Utilizing Passkeys for Enhanced Security 👍 – Gmail Setup with Yubikey
Check out the video for a walkthrough!
Utilizing Passkeys for Enhanced Security 👍 – Gmail Setup with Yubikey Read More »
Check out the video for a walkthrough!
Utilizing Passkeys for Enhanced Security 👍 – Gmail Setup with Yubikey Read More »
Our portable devices have evolved into veritable data vaults as an outcome of our increasingly connected and digital lives. As a result, they’re easy prey for cybercriminals. Here are some tips to protect yourself and your technology. 1. Upgrade your software routinely. Keeping all of your devices up-to-date is the first line of defense against
Ten Ways to Protect yourself and your Devices Read More »
When it comes to IP addresses on your network, you are most likely to come across two phrases: public and private. To begin, let us define what an IP address is. IP addresses are numeric network identifiers that identify your device, much like your street address. The router or gateway DHCP service—the addressing service—assigns
The importance of Public and Private IP Addresses – Unearthing the 192.168 Read More »
As business owners, we have to weigh the costs and make sure things balance out. Some of the decisions that I see people and companies making are mind blowing from a technical standpoint. One thing I want to make sure that is stressed is that reactivity costs you and your business more in the long
Reactivity is Costing you Money Read More »
These happen from time to time. It’s a malicious script that locks up your browser and as such your computer. It calls for urgency in calling a number. All these are, are pop up ads. These can be closed out very easily with CTRL ALT DEL, choosing task manager, then force quitting your browser. The
Pop up ads asking you to call Microsoft are never legitimate. Read More »
There are a few “factors” that affect your accounts and logging in. You have your username, which is sometimes your email address. You have a password, which is a secure string of characters that you use to protect your account. Then there’s a third (or more) factor, which is referred to as 2FA or MFA
Do this right now! – Enable 2FA Read More »
Listen to Password Security by Tech Ninja on #SoundCloudhttps://soundcloud.app.goo.gl/jctn3
Password Security – Avoid the breach Read More »
The art of manipulating people in order to gain access to technology that would otherwise be out of reach is known as “social engineering.” No matter how secure a system is, the human element can almost always be fooled. Therefore, humans are commonly the weakest link in the tech world. A legitimate user will always
Social Engineering – Why it matters Read More »
Emails get compromised all the time. Most commonly from Phishing scams, where credentials get typed into a non-legitimate website. The two signs of compromise are: You are missing emails people say they sent you Contacts report strange emails from you Though this isn’t definitive, as these things can happen even without you being compromised. Missing
Think your email has been compromised? Do this. Read More »