IoT (Internet of Things) devices bring incredible convenience and functionality, but they also come with risks since they are connected to the Internet, which opens the door to potential threats. To protect your data, privacy, and devices, it is essential to understand and implement the following steps that will help you secure your assets. 1….
Category: Security
Is a VPN in a company enough security?
In today’s world, where cyber threats are becoming more complex and widespread, many companies have or are just deciding to implement a VPN as a key component of their security strategy. A VPN offers a number of benefits, such as encryption of data between a company and an employee or between company branches and anonymity…
How to secure KeePass with YubiKey
Obecnie mamy coraz więcej kont w serwisach internetowych. Nie sposób zapamiętać hasła do wszystkich kont, w szczególności jeśli chcemy aby nasze hasła były odpowiednio długie, losowe i unikalne. Tutaj z pomocą przychodzą nam menadżery haseł. Jakiś czas temu napisałem wpis why and how to use KeePass. The password database file is, of course, password-protected using…
S/MIME certificate configutation in Outlook – YubiKey 5 NFC – manual
In today’s post, I would like to tell you about the S/MIME certificate. I will explain what we can use it for. I would like to show you how to generate such a certificate for free and then add it to Outlook using the Yubikey key. Welcome S/MIME (Secure/Multipurpose Internet Mail Extensions) is a digital…
10 steps to have better secured email mailbox
Email is today’s essential work tool. It’s hard to imagine life without email. We use it both at work and in our personal lives. However, this fact also poses a threat to us. The number of email-related scams continues to rise, which means that if we don’t take additional steps to secure ourselves, we’ll be…
Protection against advertisements in the browser
Ads and malicious content in a web browser can be not only annoying but also dangerous for users. They can invade privacy by tracking activities, slow down computer performance, and even infect it with malicious software. Therefore, it’s important to know how to protect yourself from them. Here are a few ways to enhance the…
Security of mobile devices
In today’s times, each of us has at least one mobile phone or some other mobile device, such as a watch or tablet. These devices are usually constantly connected to the internet, either through a cellular network or WiFi. Typically, these devices continuously transmit and store various data, which can be very valuable and often…
System updates – the importance of regular maintenance?
System updates involve the installation of new versions or patches for the software we use on our devices. This applies primarily to computers, smartphones, tablets, and consoles. In business settings, machines with outdated firmware or servers running on the same software version for years are not uncommon. System updates can address the operating system as…
Malware – what is it and how to protect yourself?
Malware is an abbreviation for the English term “malicious software,” which refers to harmful programs created by cybercriminals with the intent to damage, destroy, or steal data. You have likely encountered terms such as viruses, worms, trojans, spyware, and ransomware – all of which fall under the category of malware. To begin with, let’s discuss…
How to recognize phishing message?
We often receive email messages that are so-called phishing attempts. Phishing is a technique where scammers try to extract certain information from us, such as personal or financial data. Criminals often do this by impersonating various companies, such as courier services or banks. I frequently encounter, both in private and professional life, that people struggle…