domain name

How to Use Email Aliases (Part 2)

In my last article, I told you why using email aliases can both improve your security and protect your privacy. There are two main options for this today: an email aliasing service and using your own custom domain name. Today I’ll tell you about the latter. (If you haven’t read the previous article, definitely start […]

How to Use Email Aliases (Part 2) Read More »

It’s Time to Try Proton

Email has been around for literally decades. But security and privacy were not included in the original design. There are several solutions to this oversight, but one stands out for me. I firmly believe you should try Proton. Privacy Not Included Email as we know it today was first developed in the 1990s, using open

It’s Time to Try Proton Read More »

How to Catch a Phish

October is Cybersecurity Awareness Month and one of the themes this year is Recognize & Report Phishing. I also just had an informative interview with Nick Oles on phishing based on his book, “How to Catch a Phish“. So let’s do a quick refresher on how to spot and handle a phishing scam. Catch a

How to Catch a Phish Read More »

iOS 17 Security & Privacy

Apple’s iOS 17, released last week, contains several interesting privacy and security features. Here’s a quick overview. Lockdown Mode Apple introduced Lockdown Mode in iOS 16 which was designed to protect iPhones against “extremely rare and highly sophisticated cyber attacks”. While Apple didn’t mention the NSO Group’s Pegasus by name, they did say that the

iOS 17 Security & Privacy Read More »

Secure Your Network 3: Assess

[This is the 3rd in a 4-part series – part 1, part 2, part 4] At this point, we’ve done a thorough inventory of our network devices (Scan) and we’ve taken the opportunity to get rid of any devices that we no longer need or at least disabled the smart features if we don’t need

Secure Your Network 3: Assess Read More »

How to Block the New .zip Domain

For many years, the internet was populated by just a handful of “top level domains”, or TLD’s: .com, .net, .org, .gov, .mil and .edu. You might also realize that we use dotted suffixes to denote computer file types, like .txt, .doc or .pdf. It would make sense to try to avoid ambiguity there, right? Unfortunately,

How to Block the New .zip Domain Read More »

The Pros and Cons of Passkeys

When I first read about passkeys, I got super excited. Finally it seemed that we might truly have a “password killer” technology. Passkeys promised to be easier to use and more secure than passwords. It’s a rare thing in security when you can improve convenience and security simultaneously. However, as this cool new technology actually

The Pros and Cons of Passkeys Read More »

How to Avoid Juice Jacking

You’re in the airport, facing a long day of travel… and you forgot to charge your phone last night. You’re looking at the dreaded red battery symbol. And you just realized your wall charger is in your checked baggage. There, just up ahead, you see a public charging station, with several open USB ports. Is

How to Avoid Juice Jacking Read More »

Scroll to Top