Bölümler

  • Backups 101Cybersecurity Essentials #3We start this episode with two stories.
    How was my old Gmail address found in website's data breach when I never had an account there?
    A growing small business was horribly hurt because the cybersecurity essentials were not in place. Still, backups partially saved the day.
    New Cybersecurity Class - $56Personal Cybersecurity Foundations opens October 8th. You know that your email addresses and passwords have been stolen in data breaches. Are you using a password manager and two-factor authentication on a daily basis? If not, I'll walk you through choosing, installing, and using both through live and recorded sessions and step-by-step instructions.
    See how to work around any challenges you might face. Ask me questions online or schedule an included one-on-one session with me!
    https://training.monozukuritech.com (https://training.monozukuritech.com)
    LINKS FROM THIS EPISODEBackup Hard Drives
    Backup your Windows computer using this hard drive and the included software - WD 4TB My Passport Portable External Hard Drive, Black - WDBPKJ0040BBK-WESN - https://amzn.to/2GjurQQ (https://amzn.to/2GjurQQ)
    Backup your macOS computer using this hard drive and your Mac's built-in TimeMachine software - WD 5TB My Passport for Mac Portable External Hard Drive - Blue, USB-C/USB-A - WDBA2F0050BBL-WESN - https://amzn.to/3jtTq2j (https://amzn.to/3jtTq2j)
    Humane Tech Email NewsletterSign-up to receive a weekly newsletter that's to-the-point with helpful advice, links, and information on upcoming podcast episodes, and more! Your information will never be sold or shared.
    http://eepurl.com/he8SQ9 (http://eepurl.com/he8SQ9)
    Next Episode!Cybersecurity Essentials #3: Backups 102
    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at humanetechpodcast@protonmail.com.

  • The Evacuation Episode Hurricanes, fires, COVID-19, and online school...the world is a challenging place for most of us an horribly frightening for many. What can we do to stay safe when we're suddenly displaced.
    LINKS FROM THIS EPISODEFREE ANTIVIRUS/ENDPOINT PROTECTION
    Sophos Home (free and trial versions) - https://home.sophos.com/en-us.aspx (https://home.sophos.com/en-us.aspx ) - There are lots of options for good endpoint protection. I'm offering Sophos as an option because it works well, is easy to install and get running, and is free for 30 days. It's also available for both macOS and Windows.


    VPN
    ProtonVPN (free and paid versions) - https://protonvpn.com/ (https://protonvpn.com/) - I'll be talking in depth about VPNs in a future episode. As with endpoint protection software, there are other good VPNs. I believe ProtonVPN is one of the best for both security and privacy.


    Next Episode!As I upload this episode, the air quality is greatly improving and it's actually raining. If things remain relatively calm, we'll be back on schedule with Cybersecurity Essentials #3: Backups.
    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at humanetechpodcast@protonmail.com.

  • Eksik bölüm mü var?

    Akışı yenilemek için buraya tıklayın.

  • Multi-factor Authentication (Cybersecurity Essentials #2)What if there was a way to keep people out of your accounts even if they did steal or hack your password? There is and it's time to get it on every account you have.
    LINKS FROM THIS EPISODEDATA BREACHES, LEAKS, AND OTHER COMPROMISES
    If you haven't looked yourself up in Have I Been Pwned https://haveibeenpwned.com/ (https://haveibeenpwned.com/ )please do it now! If your information has been compromised please change your password at any listed sites. This database is not all inclusive and there are other ways to search for your information but this is a good start.
    WARGAMES (1983)
    https://en.wikipedia.org/wiki/WarGames (https://en.wikipedia.org/wiki/WarGames)
    MULTI-FACTOR AUTHENTICATION APPS
    Authy - https://authy.com/ (https://authy.com/) - Use it just about anywhere including sites that say they're only offering Google Authenticator.


    Google Authenticator - https://www.google-authenticator.com/ (https://www.google-authenticator.com/) - Review it for yourself, but I think you'll prefer Authy.


    Microsoft Authenticator - https://www.microsoft.com/en-us/account/authenticator (https://www.microsoft.com/en-us/account/authenticator) - It's probably no surprise that Microsoft's own MFA app works great with Microsoft online accounts. It will also work as a replacement for Google Authenticator.


    Hardware Authenticators aka Tokens
    YubiKey - https://www.yubico.com/ (https://www.yubico.com/) - YubiKeys are very well known in the security world and have been trusted for a long time. Compared to the free apps the YubiKey options may seem very expensive. If you can afford them, they are much better than the apps. A warning, though, they can be complicated to initially set up. Once they're working, they're amazing.


    OnlyKey - https://onlykey.io/ (https://onlykey.io/) - OnlyKey has options are less expensive and have more features than YubiKeys. Like YubiKeys, they can be more difficult to use than MFA applications.


    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at humanetechpodcast@protonmail.com.

  • Passwords (Cybersecurity Essentials #1)Our passwords are an essential ingredient to our privacy and cybersecurity protections. They're also a pain, easy to steal, often reused (bad idea), and hard to remember. That said, I want you to forget all of your passwords except two.
    LINKS FROM THIS EPISODEDATA BREACHES, LEAKS, AND OTHER COMPROMISES
    Look to see if you've been in one or more data breaches or leaks at Have I Been Pwned https://haveibeenpwned.com/ (https://haveibeenpwned.com/). Safely enter your email address(es). If your information has been compromised please change your password at any listed sites. This database is not all inclusive and there are other ways to search for your information but this is a good start.
    PASSWORD MANAGERS
    All of these are end-to-end encrypted (technically it's just encrypted if it's installed on your computer) and are zero knowledge. These terms mean that the organizations creating and managing the password managers can't see, access, use, or change the information you save in their systems.
    KeePassXC - https://keepassxc.org (https://keepassxc.org) - free and open-source. ONLY works on the computer running the application. Can be synchronized with your other devices but can be tricky to set up and maintain. Does not automatically store any information in the cloud.
    BitWarden - https://bitwarden.com (https://bitwarden.com) - free and paid accounts available, open-source. Options to store only on your computer, in the cloud, or both.
    LastPass - https://lastpass.com (https://lastpass.com) - free and paid accounts available, closed-source. Cloud-only. Easily accessible and fully synchronized on desktops, laptops, and mobile devices.
    1password - https://1password.com (https://1password.com) - only paid accounts available (free trial option), closed-source. Cloud-only. Easily accessible and fully synchronized on desktops, laptops, and mobile devices.
    WEB BROWSERS - Do not save your passwords in your browser(s).
    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at humanetechpodcast@protonmail.com.

  • In this episode, we introduce the 10 cybersecurity essentials for individuals, families, and small businesses. We end this episode with an assignment, your first steps to take in setting up these essential protections and habits. The next ten podcast episodes will focus on one essential, discuss why it's important, and provide steps for moving forward.
    The 10 Cybersecurity Essentials
    Passwords
    Two-factor Authentication
    Backups
    Updates
    Endpoint Protection
    Web browser setup
    Ad blocking
    Virtual Private Networking (VPN)
    Firewalls
    Encryption

  • Humane Tech gets a new structure. Shorter and to the point. YOU ARE NOT ALONE. COVID-19 has us isolating but that doesn't mean we can't be in each others' lives.In episode 2, I bring you general privacy and cyber security tips. Do these seven (7) things and you're in pretty good shape. Then we hit on online conferencing concerns and how to approach them. Finally, I illuminate a few of the threats we need to watch out for.SUPPORTHumane Tech is not sponsored and there are no paid advertisements. Instead, we prop up each other. In this episode, I mention three businesses supporting women in the Portland/Vancouver metropolitan area (this is Oregon and Washington states).https://www.psandqsmarket.com/ (Ps & Qs Market) is offering curbside groceries service and take-out meals. Their food is wonderful and so is their staff.https://thatcherscoffee.com/ (Thatcher's Coffee) is owned and operated by our great friend and her incredible staff of women. They support the community and now we can support them. While they are currently closed, you can support them by buying Thatcher's Blend Coffee from https://roselinecoffee.com/ (Roseline Coffee). We ordered two bags over the weekend and expect to brew some up on Wednesday or Thursday.https://rosehaven.org/ (Rose Haven) is a day shelter and community center serving women, children and gender non-conforming folks experiencing trauma, poverty, and physical and mental health challenges. Restoring stability and dignity for 3,500 guests annually. They are incredible people and continue to work hard through this COVID-19 crisis. We'll support them as long as we can.We're grateful for you. Let us know what you want to hear next.

  • There's been a lot of news recently about juice jacking and privacy concerns with smart devices. We discuss this and focus on how to protect yourself using multi-factor authentication.
    Smart TVs and Privacy
    These concerns have been around since at least 2017 but most everyone I talk to is surprised to know what's going on. Here are some article links for more information:
    https://www.consumerreports.org/privacy/how-to-turn-off-smart-tv-snooping-features/ (How to Turn Off Smart TV Snooping Features)
    https://www.cnet.com/how-to/your-tv-is-probably-tracking-you-heres-how-to-stop-it/ (Your TV is probably tracking you -- here's how to stop it)
    https://www.consumerreports.org/televisions/samsung-roku-smart-tvs-vulnerable-to-hacking-consumer-reports-finds/ (Consumer Reports - Samsung and Roku Smart TVs Vulnerable to Hacking, Consumer Reports Finds)
    Juice Jacking
    https://juicejacking.org/ (Juice Jacking Foundation)
    https://www.nytimes.com/2019/11/18/technology/personaltech/usb-warning-juice-jacking.html (Stop! Don’t Charge Your Phone This Way (New York Times))
    https://techcrunch.com/2019/11/15/los-angeles-juice-jacking-usb/ (LA warns of ‘juice-jacking’ malware, but admits it has no cases)
    https://www.dailymail.co.uk/sciencetech/article-7068881/Airport-charging-stations-risk-juice-jacking-experts-warn.html (Airport charging stations put you at risk of 'juice jacking': Security experts warn using public USB ports is like 'finding a toothbrush on the side of the road')
    Multi-Factor Authentication (aka MFA, 2FA or two-factor authentication, etc.)
    It's pretty clear that I believe that you should be using MFA today, now, get on it! It's been around for years and most people don't know or don't care. Security professionals like me are yelling from the roofs that it's important but few are hearing us.
    However, nothing is perfect. Included in the links is at least one article describing issues with two-factor authentication. Deadbolts and other physical locks are not perfect, either, but we use them because they do more good than not. Use MFA/2FA!
    https://www.nytimes.com/2019/01/27/opinion/2fa-cyberattacks-security.html (Two-Factor Authentication Might Not Keep You Safe)
    https://www.cmu.edu/iso/news/mfa-article.html (Multi-Factor Authentication: What It Is and Why You Need It)
    https://nakedsecurity.sophos.com/2016/06/27/two-factor-authentication-2fa-why-you-should-care/ (Two-factor authentication (2FA): why you should care)


    You are valuable, your personal information is valuable, let's work together to keep both safe.
    Have a great week.