It is almost certain that things you view as personal and private information have been harvested about you, and may be freely available to criminals, advertisers, and other miscreants. Once the information is “out there”, it can’t be put back in the bottle. But there is plenty you can do to prevent it from happening.
According to a report released today (August 11, 2021) by NIST (National Institute of Standards and Technology), 87% of high schoolers use the same password for everything. 45% of high schoolers share passwords with their friends. According to the research, teens don’t see password sharing as risky behavior, but a way to build friendships and trust.
No matter how “great” or “strong” your password, it can be broken, hijacked, or bypassed. Perhaps the most common method to usurp your password is by breaching the user database of a major vendor. Read on to learn how just a few clicks can enable your Two-Factor Authentication, shielding you from these major breaches.
A Business Email Compromise (BEC) is any type of cyber attack using email that in itself does not contain a malicious attachment. Although there are many different BEC attack vectors, the dominant one is spoofing, used in almost 50% of all BEC attacks. In a spoofing attack, the criminal sends an email that appears to be from a high-ranking member of the organization, requesting a transfer of funds.
Your computer and phone, data, and communications are under 24/7/365 attack by organized crime, state agencies, and invasive marketing groups. If you can tap, double-tap, and save a file, you don’t need a cybersecurity professional – you can DIY in 1 hour a day for 10 days. All workshops include private instructor time (a $250 per hour value), the best-selling Practical Paranoia Security Essentials workbook, and step-by-step guidance to help secure your digital life to industry standards.
Now there is cybersecurity and internet privacy online training for the average user! No jargon, no theory. Just step-by-step how-to!
There was a time, not so long ago, where most IT administrators mandated that every password for everything be changed every three months.
Thankfully, someone took a deep breath and gave some time to actual critical thinking about the whole password life span issue. The conclusion? Unless a password has been breached, or you think it could have been breached, no need to change it for…ever.
As reported by CNN, a federal judge forced a January 6, 2021 US Capitol rioter Guy Refitt to sit in front of his computer to allow face recognition to unlock the computer. The prosecution stated that the computer most likely held video footage of the riot from the helmet cam worn by Refitt.
Surveillance technologies now available–including the monitoring of virtually all digital information–have advanced to the point where much of the essential apparatus of a police state is already in place.
– Al Gore
Learn how to quickly and easily secure all of your communications.
Do you use an Apple silicon Mac? Do you want to run Windows 11 on your Mac? Up until now, there were brick walls preventing doing this. But we have found the tricks to make it work!
We are at the mercy of our government, Facebook, Google, cyber criminals, and other bad actors intent on knowing, seeing, and recording our every digital nanosecond.
Time for an updated Independence Day.
Announcing five brand-new Practical Paranoia Security Essentials Online Workshops that cover all the new OS’s for 2021.
Register for our August beta workshops and receive a 55% discount!
Nine Android apps with a combined downloaded of over 5.8 million have been removed from the Google Play Store for stealing users’ Facebook credentials. These fully functional apps performed their theft by requesting users to log into their Facebook account in order to disable in-app ads.
You already know how vital it is to keep your operating system and applications fully up to date. This is because most updates include security enhancements and patches to vulnerabilities.But few people give thought to updating the firmware of their routers and modems–and this is perhaps even more important. Because if there is a vulnerability in your router or modem, a bad actor can have full access to your network and all the data that travels along it. And that has just happened, again.
With your computers, tablets, and smartphones, you can add a layer of protection against malware by installing quality antimalware software. But what about your printer, smartwatch, doorbell, thermostat… you get the picture. Each of these smart devices are open to a breach, and few offer any option to install or configure security.
A new study by Cyberreason has found that 80% of organizations that were hit with ransomware and paid to get the decryption key, were then hit once again with another ransomware. Approximately 50% of the new attacks were from the original criminals, and 50% were from new criminals. Discover how to quickly and easily improve your ransomware defenses.