It is time to take back control

Q: How Do I Know if My Personal Information Has Been Hacked?

It is almost certain that things you view as personal and private information have been harvested about you, and may be freely available to criminals, advertisers, and other miscreants. Once the information is “out there”, it can’t be put back in the bottle. But there is plenty you can do to prevent it from happening.

Q: How Vulnerable Are My Children To a Cybersecurity Or Internet Privacy Breach?

According to a report released today (August 11, 2021) by NIST (National Institute of Standards and Technology), 87% of high schoolers use the same password for everything. 45% of high schoolers share passwords with their friends. According to the research, teens don’t see password sharing as risky behavior, but a way to build friendships and trust.

Q: What’s the Big Deal Over Two-Factor Authentication?

No matter how “great” or “strong” your password, it can be broken, hijacked, or bypassed. Perhaps the most common method to usurp your password is by breaching the user database of a major vendor. Read on to learn how just a few clicks can enable your Two-Factor Authentication, shielding you from these major breaches.

How to Stop Business Email Compromise (BEC) Attacks

A Business Email Compromise (BEC) is any type of cyber attack using email that in itself does not contain a malicious attachment. Although there are many different BEC attack vectors, the dominant one is spoofing, used in almost 50% of all BEC attacks. In a spoofing attack, the criminal sends an email that appears to be from a high-ranking member of the organization, requesting a transfer of funds.

Finally, Online, Instructor-Led, Cybersecurity Workshop for Non-IT Users

Your computer and phone, data, and communications are under 24/7/365 attack by organized crime, state agencies, and invasive marketing groups. If you can tap, double-tap, and save a file, you don’t need a cybersecurity professional – you can DIY in 1 hour a day for 10 days. All workshops include private instructor time (a $250 per hour value), the best-selling Practical Paranoia Security Essentials workbook, and step-by-step guidance to help secure your digital life to industry standards.

Only 1 Week Left to Save 55% For the BEST and EASIEST Cybersecurity Class

Now there is cybersecurity and internet privacy online training for the average user! No jargon, no theory. Just step-by-step how-to!

How Often Should I Change Passwords

There was a time, not so long ago, where most IT administrators mandated that every password for everything be changed every three months.
Thankfully, someone took a deep breath and gave some time to actual critical thinking about the whole password life span issue. The conclusion? Unless a password has been breached, or you think it could have been breached, no need to change it for…ever.

Can Law Enforcement Force You to Unlock Your Computer?

As reported by CNN, a federal judge forced a January 6, 2021 US Capitol rioter Guy Refitt to sit in front of his computer to allow face recognition to unlock the computer. The prosecution stated that the computer most likely held video footage of the riot from the helmet cam worn by Refitt.

How to Have Secure Encrypted Voice, Video, and Text Communications

Surveillance technologies now available–including the monitoring of virtually all digital information–have advanced to the point where much of the essential apparatus of a police state is already in place.
– Al Gore
Learn how to quickly and easily secure all of your communications.

How to Run Windows 11 on Apple silicon Mac

Do you use an Apple silicon Mac? Do you want to run Windows 11 on your Mac? Up until now, there were brick walls preventing doing this. But we have found the tricks to make it work!

The Practical Paranoid makes all of our books available in three formats to best meet your unique needs:

 

  • Paperback.

    This is the traditionally published book. Most are 7.5”x9.25” for easy shelving, reading, and carrying. The biggest advantages of paperback is that you can quickly move through the book, and you can write notes, highlight passages, and even dog ear pages.

  • Kindle.

    The ebook took the market by storm, with Amazon’s Kindle format being the most popular. These are exact replica’s of the paperback editions. You can read a Kindle book on an Amazon reader, any Android or iOS phone or tablet, and macOS and Windows computers. With Kindle books, you can update to the latest book version by deleting the book from your device, and then download the current version from your Kindle Library.

  • Live.

    The Practical Paranoid has taken the ebook one step further. With our Live editions, you will always have the most current version of the book. Live books are exact pdf replica’s of the paperback editions that are viewed online in a browser. Any device that has Internet and browser capabilities will have full access to Live books without even downloading them.

A Great Step-By-Step Guide You'd be Foolish Not to Follow

This reviewer is a 60+, female, self-trained MAC user currently in OS10.8.1 and getting ready to buy a new MAC with Mavericks OS. I purchased and read Marc’s book cover to cover in preparation for understanding the scope of my commitment to get my new Maverick OS computer set-up in the most optimal way, for my home-use network. I want to get it hardened from the get-go. This was the best forty odd-dollar investment I could have made.

Practical Paranoia for the non-paranoid...


I became a client of Marc’s five or six years ago when I said goodbye to Windows, became a Mac shop and put in an OS X server. So when Marc announced his new book, Practical Paranoia, I didn’t waste any time buying a copy.

The reason is simple, when Marc tells you something, you can take it to the bank.

The book is clean, well organized, designed to be completely accessible for the non-geek, and provides step-by-step screen shots and instructions on how to save yourself from the nightmare of data loss or breach.

Best Book on the Subject


Easy to use – I did about half of the recommendations in under an hour. I’m a writer and I run a business from home. I’m not so technically adept. When I travel, I hate packing up all my equipment and putting things in storage to make sure that, in the unlikely event the house is robbed, all my data is safe and I could easily restart my business from a backup in the cloud. This book is a “paint-by-numbers” approach to security for every aspect of a computer system, from backups to email to encrypting the physical drives.

There’s really nothing else on the subject, unless you want to read technical blogs for days. This book has it all in one place and makes it easy for even a normal person (like me).