How does Two-Factor Authentication work?

How does Two-Factor Authentication work? When you want to sign into your account, you are prompted to authenticate with a username and a password – that’s the first verification layer. Two-factor authentication works as an extra step in the process, a second security layer, that will reconfirm your identity. Its purpose is to make attackers’ […]

Create back-up copies for your important stuff

Create back-up copies for your important stuff Though you may have all the security protection in the world, disaster may still hit your system and your valuable files. It may be a system crash, a hard disk failure, a ransomware attack that encrypts your entire operating system or it may be a human mistake. There […]

The list of shameful passwords

The list of shameful passwords No matter how uninspired you are, never ever, under any circumstances, set one of the following passwords for your account:  Any variation of the word “password” or “admin”. Your name or surname. Your partner’s name or surname. Name or surname of any member of your family. The dog counts as […]

How to stay safe on public wireless networks

How to stay safe on public wireless -01

How to stay safe on public wireless networks   I already talked about why you shouldn’t connect to a public wireless networks and the security risks you expose yourself to. However, if it’s inevitable, here’s how to make sure that your connection is somewhat secure: Hover your mouse over the network name to see which […]

Types of malware you can find in the wild (wild Internet)

Types of malware you can find in the wild (wild Internet) You probably wondered at least once how many types of malware (malicious software) are there and how they differ from one another. Here’s a super quick overview : Adware – delivers bad ads and can infect your computer with additional malware. Bots – malicious […]

How your online accounts are connected

How your online accounts are connected Have you ever thought of how your online accounts are interconnected? You may think that cyber criminals could never find your data appealing, but let me show you the truth. Your email holds crucial information about all your accounts, plus confidential information about your work and personal life. Your […]

What a phishing email looks like

What a phishing email looks like Ever wondered what a phishing email looks like? Maybe you’ve already seen one, but didn’t know it was a malicious attempt to collect your personal data. So here are the elements you should watch out for : Serious websites will never display your email address in the subject line […]