ProtonMail offers end to end encrypted email, with a privacy first focus
Privacy

Using Encrypted Email for Privacy

Do you use gmail for your email address? Google has very lax privacy rules about the contents of your email. Basically, your personal emails in Google are a treasure trove for advertisers, and Google. For true email privacy, we recommend ProtonMail instead. Why ProtonMail? That’s what we’ll discuss here. By the way, ProtonMail is the secure email that international journalists use to foil Russian security and intelligence agencies. Swiss Privacy – Data Security and Neutrality ProtonMail is incorporated in Switzerland and all their servers are located in Switzerland. This means all user data is protected by strict Swiss privacy laws. From their website: “ProtonMail is outside of US and EU jurisdiction, only a court order from the Cantonal Court of Geneva or the Swiss Federal Supreme Court can compel us to release the extremely limited user information we have.” Having said that, ProtonMail is subject to the rules of law and order in Switzerland – and the Swiss do cooperate with international law enforcement agencies, as you would expect. End to End Encryption – Automatic Email Security In Protonmail, all [Read More…]

Passwords are a pain - but a good password that you don't reuse across services is a security essential.
Cyber Security

Ten Tips for Keeping Your Laptop Secure

Let’s talk about keeping your laptop (or notebook computer) secure. Why is this important? There are a couple of reasons – but in a nutshell laptops are more prone to theft, loss, and damage. Why? Because they are portable, unlike a desktop computer. That means they are much, much more likely to be stolen (like at the airport, cafe, or from your vehicle. They are more prone to be dropped and damaged – because you move them around a lot. Lastly, I can’t say I’ve never lost a computer before – but it’s at least theoretically possible with some of the very small notebook computers available now. Tip #1: You Must Use A Strong Login Password Some computers operating systems, such as MacOS, allow you to have an “automatic login”. And in some cases people pick really weak, easy to guess passwords. Anyone out there using “password”? Yes, people really do that – you know who you are. The problem with this is that your laptop when unattended can easily be accessed by someone else. And from there, they can [Read More…]

A VPN, or Virtual Private Network, is an important tool to use to protect your privacy and to enhance your security.
Privacy

Why use a VPN?

Why use a VPN or Virtual Private Network? That’s what we’ll discuss in this article. You may have heard about some of the things people do with VPNs – some people use them for work, some use them to access streaming services they otherwise couldn’t, and some people use them to stop others from snooping on their privacy. We’ll talk about all those things here, and give you an understanding of why you might want to use a VPN for security and privacy. What is a VPN or Virtual Private Network? A VPN is a Virtual Private Network. It’s a way to create a secure, encrypted tunnel between your laptop, computer, or smartphone and the VPN provider. It allows you to surf the web, and access other Internet services, with better security and privacy. (But, it’s not fool proof, as we’ll discuss soon.) How does a VPN provide this improved security? By way of encryption. Computer encryption is a mathematical concept that lets two computer devices communicate without letting any “middle men” in on the message. The process uses the [Read More…]

Cyber Security for your Home PC
Cyber Security

Cyber Security for your Home PC

In this article we’re going to talk about cyber security essentials for your home PC (or Mac). Unfortunately, there are more threats than ever to your home computer. And this goes double if it’s a shared PC used by multiple family members. We’re going to give you the info on essential best practices and security tips. Tip #1: Use Common Sense The most important security tool is located between your ears – use your brain. You have to think twice before you click a link in a suspicious email – or open a shady website. Everyone with an email inbox is bombarded with phishing emails and other security threats every day – and some of them are very convincing. But, if in doubt – delete it – don’t read it. Here’s an example. The IRS will not contact you via email for any reason – so ignore any sort of emails like that. Tip #2: Use a Malware Scanner Nearly everyone is familiar with anti-virus programs. And quite frankly, Windows 10 has a pretty good anti-virus program built right in [Read More…]