• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

All Things Secured

Online Security Made Simple

FREE ONLINE SECURITY CHECKLIST! DOWNLOAD NOW

  • Security Basics
    • Start Here (Security Guide)
    • What is a VPN?
    • What is 2-Factor Authentication?
    • What is SmartDNS?
    • Bad Security Habits
    • Http vs Https?
  • VPN Security
    • Best VPNs 2022
    • Best Free VPNs 2022
    • VPN Reviews
      • ExpressVPN Review
      • Surfshark Review
      • NordVPN Review
      • ProtonVPN Review
      • VyprVPN Review
      • Mozilla VPN Review
      • IPVanish Review
      • Avast VPN Review
      • Ivacy VPN Review
      • PureVPN Review
      • Atlas VPN Review
    • Frequent Asked Questions
      • Are VPNs Illegal?
      • Tor vs VPN?
      • What is a VPN Kill Switch?
      • What is Split Tunneling?
      • Zero Log VPN?
      • Free VPN vs Paid VPN?
      • Lightway vs WireGuard vs OpenVPN
      • Increase Internet Speed on VPN?
      • How to Watch Netflix in China?
    • 10 Important VPN Features
    • Common VPN Myths
    • Common VPN Scams
    • VPN Connection Protocols Guide
  • Password Security
    • Password Manager Setup Guide
    • Best Password Managers 2022
      • 1Password Review
      • Dashlane Review
      • NordPass Review
      • Best iOS Password Manager
    • Frequently Asked Questions
      • How Do Password Managers Work?
      • Are Password Managers Safe?
      • Are Chrome Passwords Secure?
    • Double Blind Password Strategy
    • Using Google Authenticator
  • Email Security
    • Secure Email Providers in 2022
    • Email Phishing Scams
    • Best Gmail Alternatives
    • Gmail vs ProtonMail
  • Resources
    • Help! I’ve Been Hacked!
    • Password Strength Checker
    • Security Checklist PDF
    • Digital Death Checklist
  • About
    • Contact
    • Advertise

Online Security Tips

Welcome to some of the best personal online security tips you'll find anywhere on the web!

Scroll through our most recent articles here or you can follow our step-by-step cybersecurity start page. My hope is that you'll be able to use these cybersecurity tips to lock down your online accounts, create better passwords, and browse the internet more securely.

You don't have to be tech-savvy and you don't have to spend a lot of money. These tips from All Things Secured can be done in just a few minutes or less and can make a drastic difference in your overall security and privacy online.

So what are you waiting for?!

Start browsing these online security tips NOW!

⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓

What is a Double Blind Password? Password Manager Hack for 2022

May 27, 2022 By Josh

Double Blind Password Manager Hack

Double blind password refers to a secure way to store passwords within a password manager app that keeps the real password hidden from both the app and the user. This method is a recommended solution for those who want the convenience of a password manager app without the potential risks of a security breach. The […]

Online Anonymity is a MYTH (here’s what you need to do)

May 2, 2022 By Josh

Anonymity online is a myth

How much of your personal information is available for free online? Watch as Josh takes an anonymous dating profile and turns it into a Google Street View of the guy’s front door. You may be surprised how easy it is to dig personal information online! Last month, a friend of mine asked for a special […]

How to MANUALLY Setup a 2FA Security (in 3 minutes!)

April 26, 2022 By Josh

How to manually set up 2fa authenticator without a QR code

Manually setting up a 2FA security is surprisingly easy and can be accomplished in just 3 minutes! In this video, Josh walks you through the entire process on Twitter as well as addresses problems that may be encountered during the manual setup. Watch until the end to make sure you hear TWO IMPORTANT pieces of […]

Yubikey 5 vs Bio vs Security Key | Which Yubikey Should I Buy?

April 21, 2022 By Josh

Which Yubikey should I use?

When it comes to 2FA keys, the Yubikey 5 NFC is considered the gold standard. But with the introduction of the new Bio key in late 2021, which offers biometric protection via your fingerprint, the choice just got a bit more confusing. So when you compare the 5 NFC vs Bio, which Yubikey should you […]

Why “I Have Nothing to Hide!” is the MOST Dangerous Threat to Privacy

April 20, 2022 By Josh

Nothing to hide privacy argument

If you’ve ever heard (or said) the words “I have nothing to hide!” when talking about social media, your online shopping, or any other kind of data collection, you’re not alone. It’s the most common response, yet it’s also the most dangerous. Here’s why this one sentence is the biggest threat to our privacy as […]

How to Encrypt Your Internet Connection

April 19, 2022 By Josh

How to Encrypt Internet Connection

Encryption is a method of securing data as it travels from the sender to the receiver. With end-to-end encryption, a message’s contents are scrambled and can only be unscrambled when it reaches the desired destination. Here is how to encrypt internet connection. Encryption converts the original representation of the information, known as plaintext, into an alternative […]

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 5
  • Go to Next Page »

Primary Sidebar

Download the free online security checklist!
Check your password with this password checker by All Things Secured

Recommended VPNs

ExpressVPN Logo MarkExpressVPN (Best Overall)
Surfshark Logo MarkSurfshark VPN (Best Value)
ProtonVPN Logo MarkProtonVPN (Best for Privacy)
NordVPN logo markNordVPN (Best Design)
IPVanish Logo markIPVanish (Best for USA)

Recommended Password Managers

1Password Logo Mark1Password (Best for Individuals)
Dashlane Logo MarkDashlane (Best for Businesses)
Bitwarden Logo MarkBitwarden (Best Free Option)

Best Secure Email Providers

ProtonMail Logo MarkProtonMail (Best Gmail Alternative)
Hushamil Logo MarkHushMail (HIPAA Compliant Email)
Tutanota Logo MarkTutanota (Best Limited Free Option)

Best Identity Theft Protection

IdentityForce Logo MarkIdentity Force (Personally Recommended)

Best Personal Privacy Tools

Use Traveling Mailbox to keep your address privateTraveling Mailbox (private virtual address)
Hushed private second phone numberHushed (private 2nd phone line)

© 2022 All Things Secured
 · Affiliate Disclaimer 
· Privacy Policy
 · Advertise
 · Contact