Podchaser Logo
Home
Synthetic Snake Oil: Online Security Tips

dpapp

Synthetic Snake Oil: Online Security Tips

A Technology, News and Tech News podcast
Good podcast? Give it some love!
Synthetic Snake Oil: Online Security Tips

dpapp

Synthetic Snake Oil: Online Security Tips

Episodes
Synthetic Snake Oil: Online Security Tips

dpapp

Synthetic Snake Oil: Online Security Tips

A Technology, News and Tech News podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of Synthetic Snake Oil

Mark All
Search Episodes...
Your reasons for deleting Instagram can be numerous but there are a few steps and some considerations to make before pressing the big red button. If you’ve been listening to the previous episodes about deleting social media accounts, it should
Unlike Facebook, Twitter is an incredibly straightforward process when deleting your account. Your reasons for deletion can vary but to delete a Twitter account all you need to do is go to your settings and at the bottom of the page there is an
Over the years Facebook has done a lot of questionable things. There’s been the 2016 scandal with Cambridge Analytica and more recently Facebook has admitted that it’s been used as a disinformation tool and allowed people to run fake political
Are you the type of person who has a smartphone crammed with various apps that you don’t use? Or are you the kind of person who will delete apps after you’ve grown bored of them?Whatever the case is, I bet when it comes to delete those ancie
From having a Virtual Private Network to taking extra measures with two-factor authentication, one might think that I’m a bit paranoid about security. I’m sure it’s pretty obvious since some of my advice in previous episodes has been teetering
Another security measure I’ve talked about is two-factor authentication. Paired up with a Virtual Private Network (VPN), you’ll have a tighter security than most people. But while there’s been a lot of talk of two factor authentication, this te
One of the best decisions that you can make to protect yourself when browsing the internet is using a VPN: a Virtual Private Network. I’ve mentioned this here and there in some of my strategies but have yet to explain them and just how powerful
Even if people are staying on top of fraud, it doesn’t mean it doesn’t happen. Over the world, people are losing millions every year from these scams. Fortunately, there are many practical ways for us to work around these scammers.As a gener
From my last episode I mentioned the recent jury duty scam and we are handling these scams better. This much is true when you look at some of the statistics from the past two years revolving around scams.What the biggest money maker was for
The familiar scam now has a new twist. Instead of receiving false emails that you’ve been summoned to court for your “misdeeds”, the calls now focus on the fact that you missed jury duty for an important case.Earlier in November, the Court o
Cybersecurity is a joint responsibility. It’s like a chain where it’s only as strong as the weakest link in that chain. As such, you want to make an effort in keeping security tight and staying up with trends and potential security threats.W
The purpose of training employees on cybersecurity is to alter habits and behaviors around certain circumstances. When you are training people, keeping them informed is one thing, but there are other tactics we can employ to ensure they get the
It’s easy to convince people to consider cybersecurity training. If people don’t know how to recognize breaches or threats, how can you expect them to avoid them, report them or remove them? They won’t be able to.As I’ve said in the past a l
With malware attacks and stolen data being a common theme in today’s society, companies today need to put more effort in informing and educating employees. Over the years that viruses have run rampant, one of the most common themes in those sto
Outside of downloading or buying some ransomware protection, there are other ways for us to be fighting back against ransomware and protecting our data. While a lot of the attacks target small business, we as individuals aren’t immune to scam o
When people aren’t scamming you through sleazy phone calls, hackers are getting into your computer and locking particular data behind an encryption and demanding money. This type of scam is called Ransomware and is one of the largest problems p
Even though we use our phones a lot for texting these days it doesn’t mean we don’t get telephone scams. Some of them can be nickels and dimes, but some scams can be our entire life savings. Scammers today will do anything to cheat people out o
Last episode, I talked about how to generally identify scams where the person is posing as a government official. However one of the most common scams people experience is calls from the CRA/IRS and that’s a rather unique case.After all, if
You sometimes hear this in the news around tax time, fraudsters saying they represent the CRA/IRS calling you around tax time. But one other scam that’s been cropping up is one where fraudsters call stating that your Social Insurance Numbers (S
One of the biggest issues that PPC (Pay-per-click online ad campaigns) marketers are facing is click fraud. Over the past two decades, there has been a massive marketing revolution. Marketers enjoyed the leap from newspaper and billboards to ra
Outside of virtual credit card numbers and chips, there are other precautions credit card companies take to ensure security. This one comes in the form of mobile alerts, ping notifications revolving around all kinds of things.For someone who
We’ve all seen and heard about the chips embedded in our credit and debit cards, but there is another highly secure measure we can take for our credit cards. They’re called virtual credit card numbers.This technology is relatively new but it
While credit card chips have made credit cards - and debit cards - safer to use, there are still precautions that we need to take when using them. I’m not questioning the effectiveness of these chips on our credit and debit cards. Evidence show
Discovered in 2016, Petya is a family of encrypting ransomware that targeted Microsoft Windows systems. In 2016, we saw variants of this but in June 2017, we experienced a global cyberattack primarily targeting Ukraine.In 2016, the variants
Ransomware being the latest threat in history, this form of ransomware brought further attention to the issue at hand. While Gameover ZeuS targeted people, this ransomware cryptoworm attacked en mass.In May 2017, the world had to face off wi
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features