Q: Can a MacBook last 10 years?
A: Physically, easy. I suspect the majority of computers can physically outlive their owner.
Q: How do I protect a Google Doc?
A: A google doc is just an html file, like a web page. Primary protection is in the form of permissions protection. Be specific who has access, and what permissions they have.
Q: What is the best way to back up your data and keep it safe?
A: It is vital to back up all of your data in case the original becomes damaged, corrupt, or deleted. To protect your data you must have AT LEAST one local and one remote backup.
Q: How Do I Know if My Personal Information Has Been Hacked?
It is almost certain that things you view as personal and private information have been harvested about you, and may be freely available to criminals, advertisers, and other miscreants. Once the information is “out there”, it can’t be put back in the bottle. But there is plenty you can do to prevent it from happening.
Q: How Vulnerable Are My Children To a Cybersecurity Or Internet Privacy Breach?
According to a report released today (August 11, 2021) by NIST (National Institute of Standards and Technology), 87% of high schoolers use the same password for everything. 45% of high schoolers share passwords with their friends. According to the research, teens don’t see password sharing as risky behavior, but a way to build friendships and trust.
Q: What’s the Big Deal Over Two-Factor Authentication?
No matter how “great” or “strong” your password, it can be broken, hijacked, or bypassed. Perhaps the most common method to usurp your password is by breaching the user database of a major vendor. Read on to learn how just a few clicks can enable your Two-Factor Authentication, shielding you from these major breaches.
How to Stop Business Email Compromise (BEC) Attacks
A Business Email Compromise (BEC) is any type of cyber attack using email that in itself does not contain a malicious attachment. Although there are many different BEC attack vectors, the dominant one is spoofing, used in almost 50% of all BEC attacks. In a spoofing attack, the criminal sends an email that appears to be from a high-ranking member of the organization, requesting a transfer of funds.
Finally, Online, Instructor-Led, Cybersecurity Workshop for Non-IT Users
Your computer and phone, data, and communications are under 24/7/365 attack by organized crime, state agencies, and invasive marketing groups. If you can tap, double-tap, and save a file, you don’t need a cybersecurity professional – you can DIY in 1 hour a day for 10 days. All workshops include private instructor time (a $250 per hour value), the best-selling Practical Paranoia Security Essentials workbook, and step-by-step guidance to help secure your digital life to industry standards.
Only 1 Week Left to Save 55% For the BEST and EASIEST Cybersecurity Class
Now there is cybersecurity and internet privacy online training for the average user! No jargon, no theory. Just step-by-step how-to!
How Often Should I Change Passwords
There was a time, not so long ago, where most IT administrators mandated that every password for everything be changed every three months.
Thankfully, someone took a deep breath and gave some time to actual critical thinking about the whole password life span issue. The conclusion? Unless a password has been breached, or you think it could have been breached, no need to change it for…ever.
Can Law Enforcement Force You to Unlock Your Computer?
As reported by CNN, a federal judge forced a January 6, 2021 US Capitol rioter Guy Refitt to sit in front of his computer to allow face recognition to unlock the computer. The prosecution stated that the computer most likely held video footage of the riot from the helmet cam worn by Refitt.
How to Have Secure Encrypted Voice, Video, and Text Communications
Surveillance technologies now available–including the monitoring of virtually all digital information–have advanced to the point where much of the essential apparatus of a police state is already in place.
– Al Gore
Learn how to quickly and easily secure all of your communications.
How to Run Windows 11 on Apple silicon Mac
Do you use an Apple silicon Mac? Do you want to run Windows 11 on your Mac? Up until now, there were brick walls preventing doing this. But we have found the tricks to make it work!
July 4th – Biggest Announcement EVER from The Practical Paranoid
We are at the mercy of our government, Facebook, Google, cyber criminals, and other bad actors intent on knowing, seeing, and recording our every digital nanosecond.
Time for an updated Independence Day.
Announcing five brand-new Practical Paranoia Security Essentials Online Workshops that cover all the new OS’s for 2021.
Register for our August beta workshops and receive a 55% discount!
5.8 Million Android Apps Installed Steal Users’ Facebook Credentials
Nine Android apps with a combined downloaded of over 5.8 million have been removed from the Google Play Store for stealing users’ Facebook credentials. These fully functional apps performed their theft by requesting users to log into their Facebook account in order to disable in-app ads.