• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

All Things Secured

Online Security Made Simple

FREE ONLINE SECURITY CHECKLIST! DOWNLOAD NOW

  • Security Basics
    • Start Here (Security Guide)
    • What is a Digital Footprint?
    • What is a VPN?
    • What is 2-Factor Authentication?
    • What is SmartDNS?
    • Bad Security Habits
    • Http vs Https?
  • VPN Security
    • Best VPNs 2024
    • Best Free VPNs 2024
    • VPN Reviews
      • ExpressVPN Review
      • Surfshark Review
      • NordVPN Review
      • ProtonVPN Review
      • VyprVPN Review
      • Mozilla VPN Review
      • IPVanish Review
      • Avast VPN Review
      • Ivacy VPN Review
      • PureVPN Review
    • Frequent Asked Questions
      • Are VPNs Illegal?
      • Tor vs VPN?
      • What is a VPN Kill Switch?
      • What is Split Tunneling?
      • Zero Log VPN?
      • Free VPN vs Paid VPN?
      • Lightway vs WireGuard vs OpenVPN
      • Increase Internet Speed on VPN?
      • How to Watch Netflix in China?
    • 10 Important VPN Features
    • 5 Best VPNs for Routers
    • Common VPN Myths
    • Common VPN Scams
    • VPN Connection Protocols Guide
  • Password Security
    • Password Manager Setup Guide
    • Best Password Managers 2024
      • 1Password Review
      • Dashlane Review
      • NordPass Review
      • Best iOS Password Manager
    • Frequently Asked Questions
      • How Do Password Managers Work?
      • Are Password Managers Safe?
      • Are Chrome Passwords Secure?
    • Double Blind Password Strategy
    • Using Google Authenticator
  • Email Security
    • Secure Email Providers in 2024
    • ProtonMail Review
    • Email Phishing Scams
  • Resources
    • Help! I’ve Been Hacked!
    • Password Strength Checker
    • Security Checklist PDF
    • Digital Death Checklist
  • About
    • Contact
    • Advertise

Josh

Tor vs VPN | What’s the Difference? (which you should use)

December 8, 2023 By Josh

Tor vs VPN - What is the difference?

Tor or VPN? The truth is, it’s not an apples to apples comparison, and since you really care about your privacy and security online, in this article I’m going to provide a basic explanation of how each of these tools work and the specific jobs they’re built for. There’s one important question you need to […]

What is a Decentralized VPN? The Pros and Cons of dVPN

December 7, 2023 By Josh

What is a decentralized VPN

The biggest problem with using any virtual private network, or VPN, is simply trust. Can you trust this company with your most sensitive data? But what if trust wasn’t part of the equation? In this article, we’re going to explore how decentralized virtual private networks, or “dVPN” for short, might be a solution. The Problem […]

How to Create Strong Passwords You Can Remember (3 Strategies)

December 6, 2023 By Josh

What is your password strategy?

You know you need to create a strong password for your online logins. Everybody does. The trouble is coming up with unique passwords for each account and then remembering them. Is that even possible? It is, I promise you. As proof, I’d like to share with you three simple password strategies to create strong passwords […]

Proton Mail now uses Blockchain to Verify Email Addresses (Key Transparency Explained)

November 22, 2023 By Josh

Proton Mail Key Transparency

In November 2023, Proton Privacy launched a beta feature called “Key Transparency” that utilizes a private blockchain to verify that an email address belongs to the person you intend to communicate with. Despite being one of the most respected providers of data privacy products in the world, this is the first time that Proton has […]

How to Use Gmail Confidential Mode (password-protect email)

September 10, 2023 By Josh

Gmail Confidential Mode Tutorial

There are times when sending sensitive information over email requires the ability to set that email to expire or to limit who can open that email. While there are pros and cons to using Gmail’s Confidential Mode, which I’ll explain here, this tutorial will show you exactly how to set it up and use it. […]

CyberGhost vs NordVPN | Testing Which VPN is Best in 2023

September 2, 2023 By Josh

Cyberghost vs NordVPN comparison

As you do your research before purchasing a VPN, I’d like to help you compare CyberGhost vs NordVPN. Since I’ve used and tested both services, you’ll be able to see the similarities, primary differences and a balanced opinion as to which is worth your time and money. When it comes to protecting your online privacy […]

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Interim pages omitted …
  • Page 30
  • Go to Next Page »

Primary Sidebar

Download the free online security checklist!
Check your password with this password checker by All Things Secured

Best Personal Privacy Tools

Use DeleteMe to Remove Your data onlineDeleteMe (remove personal data online)
Use Traveling Mailbox to keep your address privateTraveling Mailbox (private virtual address)
Hushed private second phone numberHushed (private 2nd phone line)

Recommended Password Managers

1Password Logo Mark1Password (Best Overall)
Dashlane Logo MarkDashlane (Best for Businesses)
Bitwarden Logo MarkBitwarden (Best Free Option)

Best Secure Email Providers

ProtonMail Logo MarkProtonMail (Best Gmail Alternative)
StartMail Logo MarkStartmail (from StartPage)
Mailfence Encrypted EmailMailfence

Recommended VPNs

ProtonVPN Logo MarkProtonVPN (Best Overall)
NordVPN Logo MarkNordVPN (best for streaming)
iVPN Logo MarkiVPN

Best Identity Theft Protection

Identity Guard Logo MarkIdentity Guard (Personally Recommended)

Copyright © 2025 · Affiliate Disclaimer 
· Privacy Policy
 · Advertise
 · Contact