• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

All Things Secured

Online Security Made Simple

FREE ONLINE SECURITY CHECKLIST! DOWNLOAD NOW

  • Security Basics
    • Start Here (Security Guide)
    • What is a Digital Footprint?
    • What is a VPN?
    • What is 2-Factor Authentication?
    • What is SmartDNS?
    • Bad Security Habits
    • Http vs Https?
  • VPN Security
    • Best VPNs 2025
    • Best Free VPNs 2025
    • VPN Reviews
      • ExpressVPN Review
      • Surfshark Review
      • NordVPN Review
      • ProtonVPN Review
      • VyprVPN Review
      • Mozilla VPN Review
      • IPVanish Review
      • Avast VPN Review
      • Ivacy VPN Review
      • PureVPN Review
    • Frequent Asked Questions
      • Are VPNs Illegal?
      • Tor vs VPN?
      • What is a VPN Kill Switch?
      • What is Split Tunneling?
      • Zero Log VPN?
      • Free VPN vs Paid VPN?
      • Lightway vs WireGuard vs OpenVPN
      • Increase Internet Speed on VPN?
      • How to Watch Netflix in China?
    • 10 Important VPN Features
    • 5 Best VPNs for Routers
    • Common VPN Myths
    • Common VPN Scams
    • VPN Connection Protocols Guide
  • Password Security
    • Password Manager Setup Guide
    • Best Password Managers 2025
      • Proton Pass Review
      • 1Password Review
      • Dashlane Review
      • NordPass Review
      • Best iOS Password Manager
    • Frequently Asked Questions
      • How Do Password Managers Work?
      • Are Password Managers Safe?
      • Are Chrome Passwords Secure?
    • Double Blind Password Strategy
    • Using Google Authenticator
  • Email Security
    • Secure Email Providers in 2025
    • ProtonMail Review
    • Email Phishing Scams
  • Resources
    • Help! I’ve Been Hacked!
    • Password Strength Checker
    • Security Checklist PDF
    • Digital Death Checklist
  • About
    • Contact
    • Advertise

Josh

Are Virtual Mailboxes Safe? Here’s How You Can Know for Sure

January 31, 2024 By Josh

Are virtual mailboxes safe

Whether you’re an individual or a business, it’s critical to answer the simple question: are virtual mailboxes safe? The truth is that not all of these online mailboxes are created equal, and the more you understand how a virtual address works, the easier it is to make a good decision on which to use. I’ve […]

How to Hide Your Home Address (keep someone from finding you)

January 31, 2024 By Josh

how to hide your home address

If you value your personal privacy, protecting and hiding your home address should be a top priority. This is true whether you want to keep somebody from finding you or you simply want to hide your home address online. Thankfully, there are steps you can take based on three levels of privacy that fit your […]

What is SIM Swapping? (and how to avoid this attack)

January 29, 2024 By Josh

What is a SIM Swapping attack?

“SIM Swapping” is a malicious attack targeting your mobile carrier that allows the attacker to gain control of your phone number to intercept any 2-step authentication or verification codes that may be sent via SMS text. Learn more about your SIM (subscriber identity module), what this sim swap fraud looks like, and how you can […]

What is WireGuard? Simple Explanation of a New(er) VPN Protocol

January 22, 2024 By Josh

What is Wireguard VPN protocol?

Wireguard is a (relatively) new VPN connection protocol that has been developed to be faster, simpler, and easier to implement than older VPN protocols such as OpenVPN and IPsec. It was initially developed for Linux but has been adapted for all major platforms and remains an open-source project. Here’s what you need to know. To […]

Your VPN is Lying about its “Zero-Log VPN” (here’s the proof)

January 22, 2024 By Josh

VPN is lying about VPN logs

Is there such a thing as a zero log VPN? The short answer is no, there isn’t. In fact, these companies are flat out lying to you when they claim they are a no logs VPN. That’s the bad news. The good news is that the more you understand VPN logging, the better prepared you can be […]

2FA vs MFA | Is Two-Factor or Multi-Factor Authentication Better?

January 12, 2024 By Josh

2FA vs MFA explained

When accessing sensitive information online, we want to make sure that everything we interact with is safe, secure, and protected. Whether for personal or business use, it’s important to consider additional access security, when deciding between 2FA and MFA. Logging into a website creates a traces of your digital footprint. While this doesn’t typically affect us […]

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 22
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Interim pages omitted …
  • Page 30
  • Go to Next Page »

Primary Sidebar

Download the free online security checklist!
Check your password with this password checker by All Things Secured

Best Personal Privacy Tools

Use DeleteMe to Remove Your data onlineDeleteMe (data removal)
Use Traveling Mailbox to keep your address privateTraveling Mailbox (private address)
Hushed private second phone numberHushed (private phone)

Recommended Password Managers

Proton Pass Logo MarkProton Pass (Best Overall)
1Password Logo Mark1Password (Popular)
Bitwarden Logo MarkBitwarden (Best Free Option)

Best Secure Email Providers

ProtonMail Logo MarkProtonMail (Recommended)
Tuta Encrypted EmailTuta (formerly Tutanota)
StartMail Logo MarkStartmail (from StartPage)

Recommended VPNs

ProtonVPN Logo MarkProtonVPN (Best Overall)
NordVPN Logo MarkNordVPN (best for streaming)
iVPN Logo MarkiVPN (best for privacy)

Best Identity Theft Protection

Identity Guard Logo MarkIdentity Guard (Recommended)

Build Better Security in 1 Week.

Start the 7-Day Email Course Today.

Take the Free Course

Copyright © 2025 · Disclaimer 
· Privacy Policy
 
· Terms of Service
 
· Cookie Policy
 · Advertise
 · Contact