Logical Cybersecurity
  • Home
  • About
  • Basics Real World Examples Security 101
  • Best Practices & Thoughts Career Advice
  • Reviews
  • Contact Us

Logical Cybersecurity

  • Home/
  • About/
  • Beginners/
    • Basics
    • Real World Examples
    • Security 101
  • Professionals/
    • Best Practices & Thoughts
    • Career Advice
  • Reviews/
  • Contact Us/
tim-gouw-60216.jpg

Logical Cybersecurity

Beginner's Guide to Privacy and Security

Best practices and recommendations on how to protect and recover from compromised accounts and computers, use real-world scenarios to detail how scams and phishing emails are used and provide best practices on how to use the internet in a more safe and secure manner to protect yourself, your family, and your clients.

Logical Cybersecurity

  • Home/
  • About/
  • Beginners/
    • Basics
    • Real World Examples
    • Security 101
  • Professionals/
    • Best Practices & Thoughts
    • Career Advice
  • Reviews/
  • Contact Us/

A Beginner's Guide to Privacy and Security

Trying to remain safe online, practicing good security and working to keep your data private is extremely challenging.  This is made even more difficult with the speed at which technology changes, vulnerabilities are discovered, and attackers change their tactics.  Just when you think you have learned the right techniques to keep your data private and your devices, email, etc., secure, another breach is announced, a new vulnerability is discovered in your operating system or web browser, and/or attackers come up with another scam/trick to gain access to your devices or information...all of which are out of your control.  If you aren't tech savvy, it can be even more overwhelming.  Since technology and attack methods change so rapidly, there are no simple answers or steps you can take to be 100% protected.  This is where we are hoping we can help by recommending steps you can take to increase the security of your accounts and devices, better protect your privacy, and be safer online.  Check out our "Security 101" section for a collection of the minimum security procedures everyone should be following.

If you are looking for a specific subject matter, click one of the topics below.  We try to do our best to tag each blog post with the appropriate tags.  If you own a small business, you may want to check out the "business owner" tag.  The "scenarios" tag is real world examples of how you, your family, or your friends can be impacted by risky social media behaviors.

If you have any ideas, requests, feedback, etc., please visit the "Contact Us" page and let us know.

Posts related to: 

  • Privacy 1
  • antivirus 2
  • app store 2
  • apple 2
  • applications 1
  • apps 2
  • basics 9
  • birth date 1
  • business owner 8
  • computer shopping 2
  • current events 1
  • downloads 1
  • email 6
  • facebook 5
  • hacked 2
  • instagram 5
  • internet habits 4
  • linkedin 2
  • lost 1
  • malware 5
  • passwords 4
  • patches 2
  • permissions 1
  • personal information 3
  • phishing 3
  • popular 1
  • privacy 5
  • scams 1
  • scenarios 5
  • search words 5
  • social media 6
  • software 2
  • stolen 1
  • trends 1
  • twitter 5
  • updates 2
  • virustotal 5
April 20, 2017

Updates and patches

April 20, 2017/ Logical Cybersecurity

Installing software updates and patches is extremely important and can dramatically increase your security posture. In fact, a lot of systems are compromised simply because people have not updated their operating system and/or third party software to patch vulnerabilities.

Read More
April 20, 2017/ Logical Cybersecurity/
updates, patches, applications, basics, business owner
  • Home/
  • About/
  • Beginners/
    • Basics
    • Real World Examples
    • Security 101
  • Professionals/
    • Best Practices & Thoughts
    • Career Advice
  • Reviews/
  • Contact Us/

Logical Cybersecurity

Definitions/Terms to know:

  • Data/Information – Both terms will be used and mean the same thing.  Data, or information, refers to sensitive, private and personal information about yourself, family, clients, friends, etc.  Think of it as anything you do not want a stranger with bad intentions to know.
  • Devices – Refers to anything you or your family own that connects to the internet.  Will most often be in reference to a phone, computer or tablet, but could also mean an internet connected speaker, TV, etc.
  • Hacked, Compromised, Breached – All 3 terms will be used and basically mean the same thing.  If something is “hacked”, compromised or breached, it means someone has gained access to something without permission.
  • Hacker/Attacker – Either term refers to someone with malicious intentions trying to gain access to accounts or systems, steal data, etc. without permission and while often breaking the law.
  • Internet of Things (IoT) - Devices connected to the internet such as a security camera, television, fridge, speaker (Amazon Alexa or Google Home), etc.
  • Login Credentials/Login - A combination of a username or email address and password used to log in to a website or app.
  • Multi-Factor Authentication (MFA) – Also called 2-step or 2-factor authentication (2FA).  Means you log in with more than just a password (i.e. your password plus either a text to your phone, a physical token, a finger print, a code from an app on your phone, etc.).
  • Patched/Unpatched – When something is patched, it means the security problems or vulnerabilities have been fixed.  Unpatched means the security vulnerabilities or problems have not been fixed.
  • Vulnerability – Vulnerabilities are security issues/problems within a piece of software, hardware, or website.  When you see vulnerability, think security problem.

Logical Cybersecurity