• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

All Things Secured

Online Security Made Simple

FREE ONLINE SECURITY CHECKLIST! DOWNLOAD NOW

  • Basics
    • Start Here (Security Guide)
    • What is a Digital Footprint?
    • What is a VPN?
    • What is 2-Factor Authentication?
    • What is SmartDNS?
    • Bad Security Habits
    • Http vs Https?
  • VPNs
    • Best VPNs 2026
    • Best Free VPNs 2026
    • VPN Reviews
      • ProtonVPN Review
      • ExpressVPN Review
      • Surfshark Review
      • NordVPN Review
      • VyprVPN Review
      • Mozilla VPN Review
      • IPVanish Review
      • Avast VPN Review
      • Ivacy VPN Review
      • PureVPN Review
    • Frequent Asked Questions
      • Are VPNs Illegal?
      • Tor vs VPN?
      • What is a VPN Kill Switch?
      • What is Split Tunneling?
      • Zero Log VPN?
      • Free VPN vs Paid VPN?
      • Lightway vs WireGuard vs OpenVPN
      • Increase Internet Speed on VPN?
      • How to Watch Netflix in China?
    • Key VPN Features
    • 5 Best VPNs for Routers
    • VPN Myths
    • VPN Scams
    • VPN Protocols Guide
  • Passwords
    • Password Manager Setup
    • Best Password Managers 2026
      • Proton Pass Review
      • 1Password Review
      • Dashlane Review
      • NordPass Review
      • Best iOS Password Manager
    • Frequently Asked Questions
      • How Do Password Managers Work?
      • Are Password Managers Safe?
      • Are Chrome Passwords Secure?
    • Double Blind Password Strategy
    • Using Google Authenticator
  • Email
    • Secure Email Providers in 2026
    • ProtonMail Review
    • Email Phishing Scams
  • Cloud
    • Best Encrypted Cloud Storage
    • Cryptomator vs Boxcryptor
  • Resources
    • Help! I’ve Been Hacked!
    • Password Strength Checker
    • Security Checklist PDF
    • Digital Death Checklist
  • About
    • Contact
    • Advertise

Josh

What is an Email Alias? 5 Types + How to Use Them

October 24, 2024 By Josh

Email alias meaning

An email alias is an extra, custom email address that forwards to your main account. For small businesses and organizations, it provides an easy way to organize and manage communication. For individuals, an email alias is an excellent way to build privacy and minimize spam. To better understand the email alias meaning, we’re going to […]

10 Personal Safety Tips for Everyday Life

October 3, 2024 By Josh

Personal safety tips for everyday life

In an increasingly unpredictable world, personal safety and security has never been more essential. Whether navigating bustling urban environments or enjoying the tranquility of suburban life, being prepared and aware can significantly enhance your safety and peace of mind. From honing your situational awareness to maintaining physical fitness, each section provides actionable insights designed to […]

How to Setup a 2FA Security Key (Yubikey Tutorial)

September 27, 2024 By Josh 2 Comments

Yubikey Setup Tutorial

As online threats continue to grow, protecting your accounts has never been more crucial. Traditional username and password combinations are often not enough to safeguard your online identity, and that’s where two-factor authentication (2FA) comes in. One of the most robust forms of 2FA involves using a hardware security key, like a Yubikey. In this […]

Yubico Security Key Vulnerability: Are the 2FA Keys Secure?

September 9, 2024 By Josh

Yubico 2Fa security key vulnerability

Yubico, a leading name in hardware security keys, recently acknowledged a vulnerability discovered in some of their products, sparking concern in the cybersecurity community. The issue lies in the cryptographic library used in YubiKey 5 Series and Security Key Series devices with firmware versions prior to 5.7.0. The vulnerability has raised questions among users, but […]

What is a Passkey? Understanding the Future of Online Security

August 27, 2024 By Josh

What is a passkey?

In an era where online security is increasingly critical, traditional usernames and passwords are facing stiff competition from a new security standard known as passkeys. This standard has proven quite confusing however. Are passkeys more secure than 2FA? Do passkeys replace passwords? In this article, we will dive deep into what passkeys are, how they […]

What is 2-Factor Authentication & Why You Should Use It

May 12, 2024 By Josh

What is 2FA

Two-factor authentication (2FA), also referred to as multi-factor authentication (MFA), is a method by which an institution, website, social media platform or other application verifies your identity beyond the first of step of using your password. Here’s what you need to know about how it works and three ways that you can easily set it […]

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Interim pages omitted …
  • Page 31
  • Go to Next Page »

Primary Sidebar

Download the free online security checklist!
Check your password with this password checker by All Things Secured

Best Personal Privacy Tools

Use DeleteMe to Remove Your data onlineDeleteMe (data removal)
Use Traveling Mailbox to keep your address privateTraveling Mailbox (private address)
Hushed private second phone numberHushed (private phone)

Recommended Password Managers

Proton Pass Logo MarkProton Pass (Best Overall)
1Password Logo Mark1Password (Popular)
Bitwarden Logo MarkBitwarden (Best Free Option)

Best Secure Email Providers

ProtonMail Logo MarkProtonMail (Recommended)
Tuta Encrypted EmailTuta (formerly Tutanota)
StartMail Logo MarkStartmail (from StartPage)

Recommended VPNs

ProtonVPN Logo MarkProtonVPN (Best Overall)
NordVPN Logo MarkNordVPN (best for streaming)
iVPN Logo MarkiVPN (best for privacy)

Best Identity Theft Protection

Identity Guard Logo MarkIdentity Guard (Recommended)

Build Better Security in 1 Week.

Start the 7-Day Email Course Today.

Take the Free Course

Copyright © 2026 · Disclaimer 
· Privacy Policy
 
· Terms of Service
 
· Cookie Policy
 · Advertise
 · Contact