Before the holidays I was a guest on Martin Hurych's podcast Zážeh. Martin called it "IT security for the layman". The full transcript of the interview, including the
👨💻 Personal Cyber Security CHECKLIST 👨💻 – fifth and final episode
For the most lazy existences that don't want to do almost anything 5 tips to ensure your safe survival on the internet (not just during the holidays) I
❌ Don’t get ripped off ❌
"Soul engineering in practice"It's a carbon copy. Over and over again. First the solution and next time we'll have the whole story for those who like to read.
👨💻 Personal Cyber Security CHECKLIST 👨💻 – part four
Topic: Safe EmailIt is extremely important to protect your email account. Why? If you haven't turned on multi-factor authentication (MFA), an attacker can access other online accounts or
👨💻 Personal Cyber Security CHECKLIST 👨💻 – THIRD part
Your cell phone and security?Set a PIN lock, ideally more than 4 characters, i.e. 6 characters. You can substitute a fingerprint, some prefer FACE ID (every man's opinion
👨💻 Personal Cyber Security CHECKLIST 👨💻 – PART TWO
Authentication (User Identity Verification) & Passwords And here we have the continuation of the checklist. A few of you have gotten back to me with more tips, thanks!
👨💻 Personal Cyber Security CHECKLIST 👨💻 – part one
Topic - Safe web browsing: We have prepared a "series to continue". We will focus on one topic each time. No theory, just tips, tricks & tutorials and
🕵️♀️ Skenujete pravidelně zranitelnosti ve Vaší síti? Měli byste!
Mám pro Vás krátký a rychlý tip na Vulnerability scanner ZADARMO (program na detekci zranitelností ve vaší síti). Jestli nic nepoužíváte, tak ho určitě doporučte Vašemu IT –
😱 Not only Czechs are masters in IT shaving
At first glance, it seems like a great idea. How about bending SharePoint to store backups? It's doable, but it's hard work. It's like riding in a limo
Backups that can’t be deleted? Must have!
A backup that can't be deleted (changed) is your last resort against attackers and also against your own IT people or an attack from inside your organization.What is