Q: Can My Company Read My Email?
Q: If the attorney at my office reads (Outlook) emails, where is he reading them from, an archive? Will he have access to sent email if both parties permanently delete it right away? A: The issue is a bit deeper than may initially appear. Assuming this is company...
Q: Is There Any Point To Being Careful With Your Personal Information?
Q: BECAUSE ALL OF OUR PERSONAL INFORMATION WAS ACCESSED IN THE EQUIFAX SECURITY BREACH, IS THERE ANY POINT TO BEING CAREFUL WITH YOUR PERSONAL INFORMATION? A: When you leave your house, I assume you lock all of the doors, close all the windows. This is despite the...
Q: How Many Simultaneous Users Can A Single Access Point Support?
Q: HOW MANY SIMULTANEOUS USERS CAN A SINGLE ACCESS POINT SUPPORT? A: This varies by device model. Some low-end units can only support 10 concurrent connections. Mid-range consumer units around 50. Prosumer models such as the Asus RT-AC5300 can have a bit more than...
Q: Which OS Will make My Laptop Last Longer
Q: WHICH OS WILL MAKE MY LAPTOP LAST LONGER? A: I hope you will forgive that I am side-stepping your question, as I think it is the wrong question. Computers are tools. The purpose of a tool is to extend or expand your reach, power, speed, capabilities, so that you...
Q: How to collaborate securely using iPhone or Android
Q: HOW TO COLLABORATE SECURELY USING IPHONE OR ANDROID The easy answer is to use Google Drive with Google Docs (doc, sheet, etc.) Google maintains encryption in transit and at rest, and multiple users can work on the same document at the same time. Original...
Practical Paranoia macOS (all versions) Update: Internet Activity & Social Media
PRACTICAL PARANOIA MACOS SECURITY ESSENTIALS (ALL VERSIONS) UPDATE: INTERNET ACTIVITY & SOCIAL MEDIA There have been very significant recent changes in the VPN field, as well as how Facebook and LinkedIn work to help ensure your security and privacy. Practical...
Credit Karma To Launch Free ID Monitoring
CREDIT KARMA TO LAUNCH FREE ID MONITORING Reuters announced on 20170915 (https://www.reuters.com/article/us-equifax-cyber-creditkarma/credit-karma-to-launch-free-id-monitoring-following-equifax-hack-idUSKCN1BQ2CJ) that in light of the Equifax fiasco, they are...
One More Reason Why You MUST Have Android Anti-Virus
ONE MORE REASON WHY YOU MUST HAVE ANDROID ANTI-VIRUS As reported by Check Point 20170914 <https://blog.checkpoint.com/2017/09/14/expensivewall-dangerous-packed-malware-google-play-will-hit-wallet/>, they have recently discovered at least 50 apps on Google Play...
Block Web Trackers With Ghostery
BLOCK WEB TRACKERS WITH GHOSTERY One of the more malevolent issues with cyber security and privacy is web tracking. There are thousands of businesses whose only job is to monitor everything that you do on the web. With this massive dossier on almost everyone who...
TPP Is All About Making Your STEM Course Its Best
TPP Is All About Making Your STEM Course Its Best Cybersecurity is everyone's business. And nobody is going to be able to ensure your data, identity, and credit security more than you. This is why the Practical Paranoia Security Essentials (PPSE) courses and workbooks...
Q: Are all iMessages encrypted end-to-end, on every phone provider plan?
Q: Are all iMessages encrypted end-to-end, on every phone provider plan? A: If sending from iMessage to iMessage, it is encrypted point to point. However, Apple holds a master key, and is able to read all iMessages. It was recently reported that Apple does archive...
Q: How can I know everything about computer security?
Q: How can I know everything about computer security? A: The first step to wisdom is recognizing one doesn’t know much of anything. In the case of Technology, new information is generated geometrically faster than a human can absorb it - even if that is their...
Q: Can the retails shops or any store retrieve our email ID’s with the help of credit card details (I never gave my email address but they send me invoices/receipts to my email address)?
Q: Can the retails shops or any store retrieve our email ID's with the help of credit card details (I never gave my email address but they send me invoices/receipts to my email address)? A: Of course! Not that the stores themselves can directly make the connection...
Q: Do we need to use separate VPN services in 1 household?
Q: Do we need to use separate VPN services in 1 household? A: This depends on your preferences, and on the end user license agreement with the VPN services. If everyone in the household that wants to use the vpn agree on the same service, and that vpn host allows X...
Q: Are my files safe on OneDrive, or should I encrypt them before I upload them?
Q: Are my files safe on Cloud storage, or should I encrypt them before I upload them? A: The files are safe from most criminals, and internal corporate spy’s. But not safe from from the cloud support staff, nor government troublemakers. All these folks have keys to...