assume that eight-character passwords made up of sufficiently random characters was enough. Not any more. Not even close.

Malare Found!

How Do I Remove Malware from Windows 10 or 11?

Trying to remove malware? I'll walk you through the steps and options, from simple to hard, including the only approach that's guaranteed to work.

Malware Detected

It Pays to Be Skeptical

If we would all be a little more skeptical, we'd be safer and the internet would be a more trustworthy place.

Hacked!

12 Steps to Keep from Getting Your Account Hacked

Here are the steps you need to take to prevent losing your account forever to a hacker.

Add Alternate Email Address

Do I Really Need a Recovery Email?

Alternate email addresses are an important security setting that can allow you to regain access to your account if it's hacked or you forget your password.

Internet Security

Internet Safety: 7 Steps to Staying Safe Online

Online security is critical. Here are the key steps you can take to keep yourself safe on the internet.

Individual yelling at their computer.

Why Can’t I Get My Account Back?

Way too often, I hear from people who have lost their accounts permanently. Here's how to avoid being one of them.

Oh, LastPass...

What to Do About the LastPass Breach

The most recent LastPass security incident has many people concerned.

My Google Activity

How Do I Delete Google Search History?

Deleting your search history can seem simple, but there are complications worth knowing about if you need to be thorough.

Houses sharing Wi-Fi

Can My Neighbor View My Internet If I Use Their Wireless?

Using any shared internet means other users on the service might be able to see what you are doing. Extra security steps may be necessary.

LastPass 2FA Feature. (Screenshot: askleo.com)

Should I Use My Password Vault for Two-Factor Authentication As Well?

A new feature in some password vaults has us thinking about security implications. Bottom line: use two-factor authentication.

Login and password

A One-Step Way to Lose Your Account Forever

I see people lose access to their most important accounts all the time. It's often their own fault that they can't regain access.

Authy. Part of the solution. (Screenshot: askleo.com)

A Lost-Second-Factor Tale of Woe and How to Avoid Your Own

A tech journalist lost his phone and encountered issues recovering a two-factor-protected account. We can all learn from his experience.

Some Gmail Account Recovery Options

Please Set Up and Maintain Account Recovery Information

Account recovery information is an important yet often overlooked part of account security. Managed poorly, it can lead to permanent account loss.

Big Brother is Watching You!

What Should I Assume About Workplace Technology Monitoring?

Many employers can and do monitor the technological activity of their employees. Here's what you need to consider doing.

A padlocked folder.

How to Back Up Encrypted Data

Encrypting your data is important for security, but it also adds risk that's easy to overlook when backing up.

Computer Spy

They Set Up My Computer and Now My Ex Is Spying on Me. What Can I Do?

Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated.

Bitlocker Protected External Drive

How Should I Password-Protect an External Hard Drive?

You want more than a password; you want encryption. Encrypting an external drive can be done with the right software.

Tools

How Do I Pick the Right Tools to Protect Windows?

There are many software programs that protect your system. I'll review how I make my decisions and give you my advice.

Digital Fingerprint (Concept)

What is a Digital Fingerprint?

Digital fingerprints are another way that websites might track you, should they want to. What can you do? Should you be worried?

What's that on my mobile?

What Is Smishing?

Smishing is simply text-messaging spam. Learn to recognize and respond appropriately to it.

A Scary Pop-up Message

I Got a Pop-Up Virus Warning. Is My Computer Infected?

Messages that indicate you have a problem and recommend a specific download as a solution are immediately suspect.

End to End Encryption

What is End-to-End Encryption?

If you're sharing private or sensitive information, end-to-end encryption is an important term you need to understand.

Cookies?

Should I Clear Cookies Before I Travel?

Clearing cookies is an annoyance, but it protects your online accounts in case your machine is stolen.

Peek

Why Did My Security Software Not Detect a Virus on My PC?

Even with up-to-date anti-malware tools, you can still fall victim to malware. I'll explain why by comparing your computer to your... bathroom?

Travel

Preparing Your Technology for Travel Abroad

Travel is exciting, but be sure to plan ahead for your technology to avoid things going wrong.

LastPass?

What You Need To Do About the LastPass Hack

A portion of LastPass was breached. Here's why it's not a disaster, and why I'm not leaving LastPass.

Distracted by Phishing

The Biggest Risk to Your Security

The biggest risk to your security might just be you. Learn why and what to do.

Scam

How Can I Protect Myself From Scams?

Scams are everywhere, it seems. I'll cover some common ones, and share the single most important rule to protect youself.

Security Breach!

Can a Data Breach Expose Multiple Accounts?

Data breaches rarely expose multiple accounts. There are rare scenarios where multiple accounts might still be at risk, though.

Servers

6 Reasons There Are Still So Many Security Breaches

When you think about the complexity of today's systems, it's kind of amazing that we don't have more breaches.

Power, Day & Night

If I Leave My Computer Always On, Am I More Likely to Be Hacked?

Leaving your computer on 24 hours a day rarely increases risk significantly, as long as you follow a couple of simple guidelines.

Login

How Can I Delete an Old Account If I Can’t Log In?

If you've lost your password, there may be recovery steps. If you've also lost your email address, recovery becomes significantly more difficult.

A Dead Phone

I Lost My Phone With My Second Factor for Authentication. How Do I Recover?

My phoned died, and with it, all the two-factor authentication methods I'd used it for. Here's how I recovered.

leo@askleo.com has been Pwned!

What Should I Do About the Latest Breach?

Another week, another breach. What steps should you take in the wake of the latest large-scale data breach?

LastPass Password Manager

LastPass Password Manager and Vault

One of the challenges with current online safety advice is keeping track of multiple different secure passwords. LastPass not only does that, but does it securely across multiple devices.

Password Entry

I’m Told to Change My Password. Why?

If you've been told to change your password, do so, but do so in the right way. I'll explain what that means and why it's important.

Locked Computer

Lock Your Computer When You Walk Away

If your device is not physically secure, neither the machine nor your data is.

A Bad Day on the Network

Can Malware Infect Other Computers on My Network?

There are forms of malicious software that attempt to travel from machine to machine on your local network. There's good news, though.

Hacked!

How Was My Bank Account Hacked When I Did Everything Right?

Even with all the right things in place, stuff happens. I'll review the additional steps you can take to protect yourself.

Padlocked Gmail.

Lost Gmail Account Recovery With No Phone or Alternate Email

The Google Account Recovery process may be able to help you get your account back. Maybe.

Bridge of Trust

Protecting Your Privacy: Points of Vulnerability

Tracing the privacy and security of the path from your fingertips through the services you use to your information's final destination.

Nuclear Power Plant

How Do I Scan Nuclear Power Station Computers Without an Internet Connection?

Scanning your nuclear power station's Windows computers for malware can present some challenges if the machines have been secured properly.

Please?

Would You Please Recover My Password?

Every day, I'm asked to reset lost passwords, recover hacked accounts, or retrieve lost information in them. Here's my answer.

Ransomware!

How Do I Prevent a Repeat of Ransomware?

All malware is scary, especially ransomware due to the damage it can inflict. Here's how to avoid a repeat performance.

VPN

What VPN Should I Use?

VPNs protect from certain types of surveillance and more. I'll discuss what they're good for and what to consider when selecting one.