The most secure passwords are the ones you can't remember
This was exactly what I tweeted earlier today. And I got some interesting reactions which made me decide to do a short write-up. The most secure passwords are the ones you can’t
A collection of 30 posts
This was exactly what I tweeted earlier today. And I got some interesting reactions which made me decide to do a short write-up. The most secure passwords are the ones you can’t
This is the first of a series of short posts to debunk security myths and misconceptions. In today's blog i'm going to explain why writing down passwords is not bad. Had me interested
Two layers of defense are better than one layer of defense. This seems logic. But every now and then I end up in a discussion - mainly on Twitter - where people tell
Today marks 3 years since I wrote my first blog. When I hit the publish button this will be my one hundredth blog post. It's mainly the last one and a half year
It's been a week since I wrote my last blog. I needed a bit of a break after 31 consecutive days of blogging. In this blog I'll look back on my "adventure". How
This is the 31st and last post in my Cyber Security Awareness Month blog series. I will do a short recap of what I covered in this series, but I also want to
Most people have a lot of internet connected devices at home. Obviously computers, laptops, tablets and smartphones, but it doesn't stop there. TVs, dishwashers, kettles, wearables, toys and even toilets all have smart,
Out of date or not regularly updated operating systems and applications put you at risk because they have a lot of vulnerabilities. Many of these vulnerabilities can be easily detected and exploited by
Using social media is not as innocent as it looks. There are several security and privacy risks lurking around the corner. It's important to be on your guard. In this post I'll give
In these series I covered already several forms of online crime, for instance ransomware, phishing and tech support scams. They all have something in common, deception techniques. Criminals try in every possible way
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
What do you do if you want to know more about someone? You'll do a search on their name in your favorite search engine, right? And your image about that person will be