Posts

What is malware?

Image
 What is malware?

How do I use strong and unique passwords?

Image
 How do I use strong and unique passwords? In order to keep your accounts and information safe online, you must use what is often referred to as a strong and unique password. Let's start with what is not a strong and unique password. Some of the most commonly used passwords are things like, "Password" and "123456". These are not strong because they are easy to guess, and are not unique because thousands if not millions of accounts use these same passwords. "123456" also follows a sequential key path, so something like "qwerty" is also not a good password.     Strong passwords can be used by using the length  and complexity of the password to your advantage. See the picture below for reference: By using only a 4 character password, someone can essentially crack your password instantly. But by using 18 characters, only numbers in this case, it would take somewhere around 3 weeks. Now by using all the characters in the far right column, starting

What is cyber hygiene? And how does it affect me?

Image
  Cyber hygiene and how it affects your life:           Much like personal hygiene, proper cyber hygiene helps you stay healthy and safe. Cyber hygiene is a reference to practical steps every user can take to keep their computers working properly, and their personal information private. Some examples of cyber hygiene best practices include using strong and unique passwords, enabling two-factor authentication, regularly backing up data, and installing anti software.     Additionally, cyber hygiene involves educating individuals about online safety and security. This includes training individuals on how to identify phishing emails, social engineering scams, as well as promoting safe browsing habits. This is a complex subject with a lot of depth, so we will elaborate on these ideas in future posts.      One thing is for sure, the neglected use of proper online hygiene can produce highly destructive outcomes. Loss of proper function of everyday devices, such as phones and computers, can ha