Zážeh podcast with Martin Hurych – security for laymen
Before the holidays I was a guest on Martin Hurych's podcast Zážeh. Martin called it "IT security for the layman". The full transcript of the interview, including the video, is available from Martin on the web or you can find it in his
👨💻 Personal Cyber Security CHECKLIST 👨💻 – fifth and final episode
For the most lazy existences that don't want to do almost anything 5 tips to ensure your safe survival on the internet (not just during the holidays) I turn on multi-factor authentication wherever I can. Where I can't, I'll use a unique password
❌ Don’t get ripped off ❌
"Soul engineering in practice"It's a carbon copy. Over and over again. First the solution and next time we'll have the whole story for those who like to read. It's really not normal when someone wants you to download something to your PC, mobile
👨💻 Personal Cyber Security CHECKLIST 👨💻 – part four
Topic: Safe EmailIt is extremely important to protect your email account. Why? If you haven't turned on multi-factor authentication (MFA), an attacker can access other online accounts or reset passwords through a "hacked" email ... (and you won't even know it, the attacker
👨💻 Personal Cyber Security CHECKLIST 👨💻 – THIRD part
Your cell phone and security?Set a PIN lock, ideally more than 4 characters, i.e. 6 characters. You can substitute a fingerprint, some prefer FACE ID (every man's opinion on whether it's secure enough)Set an automatic lock on negativity.Avoid PIN's like: your year of
👨💻 Personal Cyber Security CHECKLIST 👨💻 – PART TWO
Authentication (User Identity Verification) & Passwords And here we have the continuation of the checklist. A few of you have gotten back to me with more tips, thanks! I'll add them gradually and then publish them as a comprehensive e-book. If we get
👨💻 Personal Cyber Security CHECKLIST 👨💻 – part one
Topic - Safe web browsing: We have prepared a "series to continue". We will focus on one topic each time. No theory, just tips, tricks & tutorials and tools that I use myself. Most of these will be opensource. Don't store passwords in
🕵️♀️ Skenujete pravidelně zranitelnosti ve Vaší síti? Měli byste!
Mám pro Vás krátký a rychlý tip na Vulnerability scanner ZADARMO (program na detekci zranitelností ve vaší síti). Jestli nic nepoužíváte, tak ho určitě doporučte Vašemu IT – Nessus® Essentials. Samozřejmě to má háček, můžete skenovat max 16 IP adres (počítačů, serverů, firewallů,
😱 Not only Czechs are masters in IT shaving
At first glance, it seems like a great idea. How about bending SharePoint to store backups? It's doable, but it's hard work. It's like riding in a limo off-road or running in sneakers on pavement. Real-life stories:Sitting in a meeting with 3 client
Backups that can’t be deleted? Must have!
A backup that can't be deleted (changed) is your last resort against attackers and also against your own IT people or an attack from inside your organization.What is an Immutable backup?It is a backup that cannot be deleted or changed for a defined
Tell me where the passwords are. What could have happened to them 😱
No, I'm not going to convince you or scare you.Today I have prepared for you the possibilities where to go with them - with PASSWORDS. Keep in mind that every solution has its limits and there is no one-size-fits-all solution.1) I DON'T WANT