In previous posts in this series I covered how to create strong passwords, how to enable multi-factor authentication, and how to do this in such a way that you don't lock yourself out
Third party apps that have access to your online accounts can pose a security and privacy risk if they have excessive permissions or when they get hacked. Read here how you can control the risk.
Tech support scams are fraudulent operations in which criminals try to convince people that they have serious problems on their computer that put them at risk. In this article you can find some tips to protect yourself against this form of fraud.
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
I regularly get questions about how to build a career in information security. I decided to do a short write-up with some tips and resources because I think there's a need for it