"Soul engineering in practice"It's a carbon copy. Over and over again. First the solution and next time we'll have the whole story for those who like to read.
👨💻 Personal Cyber Security CHECKLIST 👨💻 – part four
Topic: Safe EmailIt is extremely important to protect your email account. Why? If you haven't turned on multi-factor authentication (MFA), an attacker can access other online accounts or
👨💻 Personal Cyber Security CHECKLIST 👨💻 – THIRD part
Your cell phone and security?Set a PIN lock, ideally more than 4 characters, i.e. 6 characters. You can substitute a fingerprint, some prefer FACE ID (every man's opinion
👨💻 Personal Cyber Security CHECKLIST 👨💻 – PART TWO
Authentication (User Identity Verification) & Passwords And here we have the continuation of the checklist. A few of you have gotten back to me with more tips, thanks!
👨💻 Personal Cyber Security CHECKLIST 👨💻 – part one
Topic - Safe web browsing: We have prepared a "series to continue". We will focus on one topic each time. No theory, just tips, tricks & tutorials and
Backups that can’t be deleted? Must have!
A backup that can't be deleted (changed) is your last resort against attackers and also against your own IT people or an attack from inside your organization.What is
Tell me where the passwords are. What could have happened to them 😱
No, I'm not going to convince you or scare you.Today I have prepared for you the possibilities where to go with them - with PASSWORDS. Keep in mind
👊 I am the owner and I want access everywhere, period!
The road to an imaginary hell often starts here. With us. Owners, directors, C-levels. This type of targeted attack (on leadership positions) is extremely effective. Access to a
⛈ A simple cure for unsafe clouds, internets and anything else …
That's right! I'm not a wizard, but I have the cure. A group of IT experts are probably crucifying me for simplifying this. But it usually works in
🤔 Everything is in the cloud = we don’t have to solve anything, Microsoft or Google does it for us
Today, the topic of Shared Responsibility is on the table. Let's take a look at it. For the sake of simplicity, we'll count on the Office365/Microsoft365 SaS (Software