Category List


Tag List


Tag Cloud



Archive

Blog Search

How To Migrate Google Authenticator To A New iPhone

Instructions on how to move Google Authenticator to a new iPhone so you don't lose access to accounts with two-factor authentication enabled.
  Instructions on how to move Google Authenticator to a new iPhone so you don't lose access to accounts with two-factor authentication enabled.   The Google Authenticator… http://www.markandersononline.com/blog/how-migrate-google-authenticator-new-iphone/

Why Have Security Questions After Password Authentication?

Asking security questions after password authentication is not just pointless, it actually makes things less secure.
  Asking security questions after password authentication is not just pointless, it actually makes things less secure.   The practice of using a relatively secure password,… http://www.markandersononline.com/blog/why-have-security-questions-after-password-authentication-xxx/

How To Securely Hide (and Encrypt) Files On Mac OS X

How to hide/secure files on your Mac: An easy approach to protecting your data by securing, hiding, and encrypting selected files and folders in Mac OS X.
  How to hide/secure files on your Mac: An easy approach to protecting your data by securing, hiding, and encrypting selected files and folders in Mac OS X.   In a perfect… http://www.markandersononline.com/blog/how-securely-hide-and-encrypt-files-mac-os-x/

Security Through Obscurity On Mac OS X – Better Solutions

A look at how security through obscurity (hiding files) is doomed to fail in Mac OS X, plus a look at some easy ways to truly secure files on your Mac.
  A look at how security through obscurity (hiding files) is doomed to fail in Mac OS X, plus a look at some easy ways to truly secure files on your Mac.   When someone… http://www.markandersononline.com/blog/security-through-obscurity-mac-os-x-better-solutions/

Showing Hidden Files vs Hiding Regular Files in Mac OS X

They might seem like flip sides of the same coin but the techniques used to show hidden files on a Mac are not the best solution for securely hiding files.
  They might seem like flip sides of the same coin but the techniques used to show hidden files on a Mac are not the best solution for securely hiding files.   Another post… http://www.markandersononline.com/blog/showing-hidden-files-vs-hiding-regular-files-mac-os-x/

What Does Incognito/Private Mode Really Mean?

The incognito or private mode in your web browser can offer you some additional privacy but not as much as you may think, and you still need to be careful.
  The incognito or private mode in your web browser can offer you some additional privacy but not as much as you may think, and you still need to be careful.   When you… http://www.markandersononline.com/blog/what-does-incognitoprivate-mode-really-mean/

"Your Apple Device has been locked..." Another Scam

Does "http://www.alerts-safari.info" say "Your Apple Device has been locked, due to security reasons"? Don't panic, it's not – just don't call the number!
  Does "http://www.alerts-safari.info" say "Your Apple Device has been locked, due to security reasons"? Don't panic, it's not – just don't call the number.   Earlier today… http://www.markandersononline.com/blog/your-apple-device-has-been-locked-another-scam/

Short Guide to (Finding, Sharing, etc.) SSH Keys on Mac OS X

A short guide to SSH keys and Mac OS X: How to create, find, share and add SSH Keys (and deal with related SSH errors and warnings) on Mac OS X.
  A short guide to SSH keys and Mac OS X: How to create, find, share and add SSH Keys (and deal with related SSH errors and warnings) on Mac OS X.     SSH keys allow for… http://www.markandersononline.com/blog/short-guide-finding-sharing-etc-ssh-keys-mac-os-x/

Open Safari Without Opening Windows From The Last Session

How to open Safari without automatically re-opening windows/tabs from the last session. This can save you if you ever run into ransomware.
  How to open Safari without automatically re-opening windows/tabs from the last session. This can save you if you ever run into ransomware.    Earlier in the year a… http://www.markandersononline.com/blog/open-safari-without-opening-windows-last-session/

Multi-Factor Authentication With Google Authenticator

Using Google Authenticator to increase digital security through the use of multi-factor authentication.
Using Google Authenticator to increase digital security through the use of multi-factor authentication.   Another post looked at how the process of authentication (confirming… http://www.markandersononline.com/blog/multi-factor-authentication-google-authenticator/

What is Multi-Factor Authentication?

Understanding the concept of multi-factor authentication really isn't that hard, but it is an important step towards better digital security.
Understanding the concept of multi-factor authentication really isn't that hard, but it is an important step towards better digital security.   For this discussion… http://www.markandersononline.com/blog/what-multi-factor-authentication/

Marriot WiFi Jamming: Not Quite As Bad As It Sounds

Anybody who resents the high prices hotels charge for wifi might roll their eyes at the 'explanation' from Marriot but they were protecting their guests. The real question is at what cost?
Anybody who resents the high prices hotels charge for wifi might roll their eyes at the 'explanation' from Marriot but they were protecting their guests. The real question is at… http://www.markandersononline.com/blog/marriot-wifi-jamming-not-quite-bad-it-sounds/

Downloading "Free" Movies Is Getting Very Expensive

Believing that rampant internet piracy cost as much as $250 million in box office revenue producer Avi Lerner is going after those that downloaded The Expendables 3 illegally.
Believing that rampant internet piracy cost as much as $250 million in box office revenue producer Avi Lerner is going after individuals that downloaded The Expendables 3.  … http://www.markandersononline.com/blog/downloading-free-movies-getting-very-expensive/

Digital Security: Password Strategy

We increasingly rely on passwords even as that security model becomes more vulnerable to sophisticated attacks and social engineering and human error remain serious threats.
  We increasingly rely on passwords even as that security model becomes more vulnerable to sophisticated attacks and social engineering and human error remain serious threats.… http://www.markandersononline.com/blog/digital-security-password-strategy/

Digital Security: Backup & Recovery

We increasingly rely on our digital devices but that data is fragile. It can be lost instantly if the machine is stolen or damaged (fire, water, etc.) suffers mechanical failure or is infected by viruses or malware.
  We increasingly rely on our digital devices but that data is fragile. It can be lost instantly if the machine is stolen or damaged (fire, water, etc.) suffers mechanical… http://www.markandersononline.com/blog/digital-security-backup-recovery/

Digital Security: Web Content Filtering

Unrestricted access to the web on your network devices introduces a number of problems including inappropriate/offensive/illegal content, malware and more.
  Unrestricted access to the web on your network devices introduces a number of problems including inappropriate/offensive/illegal content, malware and more.   As a parent… http://www.markandersononline.com/blog/digital-security-web-content-filtering/

Digital Security: Find & Recover a Lost or Stolen Device

Most of us rely on mobile devices but they – and the data they contain – are easily lost or stolen.
  Most of us rely on mobile devices but they – and the data they contain – are easily lost or stolen. The solution? Recovery software that lets you lock/erase/find/recover… http://www.markandersononline.com/blog/digital-security-find-recover-lost-or-stolen-device/

Digital Security: Connecting Securely From Public WiFi

Accessing important information from public WiFi (the kind seen in coffee shops, airports, even in this hotel) is almost essential but potentially very dangerous.
  Accessing important information from public WiFi (the kind seen in coffee shops, airports, hotel lobbies) is almost essential but potentially very dangerous.   The… http://www.markandersononline.com/blog/digital-security-connecting-securely-public-wifi/

A Good Time To Think About Digital Security

The recent celebrity phone hacking scandal is a reminder that digital security is a vital component of our increasingly digital lives.
Download Digital Security Excerpt From SAF Annual Convention 2014   The recent celebrity phone hacking scandal is a reminder that digital security is a vital component of our… http://www.markandersononline.com/blog/good-time-think-about-digital-security/

Protecting Your Business With a BYOD Policy

Employees will expect to use personal electronic devices in the workplace and employers need to be prepared with a BYOD (bring your own device) policy.
  Employees will expect to use personal electronic devices in the workplace and employers need to be prepared with a BYOD (bring your own device) policy.   At the 2014 SAF… http://www.markandersononline.com/blog/protecting-your-business-byod-policy/

« Previous 12 Next »