pixel
Q: How do I protect a Google Doc?

Q: How do I protect a Google Doc?

A: A google doc is just an html file, like a web page. Primary protection is in the form of permissions protection. Be specific who has access, and what permissions they have.

read more
Q: How Do I Know if My Personal Information Has Been Hacked?

Q: How Do I Know if My Personal Information Has Been Hacked?

It is almost certain that things you view as personal and private information have been harvested about you, and may be freely available to criminals, advertisers, and other miscreants. Once the information is “out there”, it can’t be put back in the bottle. But there is plenty you can do to prevent it from happening.

read more

Q: What’s the Big Deal Over Two-Factor Authentication?

No matter how “great” or “strong” your password, it can be broken, hijacked, or bypassed. Perhaps the most common method to usurp your password is by breaching the user database of a major vendor. Read on to learn how just a few clicks can enable your Two-Factor Authentication, shielding you from these major breaches.

read more
How to Stop Business Email Compromise (BEC) Attacks

How to Stop Business Email Compromise (BEC) Attacks

A Business Email Compromise (BEC) is any type of cyber attack using email that in itself does not contain a malicious attachment. Although there are many different BEC attack vectors, the dominant one is spoofing, used in almost 50% of all BEC attacks. In a spoofing attack, the criminal sends an email that appears to be from a high-ranking member of the organization, requesting a transfer of funds.

read more
Finally, Online, Instructor-Led, Cybersecurity Workshop for Non-IT Users

Finally, Online, Instructor-Led, Cybersecurity Workshop for Non-IT Users

Your computer and phone, data, and communications are under 24/7/365 attack by organized crime, state agencies, and invasive marketing groups. If you can tap, double-tap, and save a file, you don’t need a cybersecurity professional – you can DIY in 1 hour a day for 10 days. All workshops include private instructor time (a $250 per hour value), the best-selling Practical Paranoia Security Essentials workbook, and step-by-step guidance to help secure your digital life to industry standards.

read more
How Often Should I Change Passwords

How Often Should I Change Passwords

There was a time, not so long ago, where most IT administrators mandated that every password for everything be changed every three months.
Thankfully, someone took a deep breath and gave some time to actual critical thinking about the whole password life span issue. The conclusion? Unless a password has been breached, or you think it could have been breached, no need to change it for…ever.

read more
Can Law Enforcement Force You to Unlock Your Computer?

Can Law Enforcement Force You to Unlock Your Computer?

As reported by CNN, a federal judge forced a January 6, 2021 US Capitol rioter Guy Refitt to sit in front of his computer to allow face recognition to unlock the computer. The prosecution stated that the computer most likely held video footage of the riot from the helmet cam worn by Refitt.

read more
July 4th – Biggest Announcement EVER from The Practical Paranoid

July 4th – Biggest Announcement EVER from The Practical Paranoid

We are at the mercy of our government, Facebook, Google, cyber criminals, and other bad actors intent on knowing, seeing, and recording our every digital nanosecond.

Time for an updated Independence Day.

Announcing five brand-new Practical Paranoia Security Essentials Online Workshops that cover all the new OS’s for 2021.

Register for our August beta workshops and receive a 55% discount!

read more