Basic guide to home Wi-Fi security The following items are considered the minimum settings required to achieve an acceptable level of security. All AP’s will provide a method of point to point encryption between the AP and the end user device such as PC or handheld device. The following table summarises the available types of […]
What is Metadata?
And why does it matter? Metadata is often described as everything except the content of your communications. You can think of metadata as the digital equivalent of an envelope. Just like an envelope contains information about the sender, receiver, and destination of a message, so does metadata. Metadata is information about the digital communications you send and receive. […]
How to make yourself a hard target online
This is a short and sharp guide to better protect your digital life. 2-Factor & Multi-Factor Authentication: Not every service offers this but if they do – enable it. SMS – Not bullet proof but better then nothing. Authy – Simple to set up, secure cloud backup, multi device support. YubiKey – The YubiKey reinvented hardware authentication […]
Online Threats
Quick guide to internet threats