Posted on

The Credentials Conundrum

Everyone needs a good answer to the question, "How do you manage your passwords?" If you use the Internet you’ll soon build up a long list of destinations and passwords, and it’ll only get longer in the future. Strong credentials help protect us from criminals and creeps, so we all need to master the art of managing them. Many try writing them on paper or keeping them in their head or in a document, but these methods are very insecure…

Read more

Posted on

Beware Banking on a Windows PC

The vast majority of viruses and other malware is written for the most-popular PC operating system: Windows. As of 10/28/19 GlobalStats reports that 72.9% of desktop PCs run Windows, followed by 21.1% that run Apple’s OSX. Best practice is to never log on to your banking website if you run a Windows PC. Instead, build a “Live CD” (or use a USB flash drive for quicker startup) that boots it with a less-popular operating system like Linux. You can then…

Read more

Posted on

Beware tricky new scam: ‘Vishing’

Even security pros are falling for ‘Phishing’s evil twin: Voice-assisted phishing, aka ‘Vishing.’ This scam often involves a human being on the phone with you, typically ‘reporting’ something like fraud to you then asking you to verify personal and account-related details like home address, social security number, PIN number, etc. Bottom-line: always disregard the caller’s caller-ID, even if it matches your bank or creditor’s numbers — since caller-ID is easily faked. Best practice if you suspect a problem is to…

Read more

Posted on

Beware SIM-swapping Attacks

Most people consider their Social Security number to be their most valuable personal data. Another threat is brewing that targets your mobile phone number — yes, the phone you use for 2-Factor Authentication and resetting your website passwords! Here’s how it works: Criminal somehow acquires your mobile phone number then gathers some basic information about you Criminal calls your mobile carrier and impersonates you requesting them to reassign your mobile number to a different phone Criminal then uses this phone…

Read more

Posted on

Get to Know Your Windows 10 Privacy Settings

Windows 10 has many privacy settings that you should be aware of, and factory settings have most of these set to share a lot of information about you and your computer activities. You may want to consider keeping some or all of this information to yourself. To view your Windows 10 privacy settings, go to Settings > Privacy and explore. Check out this article about Windows 10 privacy settings on Wired.com: Click here to read full article

Read more

Posted on

The Skinny on Zero Trust

An enterprise security concept called “Zero Trust” is gaining popularity. User access is limited to only the apps and data they need to do their job. Traditional cybersecurity tactics could grant users access to entire networks for convenience. “Zero Trust” requires many more work-related authentication/logon steps, thus highlighting the need for a good password manager. Check out this article about Zero Trust on Investors.com: Link to full article

Read more