Look for any podcast host, guest or anyone
Showing episodes and shows of

Makani Mason

Shows

Super Simple Security PrinciplesSuper Simple Security Principles74. Safe Website Check #3: Can You Get An Answer?Helpful episodes to listen to firstCheck #1 - Is the website less than a year old?Check #2 - What does Trustpilot say?What is a Protection PartnerQuestions we answer in this episodeWhy does this check sometimes get skipped?What’s one super simple way to spot a fake shopping site?Why might a scammer want you to contact them?Which red flags in a reply should make you walk away?Episode summaryThe third item on our Sa...2025-08-0128 minSuper Simple Security PrinciplesSuper Simple Security Principles73. Trustpilot Saves Me From a ScamHelpful episodes to listen to firstEpisode on Safe Website Checklist Item #1Questions we answer in this episodeWhat is Trustpilot?How did they help Makani identify a highly enticing scam?How can you use Trustpilot to help you stay safe while shopping online?When does Makani use Trustpilot?Episode summaryTrustpilot helped me avoid a scam for a bogus body scale, called Body Pod and sold by Hume Health.Trustpilot is a fabulous, independent source for website reviews....2025-07-2524 minSuper Simple Security PrinciplesSuper Simple Security Principles72. Website Exploration SafetyHelpful episodes to listen to firstDon't Let Websites Send You NotificationsGive Every Website a Unique EmailQuestions we answer in this episodeWhat bad stuff can happen when you are browsing a new shopping website?How has browser safety changed over the years?What are 4 rules to stay safe while browsing the web?Episode summaryBrowsing the web today is safer than it's ever been, as long as you're not doing anything shady.To stay as safe as possible...2025-07-1825 minSuper Simple Security PrinciplesSuper Simple Security Principles71. Kem's alludesgroup.com adware failEpisode summaryKem humbly shares his "epic fail" (his words, not mine!) story so we can all learn from his mistakes. As the story opens, Kem searches for a nice picture of Wellington, New Zealand for his wife's computer wallpaper.As he was speeding along, he accidentally clicked yes on a popup he shouldn't have, giving some malware backdoor access to his computer. As it tried to spread farther through another popup, he realized his mistake.Thankfully at that point with just a few minutes of effort, he was able to kick the...2025-07-1130 minSuper Simple Security PrinciplesSuper Simple Security Principles70. Shopping Security Stack: PhishingHelpful episodes to listen to firstMakani Leaks His Own DataQuestions we answer in this episodeWhat's the first skill we need to stay safe shopping online?What are the two buckets of bad shopping websites?What are the two buckets of phishing websites?What is the first item on our "safe website" checklist?Episode summaryA vital skill in staying safe while shopping online is knowing how to tell if a website is safe. You need to be on the watch...2025-07-0427 minSuper Simple Security PrinciplesSuper Simple Security Principles69. Security Stack: 6 LayersHelpful episodes to listen to firstWhat is a Security StackQuestions we answer in this episodeWhat are the 6 layers in the Bulletproof Stack Formula?How are they grouped?What are the most neglected layers?Episode summaryThere are 6 types of layers we can review to help us build a Security Stack. They help us build redundancy into our Security Stack. Yes, that's a good thing! We want as many layers of defense as we can to keep the bad guys out....2025-06-2736 minSuper Simple Security PrinciplesSuper Simple Security Principles68. Security Stack: 5 QuestionsHelpful episodes to listen to firstSeven Critical Router Security SettingsHow DDoS Attacks Affect YouQuestions we answer in this episodeWhat are the 5 questions in the Bulletproof Stack Formula?How do they help us?Episode summaryThere are 5 questions we can ask to help us build a Security Stack. These questions help to ensure that our Security Stack is relevant.This means there is a legitimate threat that I care about, and I'm willing and able to take the steps necessary...2025-06-2042 minSuper Simple Security PrinciplesSuper Simple Security Principles67. Security Stack: 4 PhasesHelpful episodes to listen to firstOur Super Chatty DevicesQuestions we answer in this episodeWhat are the 4 phases in a Security Stack?How do they help us?Which one is the most important?Episode summaryThe 4 phases of a Security Stack are: Learn, Prevent, Detect, and Repair. This parallels how an attack affects us over time.We want to Learn about an attack before it hits us, and ideally Prevent it from succeeding. But just in case it does get past...2025-06-1329 minSuper Simple Security PrinciplesSuper Simple Security Principles66. What is a Security StackHelpful episodes to listen to first4 Strategies for Picking Your PrioritiesQuestions we answer in this episodeWhat does Makani love building?What is a Security Stack?How do you build one?What is the twist on our usual Call-to-Actions for this series?Episode summaryA Security Stack is a piece of your Personal Security Plan focused on a specific area. It is comprised of layers of protection that work together to keep you safe.You build a Security Stack using...2025-06-0622 minSuper Simple Security PrinciplesSuper Simple Security Principles65. 4 Strategies for Picking Your PrioritiesQuestions we answer in this episodeWhat is the 4P formula?What are 4 strategies for picking your priorities?What is the theme of our new series of episodes?How many episodes do you think it will take Makani to finish it?Episode summaryThere's a lot of ways you can improve your online security. But where should you begin? It can be a daunting question to answer.Picking your priorities goes a long way. There are 4 simple strategies you can use to get started: activity...2025-05-3029 minSuper Simple Security PrinciplesSuper Simple Security Principles64. Makani Leaks His Own DataHelpful episodes to listen to firstUnique Email AddressesTroy Hunt PhishedTroy Hunt Part 2Questions we answer in this episodeWhy is Makani sharing his story?What is a domain name registrar?What is whois data?How can it help me stay safe online?Episode summaryA domain name is what we think of as a website - facebook.com or makanimason.com. In order to have your own domain, you need to pay some money and share...2025-05-2331 minSuper Simple Security PrinciplesSuper Simple Security Principles63. Phishing Lessons From Troy Hunt's StoryHelpful episodes to listen to firstEpisode 62, Even a Security Expert Can Get Phished (Troy Hunt, Part 1)Episode 17, Eliminating Email Exhaustion - Part 2 - Unique EmailsEpisode 42, Website and Email Filtering, Part 3: Email FriendsQuestions we answer in this episodeWho is to blame for Troy getting phished?How can you reliably tell who sent you an email?How can you cut down your email spam?What are two major flaws in our email system?Episode summaryI don't...2025-05-1635 minSuper Simple Security PrinciplesSuper Simple Security Principles62. Even a Security Expert Can Get PhishedQuestions we answer in this episodeWho is Troy Hunt?How did he get phished?What are some lessons we can learn from his story?Who will we be inviting as a guest to the podcast?Episode summaryTroy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website.The hackers logged into his Mailchimp account that he uses to send his email newsletter. They stole the email addresses of all his subscribers.2025-05-0930 minSuper Simple Security PrinciplesSuper Simple Security Principles61. How to Stop Hackers from Stealing Your Tax RefundQuestions we answer in this episodeWhat is the website, ID.me used for?What are the two PIN numbers used in filing your taxes?How can I get an identity protection (IP) PIN?What does it mean (in online security) to plant your flag?Episode summaryWhen filing your taxes, there are 2 different PINs you might use. The first is called your self-select PIN. It's 5 digits long, and pointless.The second is called an Identity Protection (IP) PIN. It's 6 digits long, and awesome. It...2025-05-0226 minSuper Simple Security PrinciplesSuper Simple Security Principles60. How DDoS Attacks Affect YouQuestions we answer in this episodeWhat is a DDoS attack?What social media platform was recently the target of a DDoS attack?How can your home network be impacted by one?What can you do to protect your home network?Episode summaryDDoS attacks are growing faster than the squash in my garden - seriously, it's wild!The slaves in the army? Devices quietly hijacked by hackers.There are millions of them scattered around the globe...And yes, your home...2025-04-2531 minSuper Simple Security PrinciplesSuper Simple Security Principles59. Why Everyone Needs an Outbound FirewallHelpful episodes to listen to firstEpisode 40 - Website and Email FilteringEpisode 56 - Home Network Attacks From WithinEpisode 57 - How Firewalls Protect You And What You Might Be MissingQuestions we answer in this episodeWhat is a trojan horse?What are two ways an outbound firewall protects you?What is an outbound firewall's greatest frustration and greatest strength?What is an allow list?Episode summaryIf you want to protect your computer, you need both an...2025-04-1841 minSuper Simple Security PrinciplesSuper Simple Security Principles58. How a Guest Network Can Protect Your HomeHelpful episodes to listen to firstHow to Access Your RouterHome Network Attacks From WithinQuestions we answer in this episodeWhat is a guest network?How can it protect my home network?Does everyone need to use it?What are the 3 categories of Internet of Things (IoT) devices?Episode summaryA guest network is a second wifi network you can set up at home.It lets visitors use your internet without touching your main network....2025-04-1127 minSuper Simple Security PrinciplesSuper Simple Security Principles57. How Firewalls Protect You And What You Might Be MissingHelpful episodes to listen to first Don't Answer the Phone Bulletproof My Home Home Network Attacks From Within Questions we answer in this episode What is a firewall?Why do I need more than one firewall?Which device already has a firewall enabled?What kinds of devices have an increased need for a firewall?Episode summaryFirewalls in buildings stop fire from spreading.Firewalls on computers do something similar: they stop malware from spreading.Your...2025-04-0429 minSuper Simple Security PrinciplesSuper Simple Security Principles56. Home Network Attacks From WithinHelpful episodes to listen to firstDon't Answer the PhoneQuestions we answer in this episodeWhat is a computer virus?How does a computer virus spread?How does patient (device) zero get infected?What protection do we NOT have against these attacks?Episode summaryWhat happens if a device in your home gets infected with a computer virus?Just like a human virus, it wants to spread.But how does that first device get infected?There...2025-03-2832 minSuper Simple Security PrinciplesSuper Simple Security Principles55. Seven Critical Router Security SettingsQuestions we answer in this episodeWhat are the seven most critical router security settings?What is WPS and when is it okay to use?What is a brute force password attack?Which unexpected setting helps against this attack?Episode summaryDefault passwords and settings make a hacker's job easy.It's time to take just a few minutes and strengthen your router's security.If you don't know how to access your router, please listen to Episode 54Call to action...2025-03-2129 minSuper Simple Security PrinciplesSuper Simple Security Principles54. How to Access Your RouterQuestions we answer in this episodeWhy do I need the manual for my router?What's the first step in accessing my router?How many passwords are there for my home network?What are the two methods for connecting to a router?Episode summaryIf you can install an app, and visit a website, you can learn to access your router.Reading the section in the router's manual should help.Yes, I realize many of us don't read manuals anymore, but that's what...2025-03-1429 minSuper Simple Security PrinciplesSuper Simple Security Principles53. BulletProof My HomeQuestions we answer in this episodeWhat is the awesome new tool we're building?How can you get free lifetime access to it?What problem does it solve?What is a computer network port?Episode summaryComputer network ports are like phone extensions in a corporate office building.But instead of using an extension to reach a specific person, computer use ports to access specific services.Services like visting a webpage, sending an email, checking for new email....2025-03-0722 minSuper Simple Security PrinciplesSuper Simple Security Principles52. Don't Answer the PhoneQuestions we answer in this episodeWhat is the simple rule to keep your home network safe?Why is breaking that rule so common?How do I know if MY router is following the rule?What new tool are we building?Episode summaryYour home network's guardian from internet based attacks is your router.To keep your home safe from these attacks, your router needs to follow one simple rule:Don't answer the phone!Unfortunately, convenience often tempts...2025-02-2829 minSuper Simple Security PrinciplesSuper Simple Security Principles51. Our Super Chatty DevicesQuestions we answer in this episode What is a router? How many episodes will be in this series? Is Makani trying to turn me into a network engineer? What is the metaphor we will use for this series? Episode summary Every internet connected device is under constant threat of attack. Especially the router on your home network. In order to protect your devices, you don't need to become a network engineer. But you need to understand 3 things about computer...2025-02-2126 minSuper Simple Security PrinciplesSuper Simple Security Principles51. Our Super Chatty DevicesQuestions we answer in this episode  What is a router?  How many episodes will be in this series?  Is Makani trying to turn me into a network engineer?  What is the metaphor we will use for this series?  Episode summary  Every internet connected device is under constant threat of attack.  Especially the router on your home network.  In order to protect your devices, you don't need to become a network engineer.  But you need to understand 3 things about computer networks:  1 - Our devices are super chatty.  Think of it like the...2025-02-2126 minSuper Simple Security PrinciplesSuper Simple Security Principles50. Two New Locks for Your Phone NumberWhat are the phone protections the FCC mandated in 2024? What is a sim swap attack? What is a port-out attack? What is your second most important online account? How to lock your phone numberFCC Adds Rules for Cell Service ProvidersFCC Explains Cell Phone Fraud2025-02-1428 minSuper Simple Security PrinciplesSuper Simple Security Principles49. Our Phone System HackedYou may have heard the official announcement from the government.Nine major telecommunications companies in the United States have been hacked.Including Verizon, AT&T, and Lumen.Yup, you read that right.The bad guys?A group dubbed The Salt Typhoon, working for the People's Republic of China.Is it time to panic?No, but it is time to start using Signal, my favorite secure communications app.The Signal App Podcast Episode 20 about Signal Telecommunications companies hacked His...2025-02-0731 minSuper Simple Security PrinciplesSuper Simple Security Principles48. Should I Use Passkeys?The short answer: yes! Passkeys are the future of secure logins.Start with email -- the most critical account you own. It's the master key to your online identity.Before you get started with passkeys, listen to this episode, the final one in our series on passkeys.The purpose of this episode is to pave the way for you to have a smooth first passkey experience.We start by talking about 3 issues that passkeys still have: - you still need a password - passkeys can be confusing...2025-01-3120 minSuper Simple Security PrinciplesSuper Simple Security Principles47. Picking a Password Manager for PasskeysReady to start using passkeys?First, you’ll need a password manager.By default, your phone or laptop might offer to store your passkeys in your browser.But here’s the catch: if you do, your secret isn’t so secret anymore—Google or Microsoft could have access to it.The smarter move? Use a dedicated password manager.I recommend 1Password, ProtonPass, or Bitwarden.In this episode, we dive into why browser-based options fall short. Get started with 1PasswordGet started with Prot...2025-01-2427 minSuper Simple Security PrinciplesSuper Simple Security Principles46. The 4 Simple Steps of Using a PasskeyWhat is the one key difference between a passkey and a password?  How can I create an unforgeable digital signature?  What are the 4 steps of logging in with a passkey?  How is logging in with a passkey safer than with a password? Join us for free in the IHP Academy! 2025-01-1724 minSuper Simple Security PrinciplesSuper Simple Security Principles45. The 4 Simple Steps of Making a PasskeyWhat is a public key?  What is a private key?  How do they work together?  What are the 4 steps of creating a passkey?  How do they compare to the steps in creating a password? Join us for free in the IHP Academy!2025-01-1029 minSuper Simple Security PrinciplesSuper Simple Security PrinciplesReplay Ep 12: The Master Key to Your Online IdentityThere is a master key to your online identity.  Listen now to learn what it is and one way you can safeguard it.  You can sign up for notifications of new podcast episodes by clicking here. Join us for free in the IHP Academy!  2025-01-0313 minSuper Simple Security PrinciplesSuper Simple Security PrinciplesReplay Ep 4: Protection PartnersWhat is a protection partner and how can having one help you? It's a free strategy that anyone can use. It will give you an extra layer of security against many types of threats, but especially scams. Listen now to learn the details.  You can sign up for notifications of new podcast episodes by clicking here. Join us for free in the IHP Academy!  2024-12-2716 minSuper Simple Security PrinciplesSuper Simple Security Principles44. Listener Question: The Promise of PasskeysWhat are passkeys?  How are they different from passwords?  Why are passwords so flawed?  What are 3 big problems with passwords?  Could passkeys be the solution we've been waiting for to make the internet safer?  links:Learn more about passkeysJoin us for free in the IHP Academy!2024-12-2031 minSuper Simple Security PrinciplesSuper Simple Security Principles43. Private Person to Person PaymentsWhat is Makani’s favorite way to send money to friends and family, and why?   Which disturbing Venmo privacy setting has been causing problems for years?   What major PayPal policy change is coming next summer?   links:Get Weekly 1-Minute Security TipsZelle PayMake your Venmo transactions privateOpt out of PayPal selling your dataI Know What You Did on Venmo research - this is a PDF downloadFamous People on VenmoOfficial PayPal policy change notice2024-12-1324 minSuper Simple Security PrinciplesSuper Simple Security Principles42. Website and Email Filtering, Part 3: Email FriendsHow do an estimated 91% of cyberattacks start?  What critical feature is email missing that every modern messaging app has?  How can we use an allowlist and a blocklist together?  What experiment does Makani want your help with?  links:Adding a Friend System to EmailJoin us for free in the IHP Academy!2024-12-0632 minSuper Simple Security PrinciplesSuper Simple Security Principles41. Website and Email Filtering, Part 2: Harmful Website Blocking for EveryoneWhat free tool can help you block harmful websites on any device without slowing it down?   Wait, free? What's the catch?   What bonus protection does the WARP service provide?   What does it mean to rip pages out of your internet phonebook?  links:https://one.one.one.one/Instructions for installing & filteringJoin us for free in the IHP Academy!2024-11-2927 minSuper Simple Security PrinciplesSuper Simple Security Principles40. Website and Email Filtering, Part 1What is an allowlist?   What is a blocklist?   How can they keep me safe?  2024-11-2216 minSuper Simple Security PrinciplesSuper Simple Security Principles39. The Hidden Danger of Cookie BannersHow is a cookie banner like a road sign?   What does it mean to "read the signs"?   How can you use cookie banners to build good security habits?  2024-11-1526 minSuper Simple Security PrinciplesSuper Simple Security PrinciplesSE2 - Announcing the Bulletproof DojoWhy is the IHP Academy getting rebranded?  What does it mean to become bulletproof?  What are the 4 areas you need to protect?  What are 5 categories of threats?  What is the one key strategy to staying safe?  Join us for free in the IHP Academy!  https://ihpacademy.com/join. 2024-11-0845 minSuper Simple Security PrinciplesSuper Simple Security Principles38. Do I really need to accept all these cookies?What are cookies?   Do I have to accept them?   Do cookies ever go away after I accept them?   Unless it is actually physical cookies I can eat, I really don’t want them so what do I do to avoid them?   links:Privacy Badger Brave Browser uBlock Origin Episode 31 about hotel key card cookies Episode 33 about browser extensions Join us for free in the IHP Academy!https://ihpacademy.com/join2024-11-0125 minSuper Simple Security PrinciplesSuper Simple Security Principles37. Phishing Protection: Be Specifically SuspiciousHow does typing in your password make you vulnerable to phishing? When do you authenticate someone in the physical world? What question should you be asking yourself more often?2024-10-2517 minSuper Simple Security PrinciplesSuper Simple Security Principles36. Backblaze: Simple Whole Computer BackupsWhat is Backblaze?   How long has Makani been using Backblaze?   What feature is Backblaze missing?   What is software opportunity cost?  Get BackblazeJoin us for free in the IHP Academy!2024-10-1820 minSuper Simple Security PrinciplesSuper Simple Security Principles35. Resolving the 3 Reasons You Aren't Backing Up Your DataWhat are the 3 big reasons people don't backup their data?   What is the sad story that first interested Makani in backups?   Does the cloud keep my data safe?   What kind of malware shut down thousands of car dealerships because they didn't have backups?   Do you need to start doing backups?   Join us for free in the IHP Academy!2024-10-1128 minSuper Simple Security PrinciplesSuper Simple Security Principles34. Listener Question: Apple vs WindowsWhat's safer - Apple or Windows?   How does one famous Windows software developer answer this question?   What is Gatekeeper?   What is Patch Tuesday?   What security feature does Windows have that Makani wishes Apple did too?  Keep Windows updatedWhat is Gatekeeper?What is SmartScreen?Malware statisticsJoin us for free in the IHP Academy!2024-10-0438 minSuper Simple Security PrinciplesSuper Simple Security Principles33. Keep the Hackers Out, Part 3What's the most important step to take if an account gets hacked?   - Spoiler alert: it's not changing your password.   What youtube channel with it's 15 million subscribers had all it's thousands of videos deleted?   What lessons can we learn from their story?   What is authentication?   Where do we see it in the physical world?   How does it work online?  Linus Tech Tips takeoverJoin us for free in the IHP Academy!2024-09-2726 minSuper Simple Security PrinciplesSuper Simple Security Principles32. Who We Trust: The 2FAS AppWhy do I want the 2FAS app?   What is Google Authenticator?   Why does Makani trust the 2FAS app?   Do I need 2FAS if I have a password manager?  Get 2FASJoin us for free in the IHP Academy!2024-09-2022 minSuper Simple Security PrinciplesSuper Simple Security Principles31. Why you need to understand browser extensionsWhat is a browser extension?   Are there any I might want to use?   What bad things can a browser extension do?   How do I know which extensions to trust?   Listen now for the answers.  Review your installed extensionsJoin us for free in the IHP Academy!2024-09-1321 minSuper Simple Security PrinciplesSuper Simple Security Principles30. Listener Question: Apple vs. AndroidToday we are answering a listener question: which is safer - Apple or Android? We also talk about how important the answer is. And, of course, the biggest question: should you switch?Join us for free in the IHP Academy!What to expect when in contact with Apple Support.Mobile Phone Market ShareGoogle shares the challenges of keeping Android secureHow to keep your device updated2024-09-0635 minSuper Simple Security PrinciplesSuper Simple Security Principles29. What to do if your data was stolen?If you listened to last week's episode, and are wondering what to do, this episode is for you.   We discuss two free but powerful layers of protection from identity theft.   It's something we already highly recommended for everyone, and even more so after the massive National Public Data breach we talked about last week.  Join us for free in the IHP Academy!  How to add the layersFTC Information on the layersOfficial US Government Identity Theft site2024-08-3024 minSuper Simple Security PrinciplesSuper Simple Security PrinciplesSE1 - National Public Data: Massive Data BreachGet simple answers to all your questions about this breach:  How many countries were affected by this data breach?  How many people?  What group of people wasn't affected?  How can I find out if my data was stolen?  What should I do if it was?  This is technically our 2nd news event we've covered,  but first in what we are now calling our Special Edition where we interrupt our regular schedule.  Listen now, then share it with anyone you care about.  Join us for free i...2024-08-2316 minSuper Simple Security PrinciplesSuper Simple Security Principles28. Keep the Hackers Out, Part 2In part two, we talk about step two of protecting your online accounts.  There are many kinds of two-factor authentication and they have some important differences.  In this episode, we demystify one that looks scary: TOTP.  We talk about its strengths and weaknesses compared to the other forms. Listen now, then join us for free in the IHP Academy! How to use 1Password for TOTP 2FAS authenticator app for TOTP  2024-08-1623 minSuper Simple Security PrinciplesSuper Simple Security Principles27. ExpressVPN: Speedy and ReliableLooking for a VPN that isn't blocked and doesn't slow you down?  ExpressVPN might be the answer.  Their website might be full of hype, but there's still a lot to love about ExpressVPN.  Listen now and find out if ExpressVPN is right for you. Join us for free in the IHP Academy! ExpressVPN + Backblaze special offer Reasons to trust ExpressVPN Bug Bounty Program Security Audits Digital Security Lab TrustedServer Privacy Audit VPN Trust Initiative Talking to...2024-08-0929 minSuper Simple Security PrinciplesSuper Simple Security Principles26. Do I need a VPN?Do you keep hearing about VPNs?   Are you wondering if you need to get one?   Will it keep you safe?   What is a VPN good for?   We answer these questions and more.  Listen now, then join us for free in the IHP Academy!2024-08-0224 minSuper Simple Security PrinciplesSuper Simple Security Principles25. CrowdStrike - Your Questions Answered.Thank you for your questions, our lovely listeners!   We had so many questions about CrowdStrike that we are interrupting our previously planned episodes to answer them.   We answer the what, the why, and the how.   There's a glimpse into the future and what we might do to prepare for our other technology breakdowns.   If you have any questions we didn't answer, come ask us on our forum.  Join us for free in the IHP Academy!  The official response and all the details from CrowdStrike themselves.2024-07-2629 minSuper Simple Security PrinciplesSuper Simple Security Principles24. Listener Request: Spread the Word About This AttackThis is our first episode dedicated specifically to a listener request.   We will be doing them the 3rd Friday of every month.   This month, our listener shared a news article that he wanted us to share and talk about.   We break down exactly how the attack works and steps you can take to protect yourself.   Listen now, then share it with anyone you care about.  Join us for free in the IHP Academy!The original news article the listener shared. MacRumors, one of my sources for all th...2024-07-1931 minSuper Simple Security PrinciplesSuper Simple Security Principles23. Keep the Hackers Out, Part 1Have you ever thought about how many online accounts you have?   Are all of them well protected?   Overwhelmed just thinking about that question?   In this series of episodes we will help you break down this task into manageable parts.  Listen now, then join us for free in the IHP Academy!  Your Critical Accounts2024-07-1219 minSuper Simple Security PrinciplesSuper Simple Security Principles22. Will Norton Keep Me Safe?Is Norton the answer to all your computer security woes?   What does their service provide?   Most importantly, can Norton be trusted to keep your computer safe?  Listen now, then come share your thoughts with us in our free community forum.  Norton's Virus Protection PromiseNorton's parent companyAvast acquires AVGAvast sells user dataUninstall NortonEnable Microsoft's free antivirus2024-07-0524 minSuper Simple Security PrinciplesSuper Simple Security Principles21. The Missing Warning Label for Microsoft Windows.Are you excited for the new Microsoft Copilot+ PCs?   They have a lot of cool sounding features.   One of them raises some serious security concerns.   Before you buy one, listen to this episode.  Then come share your thoughts with us on our forum.  Microsoft delays Recall amid privacy and security concerns2024-06-2821 minSuper Simple Security PrinciplesSuper Simple Security Principles20. Signal: A Safe and Private Communication AppEveryone deserves a safe and private place to communicate.   Listen now to learn why we trust Signal to do that for us, and for you.  If you are serious about leveling up your digital defenses, join us in the Security Dojo!2024-06-2107 minSuper Simple Security PrinciplesSuper Simple Security Principles19. Don't Be a Punching Bag for SpamStart fighting back against spam.  Listen now to learn the simple thing you can start doing now. Then visit here for help getting started. If you are serious about leveling up your digital defenses, join us in the Security Dojo!2024-06-1410 minSuper Simple Security PrinciplesSuper Simple Security Principles18. Stop Encouraging SpammersLearn now to learn about a sneaky thing hidden in your email.  Then visit here for instructions on how to configure it.  Doing this will help you in your battle against spam. You can sign up for notifications of new podcast episodes by clicking here. If you are ready to level up your digital defenses, join us in the Security Dojo! 2024-06-0709 minSuper Simple Security PrinciplesSuper Simple Security Principles17. Cut Your Email Spam to 10 Per YearWould you like to reduce your spam email to just 10 a year?  I've been doing it for 13 years.  Listen now to hear how. You can sign up for notifications of new podcast episodes by clicking here. If you are ready to level up your digital defenses, join us in the Security Dojo! 2024-05-3109 minSuper Simple Security PrinciplesSuper Simple Security Principles16. Eliminating Email Exhaustion, Part 1Are you exhausted by just the thought of checking email?  Do you worry you'll click on the wrong thing?  Join us for our next several episodes as we explore solutions. Are you ready to level up your digital defenses?  Save your spot in the Security Dojo today!  Questions? Talk to Makani You can sign up for notifications of new podcast episodes by clicking here. 2024-05-2412 minSuper Simple Security PrinciplesSuper Simple Security Principles15. Join the Security Dojo Today!Are you ready to level up your digital defenses?  Join the Security Dojo today! You can sign up for notifications of new podcast episodes by clicking here.  2024-05-1714 minSuper Simple Security PrinciplesSuper Simple Security Principles14. Find Peace of Mind Shopping OnlineDo you ever feel uneasy shopping online?  Do you ever wonder: can I trust this website?  Listen now to find a powerful and free solution you can use today. Then tell us what you think - inside our free community forum!    Get our tips for setting up your privacy.com account Privacy.com's own explanation of what a Privacy Virtual Card is TrustPilot reviews of privacy.com  You can sign up for notifications of new podcast episodes by clicking here. If you are...2024-05-1011 minSuper Simple Security PrinciplesSuper Simple Security Principles13. The Simple Trick Google Uses to DominateHow does google beat the competition?  Listen now to learn their trick.  It's subtle but effective. Stories we shared Google pays $26 billion in 2021 to be default search engine across platforms Google pays $20 billion in 2022 to be default Safari search engine Microsoft willing to pay $15 billion to Apple to be default search engine Search Engines Swiss Cows Presearch Brave Search DuckDuckGo Startpage Bing Mojeek Metager The search engine Makani is curren...2024-05-0311 minSuper Simple Security PrinciplesSuper Simple Security Principles12. The Master Key to Your Online IdentityThere is a master key to your online identity.  Listen now to learn what it is and one way you can safeguard it. You can sign up for notifications of new podcast episodes by clicking here. If you are ready to level up your digital defenses, join us in the Security Dojo! 2024-04-2609 minSuper Simple Security PrinciplesSuper Simple Security Principles11. Spread the Word About DeepfakesDeepfakes are something everyone needs to know about.  Listen now and then spread the word to friends and family. Moon Landing Deepfake Taylor Swift Scam Ad  If you like what you hear, come join us inside the Security Dojo! You can sign up for notifications of new podcast episodes by clicking here. 2024-04-1909 minSuper Simple Security PrinciplesSuper Simple Security Principles10. Preparations for 1PasswordYou've decided it's time to level up your security by using 1Password. Listen now to learn a few key principles to make that journey smoother. 1Password signup Secret Key Emergency Kit iPhone or iPad Autofill Android Autofill Autofill Elsewhere  If you run into troubles, please let us help. We'd also love to hear your victories. Come join us inside the Security Dojo! You can sign up for notifications of new podcast episodes by clicking here. 2024-04-1210 minSuper Simple Security PrinciplesSuper Simple Security Principles9. Who We Trust: The 1Password EditionYou need a password manager you can trust. We trust 1Password. Listen now and then decide for yourself if you do too. Either way, we'd love to hear your thoughts. Come join us inside the Security Dojo! You can sign up for notifications of new podcast episodes by clicking here. 1Password.com home page 1Password community forum 1Password security audits 2024-04-0510 minSuper Simple Security PrinciplesSuper Simple Security Principles8. Your Master PasswordTake the first step in your password manager journey by picking a master password. Listen now to learn how to make a strong one that won't drive you crazy. IHPAcademy random word generatorIf you get stuck, or have any questions, we'd love to help you inside the Security Dojo! You can sign up for notifications of new podcast episodes by clicking here. 2024-03-2910 minSuper Simple Security PrinciplesSuper Simple Security Principles7. Too Many SecretsDo you hate trying to pick strong passwords? And even worse, trying to remember them and type them in? Maybe you write them down, but then have a hard time finding the right one when you need it. Have you ever thought to yourself, "there has to be a better way"?  You were right. There is a better way. Listen now and give yourself the gift of finding some relief from password fatigue. If you get stuck, or have any questions, we'd love to help you inside the Security Dojo! You can sign up for no...2024-03-2210 minSuper Simple Security PrinciplesSuper Simple Security Principles6. When Your Spidey Sense Fails YouOne day your spidey sense will fail you, and you want to be prepared. Listen now to learn how. You'll also discover the power of one super simple security principle: two factor communication. But we decided not to make that the title, because we thought it sounded too much like "two factor authentication" which is computer geeky. Hopefully boring is preferable to computer geeky. Come share your plans with us inside the Security Dojo! You can sign up for notifications of new podcast episodes by clicking here. (This episode was retitled from "C...2024-03-1511 minSuper Simple Security PrinciplesSuper Simple Security Principles5. Sabotaging Your FriendsThere's something many of us do to sabotage our friends' efforts to stay safe. And our own. It's a sign that we aren't applying one of the key principles of online security. Listen now to learn what that key is and how to stop sabotaging your friends.  Make progress in your security journey by joining us inside the Security Dojo! You can sign up for notifications of new podcast episodes by clicking here. 2024-03-0812 minSuper Simple Security PrinciplesSuper Simple Security Principles4. Protection PartnersWhat is a protection partner and how can having one help you? It's a free strategy that anyone can use. It will give you an extra layer of security against many types of threats, but especially scams. Listen now to learn the details.  Once you're done, please join us inside the Security Dojo! You can sign up for notifications of new podcast episodes by clicking here. 2024-03-0112 minSuper Simple Security PrinciplesSuper Simple Security Principles3. When Passwords FailIn the first two episodes, we've talked about the many flaws of passwords. Please don't count on passwords to protect you. Instead, add a second layer of protection. Listen now to learn how. Then if you have questions, please come ask us inside the Security Dojo! You can sign up for notifications of new podcast episodes by clicking here. 2024-02-2308 minSuper Simple Security PrinciplesSuper Simple Security Principles2. How Hackers Guess Your PasswordsWhat's the best defense against any enemy? Understand how they think. Join us in this episode for a glimpse into the minds of hackers. But be warned: it might just inspire you to make some changes. We'd love to make that easy for you. So join us in the Security Dojo! If you want to see a victory reel for hackers, visit this news feed. You can sign up for notifications of new podcast episodes by clicking here.  2024-02-1709 minSuper Simple Security PrinciplesSuper Simple Security Principles1. Why We Hate PasswordsWe hate passwords, and so should you! They are the precarious foundation of modern security. Understanding the problem is the key to solving it. Listen now and start the journey. Then come learn more inside the IHP Academy! You can sign up for notifications of new podcast episodes by clicking here. If you are ready to level up your digital defenses, join us in the Security Dojo! 2024-02-0912 min