Bölümler

  • Humane Tech | Stop, Drop, and ROLL!

    We're back! The first 13 episodes are now re-labeled as Season 1. I've learned a lot from those first several shows, and now we're starting anew. Season 2 will be consistent.

    In this new series, I discuss how to respond to a cybersecurity incident, what we should all be doing to keep ourselves safe, and how to really monitor our identity and credit.

    Episode 1 is kick starting us back into improving your privacy, security, and efficiency with tech.

    Coming in July are brand new webinars including:

    A Guided Tour of the Dark Web ($8) - Come with me as we visit the good, bad, and ugly side of the dark web, the deep web, and yes, surprising parts of the clear, or normal web. Visit criminal marketplaces and safe havens for legal advocacy with your guide.Block Criminals from Your Accounts ($8) - Walk through password management and multi-factor authentication THE EASY WAY. See how passwordless (imagine...NO PASSWORDS) are the way of the future...a future that's already here!Don't lose your Insta, Snap, or ANYTHING (free for students) - Kids are losing access to their social media accounts, their private photos, and more. Once they're gone, they're usually gone forever. Learn how to protect your accounts without getting too fussy.

    Coming in August are more webinars and online classes:

    Everything you need to know to secure your business - This multi-part class will walk through technology management essentials. If you're a business owner or manager who wants to keep your business safe, this is your class. Whether you're doing IT for yourself or you're paying someone else, you don't want to miss this. In fact, have your IT people join and keep each other accountable.Parental Controls: how to protect your kids online - Keeping your kids safe is a normal part of parenting, now. However, it's no longer about "control". NO! It's about trust, communication, and agreements. Cybersecurity and Privacy for Teens - Learn how to keep your parents off your backs, keep your accounts safe, and do more safer. See how scammers try to steal your stuff so you can be safe.

    Have questions, comments, or rants? Email me at [email protected] or [email protected]. See our new website at www.mozutech.com

    Copyright 2023, mozu tech and Jeffrey S Kaye

  • Humane Tech:BREACHED! Start using Two-factor Authentication TODAY

    A lot of my clients started working with me immediately after they were breached, compromised, or otherwise hurt by someone. Being on the clean-up side of these incidents is awful. Everyone is worried, mad, scared, and/or horrified. Let's make it harder for criminals to hurt us!

    If a website will only provide you with a two-factor authentication (2FA) code via text or email, fine. Do that.

    For any site that allows you to use an app, please strongly consider using Authy. It's works well and it's free. I use it. Don't worry if a site says they only use Google Authenticator, Authy is a 100% compatible replacement for Google Authenticator but it's not owned by Google.

    Authy - https://authy.com/ - Use it just about anywhere including sites that say they're only offering Google Authenticator.

    Have questions, comments, or rants? Email me at [email protected] or [email protected].

    Past episodes and show notes

    Email newsletter for updates and helpful advice

    Copyright, 2022 Jeffrey S Kaye

  • Eksik bölüm mü var?

    Akışı yenilemek için buraya tıklayın.

  • NOTE: This episode was recorded on video in a city park. That's why there's background noises. Some things will make better sense on video. Check out the stream at https://vimeo.com/678455576

    (notes edited at 5:30 PM Pacific on 2/16/22 to fix the video link)

    After a long hiatus, we're back!

    Scammers always create a sense of urgency around their request. They usually need you to do something RIGHT NOW. It can't wait. If there's very little time to verify their claims or ask questions then you're likely being scammed.

    Send questions, comments, and recipe requests to [email protected] or [email protected].

    If you like what you hear, please subscribe and review. If not, please email and let me know what you want!

    Humane Tech website: https://monozukuritech.com/podcast

    Copyright 2022 Jeffrey S. Kaye

  • Privacy-stealing browsers and search; Will Windows 10 ever end?

    Web browsers are our portal to the internet. All the data we want comes in through them; all the data we provide goes out through them. What needs to be checked in the biggest risks to our privacy and security?

    TOPICS

    * Windows 11 has been announced for release this fall. Should you upgrade right away? Can you upgrade even if you want to?

    * It only requires 3 pieces of 'anonymous data' to determine who the data belongs to. Sometimes less.

    * Browsers and privacy: Most web browsers requires a little bit of configuration in order to protect our privacy. In this first of several episodes discussing browsers and web search, I'll walk through the key things to watch for. My focus is on Mozilla Firefox, which I consider to be the overall best browser for usability, security, and privacy. But Firefox will NOT protect you if you use it badly. Listen in and then check the links below for additional information. ALSO...get on the mailing list for more tips and tricks.

    -- First five steps towards better browser privacy

    1) Get and use Mozilla Firefox

    2) Update Firefox's privacy settings - lots of information on this in the episode and the mailing list

    3) Install the uBlockOrigin add-on and let it do it's thing (it doesn't require any configuration but you can change how it works). uBlockOrigin blocks a lot of advertisements and unwanted 'scripts'. Scripts are bits of website programming that ask your computer to do things which can compromise your privacy or security.

    4) Install the Multi-account Containers add-on

    5) Learn how to use Multi-account Containers and use them!

    HOMEWORK FOR NEXT TIME

    * Install uBlockOrigin and Multi-account Containers into Firefox (see links below)

    * Use mulit-account containers

    * Try the DuckDuckGo.com search engine instead of Google, if you haven't already

    * I'll be providing bonus information in the mailing list later this week!

    LINKS FROM THIS EPISODE

    Windows 11, Apple macOS and iOS updates

    * Microsoft's Windows 11 home page

    * Microsoft's Windows 11 for enterprise page (for business users)

    * From ZDNet: Windows 11 chaos, and how copying Apple could have helped Microsoft avoid it

    * From ZDNet: Windows 11: Microsoft apologized for compatibility confusion, hints at changes

    * Windows Central: How to check if your PC has a trusted platform module (TPM)

    * Windows Central: One thing Microsoft didn't discuss: WIndows 11 privacy

    * Apple macOS Monterey coming this fall

    * Apple iOS 15 (iPhone and iPad)

  • It's been too long since our last episode. Let's get caught up and then move forward!

    TOPICS

    * It's been a challenge to do these episodes on top of being the sole person building my business. I've worked with a mentor, though, and I'm changing my process. Episodes are going to be coming much more quickly now.

    * Data breaches - I talk about the Facebook and Ubiquity data breaches and what do do about them.

    * 2FA/Two-factor authentication via texting and email. These are bad methods for securing your accounts. Well, OK, they're better than NOT using two-factor authentication. IF you have the option of using app based 2FA such as Authy, Google Authenticator, etc. or a hardware token such as a Yubikey, please use one of those methods INSTEAD of text messaging or email. A lot of banks (WAY TOO MANY) don't allow anything but text or email. We do our best.

    * Backups - I like SpiderOak One for a secure, private data backup provider.

    * Secure file sharing services - I'm playing with Boxcryptor for encrypting data inside less private services like OneDrive, Google Drive, Dropbox, Box, etc. So far it looks very good. It's not super easy to use, but it's not bad. Plus, there is a free option.

    * Text messaging is NOT secure. It's very easy to steal your cellphone number for texting. This is why I don't want you using texting for two-factor authentication. There's a link to an article on this. It's a quick read!

    * Apple and Google are most definitely collecting information from our devices every few minutes (at least). There's an interesting study (link below). I hope to revisit this in future episodes.

    HOMEWORK FOR NEXT TIME

    * Do you first, or next backup! Extra credit: Do a test restore!

    * Collect your data from Facebook. Extra credit: Leave Facebook (if you can)

    * Update your passwords, especially at Facebook and Ubiquity/UniFi, especially if you've been in these breaches. Check https://haveibeenpwned.com to see if you're listed there.

    * Move form text (SMS) and email two-factor authentication to using Authy, Yubikey, etc. as much as possible. Links are below

    LINKS FROM THIS EPISODE

    * Authy - two-factor authentication (2FA) app

    * SpiderOak One Backup

    * Facebook data breach

    * Ubiquity data breach

    * A Hacker Got All My Texts for $16 - an easy, interesting read

    * Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google - very scholarly and interesting (PDF download) or an article by The Register

    PODCAST WEBSITE

    https://monozukuritech.com/podcast

    HUMANE TECH EMAIL NEWSLETTER

    Sign-up to receive a weekly newsletter that's to-the-point with helpful advice, links, and information on upcoming podcast episodes, and more! Your information will never be sold or shared.

    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at...

  • It's not just data that we need to back up. We also need to back up processes. I recently failed to do that and I share a story of woe from my phone breaking my two-factor authentication.

    TOPICS

    * story about 2FA backup methods

    * 3-2-1

    * backup to external drives

    * consider encryption

    * how often? as often as your data changes....

    * two local drives - continuous backup vs point in time

    HOMEWORK FOR NEXT TIME

    * Do you first (next?) backup.

    * Extra credit: Do a test restore!

    LINKS FROM THIS EPISODE

    * Authy - two-factor authentication (2FA) app

    * Apple TimeMachine (macOS and Mac OS X only)

    * Microsoft Authenticator - two-factor authentication (2FA) app

    * SanDisk 256GB USB Flash Drive

    * Seagate Backup Plus Portable 5TB for Windows or Mac

    * VeraCrypt - encryption software for Windows Mac, and Linux (warning, not incredibly user friendly -- I'll cover this more humanely in the future)

    * Windows Backup (Windows 8.1 only)

    PODCAST WEBSITE

    https://monozukuritech.com/podcast

    HUMANE TECH EMAIL NEWSLETTER

    Sign-up to receive a weekly newsletter that's to-the-point with helpful advice, links, and information on upcoming podcast episodes, and more! Your information will never be sold or shared.

    COMING SOON

    * file sharing services: Dropbox, OneDrive, Google Drive, iCloud Drive, etc

    * secure cloud storage

    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at [email protected].

  • URGENT APPLE UPDATES

    Apple releases iOS 14.4 and iPadOS 14.4. These updates fix problems with the iPhone and iPad which have been used to attack devices.

    It's been a while since our last episode. Thank you for waiting! This podcast was going to be relaunched TOMORROW with a full episode, but this update was too important to ignore.

    LINKS FROM THIS EPISODE

    > HOW TO BACK UP YOUR APPLE IPHONE OR IPAD

    https://support.apple.com/en-us/HT203977

    > HOW TO UPDATE YOUR APPLE IPHONE OR IPAD

    https://support.apple.com/en-us/HT204204

    > HOW TO BACK UP YOUR ANDROID DEVICE

    https://support.google.com/android/answer/2819582?hl=en

    > HOW TO UPDATE YOUR ANDROID DEVICE

    https://support.google.com/android/answer/7680439?hl=en

    NEXT EPISODE

    Once I get all of our Apple devices updated I'll finish editing Episode 9 - Backups (continued).

    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at [email protected].

  • Backups 101Cybersecurity Essentials #3

    We start this episode with two stories.

    How was my old Gmail address found in website's data breach when I never had an account there?A growing small business was horribly hurt because the cybersecurity essentials were not in place. Still, backups partially saved the day.
    New Cybersecurity Class - $56

    Personal Cybersecurity Foundations opens October 8th. You know that your email addresses and passwords have been stolen in data breaches. Are you using a password manager and two-factor authentication on a daily basis? If not, I'll walk you through choosing, installing, and using both through live and recorded sessions and step-by-step instructions.

    See how to work around any challenges you might face. Ask me questions online or schedule an included one-on-one session with me!

    https://training.monozukuritech.com

    LINKS FROM THIS EPISODE

    Backup Hard Drives

    Backup your Windows computer using this hard drive and the included software - WD 4TB My Passport Portable External Hard Drive, Black - WDBPKJ0040BBK-WESN - https://amzn.to/2GjurQQBackup your macOS computer using this hard drive and your Mac's built-in TimeMachine software - WD 5TB My Passport for Mac Portable External Hard Drive - Blue, USB-C/USB-A - WDBA2F0050BBL-WESN - https://amzn.to/3jtTq2j
    Humane Tech Email Newsletter

    Sign-up to receive a weekly newsletter that's to-the-point with helpful advice, links, and information on upcoming podcast episodes, and more! Your information will never be sold or shared.

    http://eepurl.com/he8SQ9

    Next Episode!

    Cybersecurity Essentials #3: Backups 102

    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at [email protected].

  • The Evacuation Episode

    Hurricanes, fires, COVID-19, and online school...the world is a challenging place for most of us an horribly frightening for many. What can we do to stay safe when we're suddenly displaced.

    LINKS FROM THIS EPISODE

    FREE ANTIVIRUS/ENDPOINT PROTECTION

    Sophos Home (free and trial versions) - https://home.sophos.com/en-us.aspx - There are lots of options for good endpoint protection. I'm offering Sophos as an option because it works well, is easy to install and get running, and is free for 30 days. It's also available for both macOS and Windows.

    VPN

    ProtonVPN (free and paid versions) - https://protonvpn.com/ - I'll be talking in depth about VPNs in a future episode. As with endpoint protection software, there are other good VPNs. I believe ProtonVPN is one of the best for both security and privacy.
    Next Episode!

    As I upload this episode, the air quality is greatly improving and it's actually raining. If things remain relatively calm, we'll be back on schedule with Cybersecurity Essentials #3: Backups.

    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at [email protected].

  • Multi-factor Authentication (Cybersecurity Essentials #2)

    What if there was a way to keep people out of your accounts even if they did steal or hack your password? There is and it's time to get it on every account you have.

    LINKS FROM THIS EPISODE

    DATA BREACHES, LEAKS, AND OTHER COMPROMISES

    If you haven't looked yourself up in Have I Been Pwned https://haveibeenpwned.com/ please do it now! If your information has been compromised please change your password at any listed sites. This database is not all inclusive and there are other ways to search for your information but this is a good start.

    WARGAMES (1983)

    https://en.wikipedia.org/wiki/WarGames

    MULTI-FACTOR AUTHENTICATION APPS

    Authy - https://authy.com/ - Use it just about anywhere including sites that say they're only offering Google Authenticator.
    Google Authenticator - https://www.google-authenticator.com/ - Review it for yourself, but I think you'll prefer Authy.
    Microsoft Authenticator - https://www.microsoft.com/en-us/account/authenticator - It's probably no surprise that Microsoft's own MFA app works great with Microsoft online accounts. It will also work as a replacement for Google Authenticator.

    Hardware Authenticators aka Tokens

    YubiKey - https://www.yubico.com/ - YubiKeys are very well known in the security world and have been trusted for a long time. Compared to the free apps the YubiKey options may seem very expensive. If you can afford them, they are much better than the apps. A warning, though, they can be complicated to initially set up. Once they're working, they're amazing.
    OnlyKey - https://onlykey.io/ - OnlyKey has options are less expensive and have more features than YubiKeys. Like YubiKeys, they can be more difficult to use than MFA applications.

    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at [email protected].

  • Passwords (Cybersecurity Essentials #1)

    Our passwords are an essential ingredient to our privacy and cybersecurity protections. They're also a pain, easy to steal, often reused (bad idea), and hard to remember. That said, I want you to forget all of your passwords except two.

    LINKS FROM THIS EPISODE

    DATA BREACHES, LEAKS, AND OTHER COMPROMISES

    Look to see if you've been in one or more data breaches or leaks at Have I Been Pwned https://haveibeenpwned.com/. Safely enter your email address(es). If your information has been compromised please change your password at any listed sites. This database is not all inclusive and there are other ways to search for your information but this is a good start.

    PASSWORD MANAGERS

    All of these are end-to-end encrypted (technically it's just encrypted if it's installed on your computer) and are zero knowledge. These terms mean that the organizations creating and managing the password managers can't see, access, use, or change the information you save in their systems.

    KeePassXC - https://keepassxc.org - free and open-source. ONLY works on the computer running the application. Can be synchronized with your other devices but can be tricky to set up and maintain. Does not automatically store any information in the cloud.BitWarden - https://bitwarden.com - free and paid accounts available, open-source. Options to store only on your computer, in the cloud, or both.LastPass - https://lastpass.com - free and paid accounts available, closed-source. Cloud-only. Easily accessible and fully synchronized on desktops, laptops, and mobile devices.1password - https://1password.com - only paid accounts available (free trial option), closed-source. Cloud-only. Easily accessible and fully synchronized on desktops, laptops, and mobile devices.

    WEB BROWSERS - Do not save your passwords in your browser(s).

    If you're enjoying the podcast please leave a review and subscribe. If you have comments, questions, concerns, or suggestions please email us at [email protected].

  • In this episode, we introduce the 10 cybersecurity essentials for individuals, families, and small businesses. We end this episode with an assignment, your first steps to take in setting up these essential protections and habits. The next ten podcast episodes will focus on one essential, discuss why it's important, and provide steps for moving forward.

    The 10 Cybersecurity Essentials

    PasswordsTwo-factor AuthenticationBackupsUpdatesEndpoint ProtectionWeb browser setupAd blockingVirtual Private Networking (VPN)FirewallsEncryption
  • Humane Tech gets a new structure. Shorter and to the point. YOU ARE NOT ALONE. COVID-19 has us isolating but that doesn't mean we can't be in each others' lives.

    In episode 2, I bring you general privacy and cyber security tips. Do these seven (7) things and you're in pretty good shape. Then we hit on online conferencing concerns and how to approach them. Finally, I illuminate a few of the threats we need to watch out for.

    SUPPORT

    Humane Tech is not sponsored and there are no paid advertisements. Instead, we prop up each other. In this episode, I mention three businesses supporting women in the Portland/Vancouver metropolitan area (this is Oregon and Washington states).

    Ps & Qs Market is offering curbside groceries service and take-out meals. Their food is wonderful and so is their staff.

    Thatcher's Coffee is owned and operated by our great friend and her incredible staff of women. They support the community and now we can support them. While they are currently closed, you can support them by buying Thatcher's Blend Coffee from Roseline Coffee. We ordered two bags over the weekend and expect to brew some up on Wednesday or Thursday.

    Rose Haven is a day shelter and community center serving women, children and gender non-conforming folks experiencing trauma, poverty, and physical and mental health challenges. Restoring stability and dignity for 3,500 guests annually. They are incredible people and continue to work hard through this COVID-19 crisis. We'll support them as long as we can.

    We're grateful for you. Let us know what you want to hear next.

  • There's been a lot of news recently about juice jacking and privacy concerns with smart devices. We discuss this and focus on how to protect yourself using multi-factor authentication.

    Smart TVs and Privacy

    These concerns have been around since at least 2017 but most everyone I talk to is surprised to know what's going on. Here are some article links for more information:

    How to Turn Off Smart TV Snooping FeaturesYour TV is probably tracking you -- here's how to stop itConsumer Reports - Samsung and Roku Smart TVs Vulnerable to Hacking, Consumer Reports Finds

    Juice Jacking

    Juice Jacking FoundationStop! Don’t Charge Your Phone This Way (New York Times)LA warns of ‘juice-jacking’ malware, but admits it has no casesAirport charging stations put you at risk of 'juice jacking': Security experts warn using public USB ports is like 'finding a toothbrush on the side of the road'

    Multi-Factor Authentication (aka MFA, 2FA or two-factor authentication, etc.)

    It's pretty clear that I believe that you should be using MFA today, now, get on it! It's been around for years and most people don't know or don't care. Security professionals like me are yelling from the roofs that it's important but few are hearing us.

    However, nothing is perfect. Included in the links is at least one article describing issues with two-factor authentication. Deadbolts and other physical locks are not perfect, either, but we use them because they do more good than not. Use MFA/2FA!

    Two-Factor Authentication Might Not Keep You SafeMulti-Factor Authentication: What It Is and Why You Need ItTwo-factor authentication (2FA): why you should care

    You are valuable, your personal information is valuable, let's work together to keep both safe.

    Have a great week.