In previous posts in this series I covered how to create strong passwords
[https://johnopdenakker.com/how-to-create-strong-passwords], how to enable multi-factor
authentication [https://johnopdenakker.com/better-account-security-with-mfa], and how to do
this in such
Using social media is not as innocent as it looks. There are several security and privacy risks lurking around the corner. It's important to be on your guard. In this post
In these series I covered already several forms of online crime, for instance
ransomware [https://johnopdenakker.com/ransomware-101], phishing [https://johnopdenakker.com/phishing-101]
and tech support scams [https://johnopdenakker.com/tech-support-scams-what-you-need-to-know].
They all
With the blogs in this series I want to reach not only my typical audience,
security professionals, but especially less security aware people to help them
improve their personal security. If you think
What do you do if you want to know more about someone? You'll do a search on
their name in your favorite search engine, right?
And your image about that person