Q: How Do I Know if My Personal Information Has Been Hacked?

Q: How Do I Know if My Personal Information Has Been Hacked?

It is almost certain that things you view as personal and private information have been harvested about you, and may be freely available to criminals, advertisers, and other miscreants. Once the information is “out there”, it can’t be put back in the bottle. But there is plenty you can do to prevent it from happening.

read more

Q: What’s the Big Deal Over Two-Factor Authentication?

No matter how “great” or “strong” your password, it can be broken, hijacked, or bypassed. Perhaps the most common method to usurp your password is by breaching the user database of a major vendor. Read on to learn how just a few clicks can enable your Two-Factor Authentication, shielding you from these major breaches.

read more
How to Stop Business Email Compromise (BEC) Attacks

How to Stop Business Email Compromise (BEC) Attacks

A Business Email Compromise (BEC) is any type of cyber attack using email that in itself does not contain a malicious attachment. Although there are many different BEC attack vectors, the dominant one is spoofing, used in almost 50% of all BEC attacks. In a spoofing attack, the criminal sends an email that appears to be from a high-ranking member of the organization, requesting a transfer of funds.

read more
Finally, Online, Instructor-Led, Cybersecurity Workshop for Non-IT Users

Finally, Online, Instructor-Led, Cybersecurity Workshop for Non-IT Users

Your computer and phone, data, and communications are under 24/7/365 attack by organized crime, state agencies, and invasive marketing groups. If you can tap, double-tap, and save a file, you don’t need a cybersecurity professional – you can DIY in 1 hour a day for 10 days. All workshops include private instructor time (a $250 per hour value), the best-selling Practical Paranoia Security Essentials workbook, and step-by-step guidance to help secure your digital life to industry standards.

read more
How Often Should I Change Passwords

How Often Should I Change Passwords

There was a time, not so long ago, where most IT administrators mandated that every password for everything be changed every three months.
Thankfully, someone took a deep breath and gave some time to actual critical thinking about the whole password life span issue. The conclusion? Unless a password has been breached, or you think it could have been breached, no need to change it for…ever.

read more
Can Law Enforcement Force You to Unlock Your Computer?

Can Law Enforcement Force You to Unlock Your Computer?

As reported by CNN, a federal judge forced a January 6, 2021 US Capitol rioter Guy Refitt to sit in front of his computer to allow face recognition to unlock the computer. The prosecution stated that the computer most likely held video footage of the riot from the helmet cam worn by Refitt.

read more
July 4th – Biggest Announcement EVER from The Practical Paranoid

July 4th – Biggest Announcement EVER from The Practical Paranoid

We are at the mercy of our government, Facebook, Google, cyber criminals, and other bad actors intent on knowing, seeing, and recording our every digital nanosecond.

Time for an updated Independence Day.

Announcing five brand-new Practical Paranoia Security Essentials Online Workshops that cover all the new OS’s for 2021.

Register for our August beta workshops and receive a 55% discount!

read more
Netgear Router Bug Allows Full Remote Access

Netgear Router Bug Allows Full Remote Access

You already know how vital it is to keep your operating system and applications fully up to date. This is because most updates include security enhancements and patches to vulnerabilities.But few people give thought to updating the firmware of their routers and modems–and this is perhaps even more important. Because if there is a vulnerability in your router or modem, a bad actor can have full access to your network and all the data that travels along it. And that has just happened, again. 

read more
Automatically Protect All Devices From Internet Malware and Adult Content

Automatically Protect All Devices From Internet Malware and Adult Content

With your computers, tablets, and smartphones, you can add a layer of protection against malware by installing quality antimalware software. But what about your printer, smartwatch, doorbell, thermostat… you get the picture. Each of these smart devices are open to a breach, and few offer any option to install or configure security.

read more
80% of Orgs That Paid Ransom Were Hit Again

80% of Orgs That Paid Ransom Were Hit Again

A new study by Cyberreason has found that 80% of organizations that were hit with ransomware and paid to get the decryption key, were then hit once again with another ransomware. Approximately 50% of the new attacks were from the original criminals, and 50% were from new criminals. Discover how to quickly and easily improve your ransomware defenses.

read more