How to Choose a PIN

I’ve written often about the importance of choosing strong passwords. But most physical devices are protected with short PIN (personal identification number) codes. How do you pick a good one? Let’s figure out how to choose a PIN. How NOT to Choose a PIN It’s probably best to start with how not to choose a […]

How to Choose a PIN Read More »

Account Security is Broken

I spend a lot of time talking about the virtues of strong passwords (or maybe passphrases) and two–factor authentication. I’ve written about promising new authentication technologies like passkeys. But in many cases, all of that is moot. Your account security is only as secure as its weakest link. And just about every account you have

Account Security is Broken Read More »

seed codes

How to Backup 2FA Seed Codes

Security pros have been urging you to use two-factor authentication (2FA) for years. Along with using a password manager, it’s probably our top recommendation. But if you’re not careful, you could lock yourself out of your own accounts. Options for Setting Up 2FA When you set up two-factor authentication with a website, you generally have

How to Backup 2FA Seed Codes Read More »

domain name

How to Use Email Aliases (Part 2)

In my last article, I told you why using email aliases can both improve your security and protect your privacy. There are two main options for this today: an email aliasing service and using your own custom domain name. Today I’ll tell you about the latter. (If you haven’t read the previous article, definitely start

How to Use Email Aliases (Part 2) Read More »

It’s Time to Try Proton

Email has been around for literally decades. But security and privacy were not included in the original design. There are several solutions to this oversight, but one stands out for me. I firmly believe you should try Proton. Privacy Not Included Email as we know it today was first developed in the 1990s, using open

It’s Time to Try Proton Read More »

How to Catch a Phish

October is Cybersecurity Awareness Month and one of the themes this year is Recognize & Report Phishing. I also just had an informative interview with Nick Oles on phishing based on his book, “How to Catch a Phish“. So let’s do a quick refresher on how to spot and handle a phishing scam. Catch a

How to Catch a Phish Read More »

iOS 17 Security & Privacy

Apple’s iOS 17, released last week, contains several interesting privacy and security features. Here’s a quick overview. Lockdown Mode Apple introduced Lockdown Mode in iOS 16 which was designed to protect iPhones against “extremely rare and highly sophisticated cyber attacks”. While Apple didn’t mention the NSO Group’s Pegasus by name, they did say that the

iOS 17 Security & Privacy Read More »

Secure Your Network 3: Assess

[This is the 3rd in a 4-part series – part 1, part 2, part 4] At this point, we’ve done a thorough inventory of our network devices (Scan) and we’ve taken the opportunity to get rid of any devices that we no longer need or at least disabled the smart features if we don’t need

Secure Your Network 3: Assess Read More »

Scroll to Top