Latest Articles

encrypted communications

Google search found to be personalized even when logged out

The Problem As reported in the December 4, 2018 SpreadPrivacy.com article, when performing internet searches using Google, the results were personalized for the user even when logged out of the user's Google account, and when in Incognito Mode. The bottom...
NIST Logo

Q: What is NIST 800-171, and why is it so important?

A: The NIST SP 800-171 is a best-practices form, something like a checklist on steroids. It is created and produced by NIST (National Institute of Standards and Technology), one of the two federal teams charged with helping to ensure cybersecurity. The other is...
encrypted communications

How to Secure Your Web Browsing

For most of us, almost all of our time on the computer is spent on a web browser. This time is so very valuable to advertisers, that Google paid Apple $9,000,000,000 (yes, 9 Billion dollars) a year just so that Google is the default search engine for Apple Safari. Why...

Q: Why does my IT support not want me to run updates?

A: Although I can't speak specifically as to why your IT support doesn't want you to run updates, I can give reasons why MintzIT restricts clients from doing so. Spoiler alert... It's not because we are power-mad admins trying to keep the end-user under our boot!...
macOS 10.14

New Macs prevent hackers from eavesdropping on your microphone

Apple released documentation today on their T2 chip, included with the new Macs released today, as well as the MacBook Pros released earlier this year. The T2 security chip helps to protect encryption keys, encrypted storage, fingerprint data, and secure boot...

Q: What can I do if I have someone’s Gmail account username?

A: Nothing. Fundamentally all you have is an email address. If you were interested in committing a felony, you could attempt to hack into their Google account. But assuming the user has a strong password and has enabled Two-Factor Authentication, it would be a futile...

Q: Do malware immediately affect computers when installed?

A: Some malware do nothing until a triggering effect (specific time, amount of time since install, application launched, website visited, etc.) Some take some action immediately. Well-designed malware will never present evidence of their presence to the user. This is...

Q: How can I prevent my Yahoo e-mail from being hacked?

A: There are a number of standard steps to take regardless of your email provider: Use a strong password. The current recommendation is a minimum of 15 characters, in a password that is unique and not used with any other of your websites or services. Add 2-Factor...

Homeland Security Notice: Before You Connect a New Computer to the Internet

The US Department of Homeland Security has released an update to their ST15-003: Before You Connect a New Computer to the Internet documentation. With the holiday season approaching (along with all of the new IT systems to unwrap), it's a good time to review some...
Politicians are elected representatives

Perhaps The Most Important Day Of Your Life–November 6, 2018

Election Day, November 6, 2018, is just around the corner. Take part in the most important election of your lifetime. Not sure if you are registered to vote? Visit https://vote.org. Not registered? Register to Vote at https://vote.org. Just get it done! Vote early by...
Android malware

Android App Data Harvesting “Out of Control”

A new report from The Department of Computer Science, University of Oxford, released 20101018, finds that data harvesting by Android apps is epidemic. Almost 1,000,000 Android apps from the US and UK Google Play stores were analyzed. It was found that 88.4% shared...
macOS 10.14

macOS 10.14 Mojave Released! Practical Paranoia macOS 10.14 Security Essentials Now Available!

Apple has just released macOS 10.14 Mojave–the most advanced computer operating system ever. It is recommended that all Macintosh users upgrade to take advantage of all the new features, including: Stacks automatically organize files on your Desktop Finder is more...
ios 12

Practical Paranoia iOS 12 Security Essentials Released!

Apple released iOS 12 this month–the most advanced mobile operating system ever. It is recommended that all iPhone and iPad users upgrade to take advantage of all the new features, including: 50-200% performance improvement FaceTime now supports video and audio with...

Danger Awaits Your Computer, Hiding In That Thumb Drive

THE HIDDEN DANGER You know that thumb drive sitting by your computer? That one a friend handed to you, or a client shipped to you, or maybe you found it in the parking lot. Yes, that one. The one you probably already connected to your computer–without realizing the...

New Google Chrome 70 will break 1000+ sites

On or around October 16, 2018, the new Chrome 70 will arrive. if you currently have Chrome installed, it will automatically update. Core to the new Chrome is an upgrade to security. Specifically, Chrome will no longer trust HTTPS certificates issues by Symantec prior...
ios 12

iOS 12 Released! Practical Paranoia iOS 12 Security Essentials Now Available!

Apple has just released iOS 12 for iPhone and iPad–the most advanced mobile operating system ever. It is recommended that all iPhone and iPad users upgrade to take advantage of all the new features, including: Speed–Up to 200% faster FaceTime–Video and audio sharing...

Q: Is an up-to-date Mac computer immune to hacking?

A: The operating system (I’m assuming this is what you are updating) is only one small piece of the cybersecurity puzzle. Yes, OS updates are primarily about patching vulnerabilities within the OS, but focusing only on this is like locking only your front door when...

Q: What are the safest, the easiest, and the most balanced way to send encrypted email?

A: We first need to define your parameters for “encrypted”, and from what/who are you attempting to protect your communications. VULNERABILITIES Common points where email is vulnerable to penetration, hijacking, or otherwise accessed by unauthorized personnel:...

Q: How can I be safe in my computer without using an antivirus?

A: Antivirus is only a very small piece of the security and privacy puzzle - it doesn’t specifically protect against hackers. It protects against malware. Some of that malware may be under the control of hackers, some not. With or without antivirus, you still have...

Q: Do websites hold onto your login password information?

A: Yes, otherwise they would not be able to authenticate your password on the next visit. A quality site will store your password in an encrypted format, so if the site is compromised and the password database accessed, it is if no use. Unfortunately, this is by no...

Latest Books

Latest Reviews

A Great Step-By-Step Guide You'd be Foolish Not to Follow

5 star reviews

reviewsThis reviewer is a 60+, female, self-trained MAC user currently in OS10.8.1 and getting ready to buy a new MAC with Mavericks OS. I purchased and read Marc’s book cover to cover in preparation for understanding the scope of my commitment to get my new Maverick OS computer set-up in the most optimal way, for my home-use network. I want to get it hardened from the get-go. This was the best forty odd-dollar investment I could have made.Security book reviews

Practical Paranoia for the non-paranoid...

5 star reviews
reviews

I became a client of Marc’s five or six years ago when I said goodbye to Windows, became a Mac shop and put in an OS X server. So when Marc announced his new book, Practical Paranoia, I didn’t waste any time buying a copy.

The reason is simple, when Marc tells you something, you can take it to the bank.

The book is clean, well organized, designed to be completely accessible for the non-geek, and provides step-by-step screen shots and instructions on how to save yourself from the nightmare of data loss or breach.Security book reviews

 

Best Book on the Subject

5 star reviews
reviews

Easy to use – I did about half of the recommendations in under an hour. I’m a writer and I run a business from home. I’m not so technically adept. When I travel, I hate packing up all my equipment and putting things in storage to make sure that, in the unlikely event the house is robbed, all my data is safe and I could easily restart my business from a backup in the cloud. This book is a “paint-by-numbers” approach to security for every aspect of a computer system, from backups to email to encrypting the physical drives.

There’s really nothing else on the subject, unless you want to read technical blogs for days. This book has it all in one place and makes it easy for even a normal person (like me).Security book reviews

This month only, get the newly released Live! versions of Practical Paranoia macOS 10.14 & Practical Paranoia iOS12
for half off!
Dismiss