5 Tips for Personal Cybersecurity

Поделиться
HTML-код
  • Опубликовано: 26 май 2022
  • Join Atlas VPN by clicking the link below and get 3 years of VPN service for only $1.99 a month
    get.atlasvpn.com/McBeth
    Be sure to use code MCBETH when signing up to get your discount.
    Join the conversation:
    / discord
    Connect with me on Twitter:
    @ryanmcbeth
    A little bit of effort can greatly increase your cyber security. The five tips are:
    #1. Rename your phone to something generic.
    #2. Use a VPN, especially when using public networks.
    #3. Don't re-use passwords.
    #4. Use two form factor authentication (2FA) if available.
    #5. Create a machine of high trust.
  • НаукаНаука

Комментарии • 259

  • @xGolBLiiN
    @xGolBLiiN 2 года назад +116

    As someone in cyber security, I was really pleased to see a video on the topic from my go to war topic guy! Not only that but it was really well put for a laymen to understand which can be tough with topics like these.

    • @Quick209
      @Quick209 Год назад +4

      I have to agree. I found this channel during the start of this conflict and really like his analytical approach. Me being a Sr Network Engineer (title only, I do way beyond that), I was surprised to see cybersec stuff too. I was also surprised to see in one of his videos he did programing and from the snippet it looks like C#. Been coding in that for about 10-11 years. Been messing with Golang for the past 2 years. If he had time, it would be cool to see a side channel just talking about projects he is working on or what not to change it up if he feels he needs a change of pace sometime but still want to produce content. Code projects from a military minded individual. 🙂

  • @FarmerDrew
    @FarmerDrew 2 года назад +188

    See, I protect myself, by having extremely outdated equipment that is absolutely archaic and really the connections are so bad that it only works outside when it's raining.

    • @spaceuncharted3278
      @spaceuncharted3278 2 года назад +24

      And under a full moon. During a SpaceX launch. In the northern half of south Dakota. In the presence of somebody speaking German.

    • @datpudding5338
      @datpudding5338 2 года назад +6

      @@spaceuncharted3278 Hallihallo meine Freunde, wie läuft's mit eurer Internetverbindung?

    • @marijasingh8403
      @marijasingh8403 2 года назад +2

      Yeah, in our wg internet goes out when it rains. I can't figure out how why.

    • @hoej
      @hoej 2 года назад +3

      At work we skipped log4shell by using an obsolete version...

    • @thomasbrogan9102
      @thomasbrogan9102 2 года назад +1

      'Zactly

  • @Deks90
    @Deks90 2 года назад +44

    I have a cybersecurity tip for those that setup computers for your older parents or grandparents. On windows setup an admin account separate from their own account (set them as standard user). That way you block any unwanted installs and also reduce number of vulnerabilites that usually target privileged accounts (admin, power user..). I did this for my parents and stopped getting calls about strange things happening on their computer.

    • @hatsandboots
      @hatsandboots Год назад +1

      This is great advice and applies to any computer that supports multiple accounts (admin + standard) such as Windows, Mac, and Linux.
      Plus, it's a "set it and forget it" step. You probably want the admin user to have a different password than the standard user.

  • @charlestimko
    @charlestimko 2 года назад +44

    I came here to tear this video apart as a security professional. Nailed it, nice work. Thanks for actually talking about VPNs correctly.

    • @RyanMcBethProgramming
      @RyanMcBethProgramming  2 года назад +13

      Feel free to connect with me on LinkedIn. I am full of surprises.

    • @mandelorean6243
      @mandelorean6243 2 года назад +1

      What would one do to speak on vpns incorrectly¿

    • @sciloj
      @sciloj 2 года назад +1

      You still can tear it because even though most of these tips are usable, they apply to the minority of potential incidents while the majority comes from people unable to recognize phishing. And that's something to really focus on for a person who just starts figuring out personal information security. However, it involves learning to think critically and it's not something that could be covered by another "five rules".

    • @charlestimko
      @charlestimko 2 года назад

      @@mandelorean6243 the common one i see is the forever claim that VPNs are the be all end all solution to security. As Ryan properly clarified, they protect your traffic to the VPN provider, no further. One thing about all these new VPN providers is the question of should you trust them as your exit node. They know everything about you...at least all the metadata. As Ryan points out VPNs have a benefit for security on mobile devices that may connect to unsecured/untrustable networks to limit your monitoring or the ability for near peer attackers from performing "in-the-middle" attacks or traffic hijacking, but that assumes you have a preexisting relationship with a VPN provider BEFORE using the untrustable network. Some people don't trust their ISP or they have an issue with the ISP injecting ads. VPNs can help with this. VPNs have the same problem as tools like TOR have - you have to be able to trust your exit node from unmasking you or logging your data and selling it. Additionally, depending on how the VPN is setup it could expose your device more than it would be normally on a home network. VPN providers aren't required to implement firewall rules that protect you and with how the tunnel interface is setup on a host could (in combination with a poorly configured local host firewall) open up Windows services (like NetBIOS or SMB) up to the internet increasing your chances of compromise.
      I should also add that VPNs also cause problems for security professionals, especially when used from inside enterprise networks. They restrict indicators of compromise making InfoSec/NOC/SOCs job of defending the company network more difficult.

    • @philh1462
      @philh1462 2 года назад +3

      Yes, password manager and 2FA is absolutely top of the list. The VPN the WiFi thing is a bit overdone, basically everything uses SSL now, so sniffing stuff over WiFi is basically a list of urls. Not exactly the Crown Jewels.

  • @TonyVainosky
    @TonyVainosky 2 года назад +87

    Personal cybersecurity is something that should be taught in every school - even as just a semester - because I guarantee with the right teacher showing the right real world examples, it will stick with whoever is in that class for life. And they will therefore pass that knowledge on to others. Individual people are immense soft targets for hacking and need info like this to protect themselves

    • @mandelorean6243
      @mandelorean6243 2 года назад +6

      Math teacher I grade 7 taught us about w2's, w4's doing income taxes.
      Never will forget that.. FINALLY real world knowledge that we all guatanteed will need to do...
      ...too bad I don't remember anything from it..
      ..maybe I do but its just common knowledge to me now...
      Nothing else from any schooling sticks out like that

    • @sciloj
      @sciloj 2 года назад +4

      That's a low hanging fruit. Some studies show that teenagers do, in fact, know the rules of information security, but they don't give a shit about applying those rules since they see no significant reason for that. And convincing someone that something is important is a different story from teaching the rules.

    • @lslslslslslslsl1
      @lslslslslslslsl1 2 года назад +1

      It was taught in my school, just a guest speaker came in but it was boring as all hell and about half the people either didn't listen or just forgot whatever he said

    • @TonyVainosky
      @TonyVainosky 2 года назад +4

      @@lslslslslslslsl1 which is why it's important WHO is teaching

    • @nfrl-hs2ly
      @nfrl-hs2ly 2 года назад

      Which is funny because teachers and schools are the least secure institutions in the planet when it comes to cyber crime.

  • @Google_Does_Evil_Now
    @Google_Does_Evil_Now 2 года назад +9

    Good solid tips Ryan, thank you.
    My own tip: Lie on as many websites as you can. Don't use your real name, location, DOB, etc etc. Websites get hacked, I don't want hackers having my real info.
    And don't respond to data miners, those things that want you to respond such as "Your space alien name is the street name you live on, your mother's maiden name, the name of your first dog, your first car, etc". Those things are data miners that use social fun to get you to give up your data. This data is/was often used as security for websites.

  • @EvadingFate
    @EvadingFate 2 года назад +9

    Using a password manager is game changing and probably the best method to protect yourself.

    • @joachimfrank4134
      @joachimfrank4134 2 года назад +4

      A password manager is a big help for using different credentials for each site you use.

  • @apainintheaas
    @apainintheaas 2 года назад +23

    A password manager is imo an amazing tool to prevent reusing passwords without forgetting all of them. It really improved that situation a lot for me.
    My second tip is backups, backups, backups. Saves your ass from ransomware and losing all your family photos in a house fire. And backing up to a external hdd attached to your pc helps, but only a little, you're safest if you backup to something on a separate location, like cloud backup or using a nas at a separate location that you can connect to online.

    • @hatsandboots
      @hatsandboots Год назад +1

      I agree! Don't forget that there are a few key passwords that you want to commit to memory. Such as the master password for the password manager, your Windows account password, your Apple ID password. the passcode on your iPhone/iPad.
      Just a few, now!
      For aging people like me, it's actually fun to invent a long, strong passphrase ("Four score and seven years ago" or "O Captain, My Captain" or the phone number of your favorite pizza shop when you were a teen + the word "pepperoni pizza"). Every time you remember that passphrase you get a warm fuzzy feeling.
      I like deliberately mangling words. "Four score and severn years ago" or "O Caption, My Caption."

  • @fadetounforgiven
    @fadetounforgiven 2 года назад +12

    As someone who works as custom support at an ISP, this was a pretty good video on the subject. In my experience, it's mostly iPhones that have the name of their owner, I guess it's in its initial configuration setup (I've never used one).
    All this was quite reasonable and very well explained. Thank you!

    • @Martinit0
      @Martinit0 Год назад +1

      You guessed right. Same for macbooks.

  • @StevieCooper
    @StevieCooper 2 года назад +5

    I’m glad you’re getting sponsorships. Well worth their investment in you.

  • @georgemorley1029
    @georgemorley1029 2 года назад +8

    I’m happy to see I’m adhering to these tips. I commend them to everyone!

  • @Hyper_Fox06
    @Hyper_Fox06 2 года назад +6

    That was very good advice, wish more companies and govt agencies and institutions would be more vigilant and strict with their staffs digital security. I constantly facepalm when I hear the stories like took DOD laptop out of facility and forgot it on the metro 🤦😂

  • @soccrstar4
    @soccrstar4 2 года назад +8

    Very informative and fun video. Not enough kill rings. 3/10.

  • @RBASB10
    @RBASB10 Год назад +1

    Hi Ryan 👋 ,
    Why haven’t I found you Channel sooner than later?
    Basically, thank you so much for your intel. I found you to be extremely informative and direct.
    I have to subscribe to your channel and hit the notification button too.
    Have a great day and may God bless you.
    Your time and effort hasn’t gone unnoticed.

  • @braydonjones4046
    @braydonjones4046 2 года назад +2

    Thank you for making this video man people really need to know this stuff to stay safe. I know I learned somthing from this video and ill be sending it to my family thank u again.

  • @nothingvenured.nothinggain4589
    @nothingvenured.nothinggain4589 Год назад +2

    I also agree with your policy on e-mails. I have my own domain that I use to create a new e-mail for 'every' account I have. That will alert you if there has been a leak of your e-mail to someone in say a phishing attack. You can just quite literaly delete the e-mail address and move on. Also, use unique and different passwords for every site you sign up to; which you touched on too.

  • @Dan-fh6dd
    @Dan-fh6dd 2 года назад +8

    Hi Ryan, I'm a veteran student who is looking to get into the cyber security field. If you could make a video giving some tips on how to get into that field I would love to hear about it. Thanks!

    • @numericbin9983
      @numericbin9983 2 года назад +3

      That would be an interesting topic for sure.
      In the meantime, lookup for a SOC (service operation center, security operation center) or a NOC (network operation center). Tons of IT & security profiles in one all seing, all knowing service. A great place to start (or for an internship) if you don't know what branch of cybersecurity to get into.

  • @surfreadjumpsleep
    @surfreadjumpsleep 2 года назад +4

    I've been using computers for about 35 years and... these were some great tips that I had not thought of before! Yes it really does make sense to use a separate computer for banking stuff. Good idea!

    • @sciloj
      @sciloj 2 года назад +1

      What does not make sense is to use a Chromebook for that since it depends on Google's infrastructure too much.

    • @surfreadjumpsleep
      @surfreadjumpsleep 2 года назад +1

      @@sciloj The borg must grow.

  • @jkevinf5091
    @jkevinf5091 2 года назад +2

    VERY GOOD advice. Thank you very much. And, I really your tactical information. I was PA-33/S USAF 40+ years ago, public affairs. Didn’t have a tactical bone in my body. I’ve learned a lot from your channel.

  • @jackpippenstock1104
    @jackpippenstock1104 2 года назад +1

    Thank you for publishing this video.

  • @TheTurbanatore
    @TheTurbanatore 2 года назад +3

    Already loved your war videos, and love your general content as well. Keep it up boss!

  • @CC99IE
    @CC99IE 2 года назад

    You were right, I am really loving this.

  • @bettycrocker6692
    @bettycrocker6692 Год назад

    Preachin' the word, as always, RB!!

  • @drenk7
    @drenk7 Год назад

    Thanks Ryan for some great advice.

  • @opintensify
    @opintensify 2 года назад +2

    Enjoying this vid, as I'm studying Network Security on my own. Glad I now know some of the terminology. 👍

  • @bronwaith
    @bronwaith 2 года назад

    Thank you so much for this!

  • @kobyavery9408
    @kobyavery9408 2 года назад

    This is actually a remarkably good video, great job!

  • @r.isaaceltonsr.8051
    @r.isaaceltonsr.8051 2 года назад

    I love the knife hand.

  • @datpudding5338
    @datpudding5338 2 года назад +1

    I have my devices named as following:
    My phone is just called "Unbezahlter Praktikant" translating to "unpaid intern"
    My PC is called "Gehilfe" translating to "minion"
    My wifi network is called "Bärenhöhle" which is "bear cave" and my router is called "Höhleneingang" translating to "cave entrance"
    And I'm using a VPN provider for my phone to make it harder for sniffers.
    For passwords I use sentences and only utilise the first letter of each word while my language allows for somewhat irregular capital letters throughout the sentence. That mixed with some words turned into english and then modified to be written in leet it makes nice long random seeming passwords especially with correct interpunctuation.
    2FA is a given for any service providing the functionality
    Conclusion: I guess I'm fairly well prepared as my bank uses it's own 2FA, it's own login methods and it's internal mail and notification system. And my assigned NSA agent might be suicidal for me literally playing the same horrendously stupid songs for days on loop xD

  • @356mafia
    @356mafia 2 года назад +1

    Well done - I could watch another 10 episodes on this topic

  • @Setola
    @Setola 2 года назад

    the definition of an hashing algorithm you gave it's simply the best i've ever heard of. cheers!

  • @Anon11290
    @Anon11290 2 года назад

    Very helpful videos thanks!

  • @danielpirone8028
    @danielpirone8028 2 года назад

    Awesome - thanks for sharing!

  • @maddeusdoggeus1
    @maddeusdoggeus1 2 года назад

    Thank You!

  • @byne2347
    @byne2347 2 года назад

    best channel i've found this year, thanks for what you're doing, and thanks for the advice. nice haircut, too.

  • @davidodonovan1699
    @davidodonovan1699 2 года назад

    Thank you very much for this information

  • @mrbob581
    @mrbob581 2 года назад

    Dude! On fire 🔥, nice job 👍

  • @antonnurwald5700
    @antonnurwald5700 Год назад

    Actually I find these tips quite easy to follow and I was surprised that I already do like 2 or 3 of them. It's a big difference to what cyber-purist hacker characters tell you: step 1: write your own Linux based operating system. Step 2: only use the tor browser, never any apps. Step 3: never use visual surfaces or load pictures. Only type commands into a text editor. Step 4: store all digital devices in a fridge inside a nuclear bunker inside Mount Doom. Step 5: do all transactions on paper.

  • @Fuad_
    @Fuad_ 2 года назад

    Great video as always

  • @alvashoemaker8536
    @alvashoemaker8536 2 года назад +1

    Thank you so much for this; I’ll make sure my SF brother sees this; AND make sure he knows of YOUR site. AGAIN, THANK YOU!! 👍🏼👍🏼😃👣

  • @adman432
    @adman432 2 года назад

    Great video!

  • @BillPeschel
    @BillPeschel Год назад

    The first four are suggestions I use or don't worry about (no smartphone). But #5 (a separate computer / email for your financial transactions) is an awesome idea that I'll implement.

  • @moritzm.3671
    @moritzm.3671 2 года назад +3

    I totally understand your argument for a VPN but don't I then risk being spyed upon by the VPN provider?
    Or another questionn, you suggested a provider. How can I be sure that this one is good with my data?

    • @RyanMcBethProgramming
      @RyanMcBethProgramming  2 года назад +2

      Yes. You are at risk being spied on by the VPN provider. If I were a government, I would definitely set up a VPN in the Bahamas and advertise it so I can inspect everything going through my systems. When Atlas VPN reached out to me I did some research on them and I wouldn’t let them advertise with me if They weren’t solid.

  • @jamesconner1639
    @jamesconner1639 2 года назад

    Thanx Ryan, you're a cool Kat!
    Glad to have found your channel 😉😁

  • @acctsys
    @acctsys Год назад

    Thank you.

  • @qo2rj
    @qo2rj 2 года назад

    Really excellent presentation!

  • @jamesconner1639
    @jamesconner1639 2 года назад +1

    That potato analogy was good man lol

  • @strickpers
    @strickpers 2 года назад

    Thank you for the info, I was able to take advantage of the deal.

  • @ughnon
    @ughnon 2 года назад +4

    Thanks, Ryan, for the great information to help us all secure our online presence. All about the layers and and links in the chain to keep yourself secure.
    One question, what are your thoughts on password managers? Any suggestions on favorites or your thoughts on using them. ( for the record, I use one and really like it.)

  • @50PullUps
    @50PullUps 2 года назад +2

    Best software I ever started using was a password manager. All my passwords are super-complex strings at least 36 characters long.

  • @MichaelJenkins910
    @MichaelJenkins910 Год назад

    Great video, especially for folks who are relatively new to the notion of real cybersecurity. I appreciate how well you can break this down to actionable items.
    Also: DID YOU JUST KNIFE-HAND ME, MCBETH? ;)

  • @Mark-jr8gi
    @Mark-jr8gi 2 года назад +1

    Thanks Ryan, just got myself a VPN.

  • @pedroseoane
    @pedroseoane 2 года назад +2

    The problem is as with the PSD2 standard.... a lot of older people get angry when they have to put in two codes and end up calling you and they don't understand that the manager can't help you with that which is your responsibility. And it pisses them off to have to go through more effort like putting the fingerprint or opening a 2PA app for codes ... Hopefully over the years it will be normalised as you say it is a bit uncomfortable but it drastically improves security.

  • @drumset09
    @drumset09 2 года назад +1

    I would be concerned about banking information - but if someone wants to steal my negative balance, go for it! lol

  • @erwinrommel1989
    @erwinrommel1989 2 года назад

    I learned a lot from this.

  • @7983usmc
    @7983usmc Год назад

    Learn something new everyday!!!

  • @derinicktheseven477
    @derinicktheseven477 2 года назад +1

    Okay, everything but the VPN part was good. VPN is only necessary if your logging into stuff usually at an untrustworthy location or doing something shady/important. Other then that your just paying money for lag/slower connection. The password part is a big threat, people hardcore cross reference these days.

  • @mandelorean6243
    @mandelorean6243 2 года назад

    Good job, got us to click on an ad and watch for minuuttteeesss

  • @bipolartorecovery1485
    @bipolartorecovery1485 Год назад

    some of these elements are keys points of the comptia security+ certification. I'll be knocking that one out later this year. Thanks for rewording what i've studied

  • @Jaycren86
    @Jaycren86 Месяц назад

    Great video

  • @ReelVibes8
    @ReelVibes8 2 года назад +1

    Hey look an actually informative and interesting ad for a VPN. They struck gold with sponsoring you.

  • @jcaleca60
    @jcaleca60 2 года назад +1

    Great info and my dad was on Guadalcanal bronze star purple heart oak leaf Custer

  • @SurveyingStudy
    @SurveyingStudy 2 года назад

    Congrats on the sponsor!

  • @DERP_Squad
    @DERP_Squad 2 года назад +2

    Tip 6. Install your damn patches and updates already

  • @toshaville
    @toshaville 11 месяцев назад

    I'm glad you showed us the name. I genuinely thought you were saying *Alice vpn* until I saw it written down. 😂

  • @lonestar_iconoclast
    @lonestar_iconoclast Год назад

    Regarding passwords: I was told by someone within the cyber security community (and amateur, admittedly) that instead using a pass*word* I should use a pass*phrase.* I was told that this adds a layer of complexity to the hash process, making it more difficult, but not impossible, to illegally require my credentials. Might not be viable for older users, but it could save someone from getting there accounts cracked.

  • @memathews
    @memathews 2 года назад

    This video is probably the best consumer-understandable explanation I've seen on VPNs and password security. This includes the explanation on hashing and salting. I wish you had mentioned password managers and authenticators, but that would have raised the level of difficulty on understanding the great information you delivered. Thank you for doing this.

    • @RyanMcBethProgramming
      @RyanMcBethProgramming  2 года назад +1

      Thank you. I appreciate that.

    • @memathews
      @memathews 2 года назад

      @@RyanMcBethProgramming Maybe password managers and authenticators could beat follow-up video? (Been a network infrastructure product manager since the early 1990s. We need a better security understanding.)

    • @RyanMcBethProgramming
      @RyanMcBethProgramming  2 года назад +1

      @@memathews I could do one on that.

    • @memathews
      @memathews 2 года назад +1

      @@RyanMcBethProgramming It might be a good pairing, especially since you've already set up a storyline that could cover the dangers of aggregation across multiple accounts or through service consolidation into the big providers (Facebook, Google, Apple, etc.).
      Another subject few understand is that ALL data goes through the ISP, where it is recorded and some of it is analyzed by government bodies. Not to trigger paranoia at all 😉

  • @math6844
    @math6844 2 года назад +5

    Do you recommend password managers? They have helped me immensely as a way to never reuse passwords, but I do worry about having a single point of failure, albeit one with multi factor authentication from a trusted company.

  • @demos113
    @demos113 2 года назад

    Good info. 🙂

  • @waylandforge8704
    @waylandforge8704 Год назад

    This is why I subscribe

  • @AnonMedic
    @AnonMedic 2 года назад

    Never thought youd be using hak5 pineapple 🍍
    Love it

  • @RDSMailOrder
    @RDSMailOrder 2 года назад +5

    In your role as a Cybersec Pro, do you have a preference for either ISACA or ISC3, or which certification pathway would you recommend? Also, if you know much about the qualifications system in the UK, how would you go about seeking employment in the industry? I am an older student currently nearing gaining a qualification that is oriented towards 1st line tech support and I have studied CEH, CISA, CCNA and various CompTIA courses, without paying for and passing the actual expensive exams...

  • @BenjaminVestergaard
    @BenjaminVestergaard 2 года назад +1

    How about using a virtual private server as your VPN? Hook up your LAN router so all traffic takes a detour through that virtual machine... It'll not give you all the Netflix in the world, but it can give you an uncensored connection out of China.
    Anyway, I do miss the good old days when the internet was rather anonymous. What I don't miss is how I had to make do with 2mbps on ADSL.
    In other words, I've given up trying to hide, in return I got 1000 Mbps.
    Edit: not many places use MD5 hashes anymore, that's simply too easy to brute force, with dictionaries you have to be rather good at coming up with a password to make it difficult.
    Many years ago I was in a group of satellite hackers. Once we found a weakness in the algorithm, we could break several master keys a day... Of course that's not person to person damage, but the 6000 people we were, forced the broadcasters to go for SHA256. So I would claim I know how encryption works quite well, but I was just one of the small ones in that adventure. Pretty sure that the software we used was funded by the Russian mafia tho. There's always something to regret.
    Edit 2: I did learn a lot about encryption tho, so it's not all bad.
    Edit 3: you're very right about the last point tho. Keep a separate machine for your sensitive stuff. If you can't afford that, consider a virtual machine. Or do it even better and do everything else in a virtual machine.
    Isolating your sensitive info does work. If "I" manage to break into your physical machine, it would take a while before I figure out you have virtual machines. If you want to make it really fun, do it with an emulated Amiga or Atari ST. Just kidding, those machines hardly knew what encryption was.
    My own choice would be a Linux with the entire set of security stuff enabled in the kernel.. Full "harddisk" encryption and all, perhaps keeping the private key on a USB stick.. but as I said I've given up being anonymous.. I know it's possible, but I trade something in for convenience.

  • @kristofferjohansson3768
    @kristofferjohansson3768 2 года назад

    I like that you tier your computer usage, using another email and computer for financial transactions. A bit cumbersome but very secure.
    Another thing I would like to add is that in Windows you should create a dedicated administrator account on your pc and and make you normal user just a “user”. Never surf the internet as an administrator. I actually created another live account to use as admin, with its own yubikey, but that might be overkill.

  • @emossg
    @emossg 2 года назад +1

    2FA might feel inconvinient at first but once you start using it, and especially if you can use the push notifications it becomes second nature. You just unlock your phone and the code is there.

    • @KJMcLaws
      @KJMcLaws 2 года назад

      My only thing is for example, I lost my phone. The only way to find my phone is using the find my phone app on someone else's phone. I have to sign into my account which has the 2FA set to my phone. RIP. (I know I'm supposed to have those backup passwords in my wallet or something but it didn't help in the moment)

    • @emossg
      @emossg 2 года назад

      @@KJMcLaws Yeah, that is one downside to 2FA. When google authenticator was the most popular one offered by websites I remember what kind of hassle it was to change all of them to new phone. On some websites I had to use the backup master code to even be able to do it.

  • @johncbeer
    @johncbeer 2 года назад

    Well done tips. Just for anyone considering the Chromebook for this purpose, do NOT turn on sync, and even more, use a separate Google account.

    • @sciloj
      @sciloj 2 года назад

      Well, if someone needs those tips, they will not be able to set up a Chromebook by themselves to make it secure. If they can make it secure - they don't need these tips.

  • @DalgetyBayHypnotherapy
    @DalgetyBayHypnotherapy 2 года назад +1

    Good content, Ryan, but something went wrong with the visuals. On my Android Note 8 in landscape, the left half of the screen was a corner of the iPhone screen grab with "Sarah's iPhone 13" at the bottom. Your face is almost entirely obscured. In landscape, the only thing visible is the top part of the screen grab.

  • @crcrewso
    @crcrewso 2 года назад

    Wow. First?!
    Thank you! This is a video we all need.
    Signed, one weird programmer

  • @MojadoVIP
    @MojadoVIP 2 года назад

    Nice 👍

  • @the305hauler
    @the305hauler 2 года назад +1

    Booyah 👊🏽😁🇺🇸

  • @Drzedan272
    @Drzedan272 2 года назад +1

    "Litwo Ojczyzno moja ..." nice list of hash

  • @NA-lp2re
    @NA-lp2re 2 года назад

    If sms two factor is the only option a website offers, using a google voice number should reduce the risk of a sim swap attack. A password manager and Yubikey is great when available as an option.

  • @campbellkennedy9658
    @campbellkennedy9658 2 года назад

    Representing MoCo. I know that metro station very well

  • @WaterxDragon35
    @WaterxDragon35 2 года назад +3

    Two-factor authentication saved the majority of my accounts after a successful phishing scam on one of my coworkers.

  • @xdmztryvsvedine2773
    @xdmztryvsvedine2773 2 года назад

    Thank you for this. I need more info on this cuz the only thing I have on my devices is a vpn and Malwarebytes.

  • @ranevc
    @ranevc 2 года назад

    A grandpa used to say: “My passwords are protected by dementia.”

  • @ch3wyboy
    @ch3wyboy 2 года назад

    I’d say also get a password manager and use the complex randomly generated passwords to change every password you have

  • @dietricha.schmitz811
    @dietricha.schmitz811 2 года назад

    Potato>Hashbrown...you win the internet today sir.

  • @britlaker
    @britlaker 2 года назад +1

    I'll never look at potatoes in the same way again. Everytime I buy one I'll ask myself, is that potato secure.

  • @valdanowill
    @valdanowill 10 месяцев назад

    i bought the plan lets hope it makes a difference

  • @AnonMedic
    @AnonMedic 2 года назад

    Ive had two factor authorization save my google account. When my PW was compromised from a phis. My google account is linked to EVERYTHING important.

  • @louisebean9428
    @louisebean9428 Год назад +1

    Be aware!

  • @bladyzadek
    @bladyzadek 2 года назад

    # A. Mickiewicz # Pan Tadeusz. Nice

  • @adriandarcy-taylor6429
    @adriandarcy-taylor6429 2 года назад

    My phone's suitably ambiguous name is "Sleeper Service". Thank you Iain.

  • @angmori172
    @angmori172 Год назад

    I'm about to get a new computer specifically for work (well, studies). I'm going to use that as my financial station as well, like your chrome book. And I'll run Linux on it.

  • @caseyolson0369
    @caseyolson0369 2 года назад

    You had me at hashbrown.

  • @nelsonw2096
    @nelsonw2096 2 года назад

    Just changed my phone name. Thanks for the tips.

  • @coldandaloof7166
    @coldandaloof7166 Год назад

    I'm older, I just can't get my head wrapped around this crap or even find it remotely interesting. I just want the EMP to hit and level the playing field for me lol. I don't know how you deal with that crap every day. I have a VPN at work and have to use a computer there but hate that it has been creeping into everything in my life at home and need to learn more about it. Even my old Ham radio stuff has computer signals all through the bands now. Thanks for the info.

  • @QALibrary
    @QALibrary 2 года назад +1

    3:32 I got exposed via someone running a club/website from a home PC and when the person just sold the PC and someone took all the data off the hard drive etc

  • @TommyShlong
    @TommyShlong 2 года назад

    Good info, thanks!
    When using a VPN at Starbucks, many times I can't get access to sites. Any suggestions?
    Is there a way to detect of someone is trying use "man in the middle" hack?
    For the secure laptop (or any PC), what antivirus/antimalware software do you recommend?

    • @RyanMcBethProgramming
      @RyanMcBethProgramming  2 года назад

      With some companies like Starbucks, you need to sign in without the VPN, then use the VPN.
      In general, there is no way of detecting a MITM attack, although you can detect is the fingerprint is correct here : www.grc.com/fingerprints.htm
      Honestly, I think Windows Defender is good enough unless you are talking corporate use.