We all have bad digital habits…but often we don’t know what they are or, worse yet, we don’t know how to fix them. These bad habits can have serious consequences, though, so it’s worth your time to read through to determine the best way to break these habits that keep you safe from online security […]
Online Security Tips
Welcome to some of the best personal online security tips you'll find anywhere on the web!
Scroll through our most recent articles here or you can follow our step-by-step cybersecurity start page. My hope is that you'll be able to use these cybersecurity tips to lock down your online accounts, create better passwords, and browse the internet more securely.
You don't have to be tech-savvy and you don't have to spend a lot of money. These tips from All Things Secured can be done in just a few minutes or less and can make a drastic difference in your overall security and privacy online.
So what are you waiting for?!
Start browsing these online security tips NOW!
⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓⇓
How to Encrypt my Internet Connection? (7 Examples)
Encryption is a method of securing data as it travels from the sender to the receiver over the internet. With end-to-end encryption, all internet traffic or messages are scrambled and can only be unscrambled when it reaches the desired destination. For those who are asking how to encrypt your internet connection…this is how. Encryption converts the […]
How to Choose the Right YubiKey (5 series vs Bio vs Security Key)
When it comes to 2FA keys, the Yubikey is considered the gold standard. But since there are multiple keys that they offer – the 5 series, the new Bio and even the budget security key – choosing the best YubiKey can be a bit confusing. So when you compare the 5 NFC vs Bio, which […]
How to Hide Your Home Address (keep someone from finding you)
If you value your personal privacy, protecting and hiding your home address should be a top priority. This is true whether you want to keep somebody from finding you or you simply want to hide your home address online. Thankfully, there are steps you can take based on three levels of privacy that fit your […]
What is SIM Swapping? (and how to avoid this attack)
“SIM Swapping” is a malicious attack targeting your mobile carrier that allows the attacker to gain control of your phone number to intercept any 2-step authentication or verification codes that may be sent via SMS text. Learn more about your SIM (subscriber identity module), what this sim swap fraud looks like, and how you can […]
What is a Virtual Credit Card? Best Way to Mask Financial Data
A virtual credit card is a temporary credit card number that can be used for online shopping and certain over-the-phone transactions (when incorporated into Google Pay or Apple Pay). These disposable card numbers are designed to protect your actual account number from falling into the wrong hands. Virtual credit cards can protect you from having your […]