Double blind password refers to a secure way to store passwords within a password manager app that keeps the real password hidden from both the app and the user. This method is a recommended solution for those who want the convenience of a password manager app without the potential risks of a security breach. The […]
Online Security Tips
Welcome to some of the best personal online security tips you'll find anywhere on the web!
Scroll through our most recent articles here or you can follow our step-by-step cybersecurity start page. My hope is that you'll be able to use these cybersecurity tips to lock down your online accounts, create better passwords, and browse the internet more securely.
You don't have to be tech-savvy and you don't have to spend a lot of money. These tips from All Things Secured can be done in just a few minutes or less and can make a drastic difference in your overall security and privacy online.
So what are you waiting for?!
Start browsing these online security tips NOW!
How much of your personal information is available for free online? Watch as Josh takes an anonymous dating profile and turns it into a Google Street View of the guy’s front door. You may be surprised how easy it is to dig personal information online! Last month, a friend of mine asked for a special […]
Manually setting up a 2FA security is surprisingly easy and can be accomplished in just 3 minutes! In this video, Josh walks you through the entire process on Twitter as well as addresses problems that may be encountered during the manual setup. Watch until the end to make sure you hear TWO IMPORTANT pieces of […]
When it comes to 2FA keys, the Yubikey 5 NFC is considered the gold standard. But with the introduction of the new Bio key in late 2021, which offers biometric protection via your fingerprint, the choice just got a bit more confusing. So when you compare the 5 NFC vs Bio, which Yubikey should you […]
If you’ve ever heard (or said) the words “I have nothing to hide!” when talking about social media, your online shopping, or any other kind of data collection, you’re not alone. It’s the most common response, yet it’s also the most dangerous. Here’s why this one sentence is the biggest threat to our privacy as […]
Encryption is a method of securing data as it travels from the sender to the receiver. With end-to-end encryption, a message’s contents are scrambled and can only be unscrambled when it reaches the desired destination. Here is how to encrypt internet connection. Encryption converts the original representation of the information, known as plaintext, into an alternative […]