Protect Your Login https://protectyourlogin.com Protect Your Login Blog Sat, 20 May 2017 15:23:57 +0000 en-US hourly 1 This podcast will cover the material discussed in my book &quot;The Hackers Are Coming... How-To Safely Surf The Internet. Since new developments in the area of password protection and two factor authentication are coming out all the time, these will be discussed in upcoming episodes.<br /> <br /> Ask yourself this question - Would you rather spend a few minutes making your accounts safer now or spending a lot of money fix the problem after it has occurred ? There is always more than one way to protect a login and we will cover these as time permits. Protect Your Login clean Protect Your Login ron.nutter@networkref.com ron.nutter@networkref.com (Protect Your Login) Stop Identity Theft before it Starts Protect Your Login https://protectyourlogin.com/wp-content/uploads/2016/06/Protect-Your-Login-Artwork-iTunes-3000.jpg https://protectyourlogin.com ron.nutter@networkref.com TV-G Protect Your Login – Episode 5 – Document Your Existing Accounts https://protectyourlogin.com/protect-login-episode-5/ Mon, 04 Jul 2016 22:33:49 +0000 http://protectyourlogin.com/?p=217 https://protectyourlogin.com/protect-login-episode-5/#respond https://protectyourlogin.com/protect-login-episode-5/feed/ 0 <p>The next step in adding the next layer of protection on your login accounts is to make sure you put together a complete list of all your login accounts. This is something that you may not get done on the first pass. The first pass would be to write down all of the accounts you […]</p> <p>The post <a rel="nofollow" href="https://protectyourlogin.com/protect-login-episode-5/">Protect Your Login – Episode 5 – Document Your Existing Accounts</a> appeared first on <a rel="nofollow" href="https://protectyourlogin.com">Protect Your Login</a>.</p> combination dialThe next step in adding the next layer of protection on your login accounts is to make sure you put together a complete list of all your login accounts. This is something that you may not get done on the first pass. The first pass would be to write down all of the accounts you can think of. The information you should put together will be the website/service name, URL (Uniform Resource Locator) or website address, your login account name, password. Once you have written all of this down, then take a look at your browser history to see what sites you have visited lately. This will help identify additional sites that you have missed when you were working from memory. If you have used the browser’s ability to remember login names and passwords of sites you visit, this is another way to make sure your list of sites is as comprehensive as possible.

As you build your list of login accounts, this would be a good to take stock of what additional protection mechanisms that the websites you use offer. This could be implementing security questions on your account. Some websites use this as a safeguard where you are prompted with a question when you are going through a password reset process when you can’t login to an account with the password you think is the right one for this account. Another option to look at is using some type of token or other access system where you are texted a series of number that change every 30 seconds or you provide those numbers from an application that is supported by the website you are trying to login to. While you wont be implementing additional protection at this point, knowing what options each website supports will help you decide what options that you will want to think about implementing. Since not all sites will support the same options, knowing what your options are will help minimize the number of different options that you will need to use.

There is no one way that you have to get all of this information written down. You can start with nothing more than a notepad and pen. I have created a workbook that is a companion to my book “The Hackers Are Coming…”. I have a series of forms that walk you through this process and helps with adding additional levels of protection depending on what each site supports. Documenting all of your accounts has another benefit. Having this information in one place will help make sure someone of your choosing can close all of your accounts when that time comes. There isn’t any easy way to say this but this is the first generation where this type of record keeping will be important.

Zuesgard – Link
Zuesgard Wifi – Link

HackerBook3DTo learn how to protect your other social media and login accounts, purchase a copy of my book “The Hackers Are Coming… How-To Safely Surf The Internet“. This book covers how to protect your other online accounts to make it as difficult as possible for someone to hack into your account.

The post Protect Your Login – Episode 5 – Document Your Existing Accounts appeared first on Protect Your Login.

]]>
The next step in adding the next layer of protection on your login accounts is to make sure you put together a complete list of all your login accounts. This is something that you may not get done on the first pass. The next step in adding the next layer of protection on your login accounts is to make sure you put together a complete list of all your login accounts. This is something that you may not get done on the first pass. The first pass would be to write down all of the accounts you […] Protect Your Login clean 12:23
Podcast – Episode 4 – 3 steps to protecting your accounts https://protectyourlogin.com/protect-login-podcast-episode-4-3-steps-protecting-accounts/ Sun, 26 Jun 2016 22:11:43 +0000 http://protectyourlogin.com/?p=184 https://protectyourlogin.com/protect-login-podcast-episode-4-3-steps-protecting-accounts/#respond https://protectyourlogin.com/protect-login-podcast-episode-4-3-steps-protecting-accounts/feed/ 0 <p>Hardly a day passes without some type of news story where some online service suffers an account vulnerability comes out. For the longest time, I tried to keep all of my login account information in my head or written down in a “safe” place that I could always find. With more and more online services […]</p> <p>The post <a rel="nofollow" href="https://protectyourlogin.com/protect-login-podcast-episode-4-3-steps-protecting-accounts/">Podcast – Episode 4 – 3 steps to protecting your accounts</a> appeared first on <a rel="nofollow" href="https://protectyourlogin.com">Protect Your Login</a>.</p> online accountHardly a day passes without some type of news story where some online service suffers an account vulnerability comes out. For the longest time, I tried to keep all of my login account information in my head or written down in a “safe” place that I could always find. With more and more online services coming out each day, it doesn’t take long for that to become an unmanageable situation. The good news is that there is a variety of tools available to help you get that done. Remember the old catalogs in the days before the internet when you would have three choices for a particular situation – good, better and best ? In this podcast, we will start building the foundation at the good level.

1) Use a password manager application to manage your online account access

There are a variety of applications available to day to fill this need. The more accounts you have, the more important it becomes to be able to have a safe,secure copy of the information available to you whenever it is needed. A good password manager app can also help in keep track of other items such as combination codes for safes, contact information for a credit card company, the security code on your cellular phone account, and a host of other possibilities. A good password app should also be able to adapt to the way you need it to work instead of your having to change the way you do things. A good example of this is with more online sites using security questions and answers to protect your account from unauthorized password changes or as an additional layer of security when trying to login to an account, it is a good idea to have the questions used by the site and the answers you provided be recorded with the account login information.

2) Use a Strong Unique password on each account

If you can do only one thing when you start the process of increasing the safety of your online accounts, using a strong, unique password is a good first step. In a previous post on my blog, I went over the list of commonly used passwords. Another type of password that you should refrain from using is one that is the name of a sports team or type of sport. Passwords like the ones I just mentioned can make up part of what is called a dictionary attack. The tools used for this type of account attack use a list of word that usually come from a dictionary attack. While the easiest to remember, they are just as easy to guess.

In future episodes, I will go over tools that will help you come up with passwords that are difficult enough to guess that it will take more sophisticated tools and even more time in an attempt to be able to guess the password for each account. Best practice for a website or online service should a provide for the disabling of an account, either for a period of time or permanently thereby requiring contact with support to get the account re-enabled. Not every site does this. There is a cost to the site owner to do this as they need to have a manual or automated way of re-enabling an account.

Here is the danger in using the same password on more than one site. If your password is correctly guessed on one site or online service, it goes to the top of the list to be tried at other sites or online services. By using a unique password, you force the would be attacker/hacker to start their process over from the beginning since they dont know what type of password you may have used on the next site they try. When you can using numbers and punctuation in a password you start to dramatically increase the amount of effort required to correctly guess a password.

3) Use a Unique login name on each account

While not as important as using an unique password on each account, using a different login name is another way of increasing the level of difficulty in correctly guessing the correct information to access an account. Some sites are already forcing you to do something similar to this by requiring one or more numbers be a part of the login name. Some sites will only allow you to use an email address as the login name. In that case, you still have an option, depending on what service you are use to host your email. It is not unusual to have one or more “aliases” that can be assigned to an existing account. This allows you to have more than one email account but still have all the emails go into the same account.

No solution can guarantee you that an account won’t be broken into at some point. With enough time and effort, just about any account can be broken into. The trick is to put enough steps in place to make the process take long enough that the efforts being spent to break into your account will be high enough to encourage the attacker to move onto easier targets.

HackerBook3DTo learn how to protect your other social media and login accounts, purchase a copy of my book “The Hackers Are Coming… How-To Safely Surf The Internet“. This book covers how to protect your other online accounts to make it as difficult as possible for someone to hack into your account.

The post Podcast – Episode 4 – 3 steps to protecting your accounts appeared first on Protect Your Login.

]]>
Hardly a day passes without some type of news story where some online service suffers an account vulnerability comes out. For the longest time, I tried to keep all of my login account information in my head or written down in a “safe” place that I coul... Hardly a day passes without some type of news story where some online service suffers an account vulnerability comes out. For the longest time, I tried to keep all of my login account information in my head or written down in a “safe” place that I could always find. With more and more online services […] Protect Your Login clean 11:18
Protect Your Login Podcast – Episode 3 – Choosing a Firewall https://protectyourlogin.com/protect-login-podcast-episode-3-choosing-firewall/ Sun, 19 Jun 2016 21:34:54 +0000 http://protectyourlogin.com/?p=100 https://protectyourlogin.com/protect-login-podcast-episode-3-choosing-firewall/#respond https://protectyourlogin.com/protect-login-podcast-episode-3-choosing-firewall/feed/ 0 <p>Having a firewall, either on your laptop and/or your home network is part of the protection process to help keep your accounts safe. The hardware it is for someone to get into your computer adds another layer of protection to them being able to harvest information that will let them into some or all of […]</p> <p>The post <a rel="nofollow" href="https://protectyourlogin.com/protect-login-podcast-episode-3-choosing-firewall/">Protect Your Login Podcast – Episode 3 – Choosing a Firewall</a> appeared first on <a rel="nofollow" href="https://protectyourlogin.com">Protect Your Login</a>.</p> firewall-29940__180Having a firewall, either on your laptop and/or your home network is part of the protection process to help keep your accounts safe. The hardware it is for someone to get into your computer adds another layer of protection to them being able to harvest information that will let them into some or all of your accounts. There are three types of firewalls that I will talk about – OS Firewall, Software Firewall and Hardware Firewall.

OS Firewall

    – This is also known as an operating system firewall.  It is the one included by the vendor that wrote the operating system (Windows, Mac, Linux, etc) that you are using.  It is better than nothing and may have some ability to adjusted to fit your needs.

Software Firewall – This is a category that everyone should be familiar with.  There are a variety of vendors in this space – McAfee, Norton, Zone Alarm and BitDefender to mention just a few of the options.  For those that are running linux, you already have a built in option known as Iptables that is an additional option for you.

Hardware Firewall – This is another area where there are quite a few vendors to choose from.  Depending on your career field, you may bring one of the commercial solutions from companies such as Cisco and Juniper into this role.  There are a host of other companies that already have a presence in this category – Ubiquiti, D-Link, ZyXEL, Linksys and others.

You should have at least one firewall in use at all times. While the firewall function that comes with Windows or Mac is ok, there are better options. Look at it this way, since the firewall function is being written by the same company that is writing the base operating system, just to add a layer of protection, wouldn’t a firewall from a 3rd party serve you better since their whole business rides on producing a good product that is the only thing they produce ? Don’t get me wrong, this is better than nothing when you don’t have an option but I want the level of difficulty raised as high as it can be for unwelcome visitors.

That leaves us with the 2nd and 3rd categories, software and hardware firewalls. Using a software firewall is the next logical choice. The trade off is that a software firewall only protects the device that it is installed on. Since the average person usually carries a smart phone and/or tablet with them. You are potentially looking at managing multiple firewalls from multiple vendors. I am not trying scare you, just laying out the facts. You may decide that devices such as smartphones or tablets don’t warrant a firewall component beyond what the vendor provides at the time of purchase.

HackerBook3DTo learn how to protect your other social media and login accounts, purchase a copy of my book “The Hackers Are Coming… How-To Safely Surf The Internet“. This book covers how to protect your other online accounts to make it as difficult as possible for someone to hack into your account.

The post Protect Your Login Podcast – Episode 3 – Choosing a Firewall appeared first on Protect Your Login.

]]>
Having a firewall, either on your laptop and/or your home network is part of the protection process to help keep your accounts safe. The hardware it is for someone to get into your computer adds another layer of protection to them being able to harvest... Having a firewall, either on your laptop and/or your home network is part of the protection process to help keep your accounts safe. The hardware it is for someone to get into your computer adds another layer of protection to them being able to harvest information that will let them into some or all of […] Protect Your Login clean 10:20
Protect Your Login Podcast – Episode 2 – Getting Started https://protectyourlogin.com/protect-login-podcast-episode-2-getting-started/ Tue, 14 Jun 2016 00:19:38 +0000 http://protectyourlogin.com/?p=94 https://protectyourlogin.com/protect-login-podcast-episode-2-getting-started/#respond https://protectyourlogin.com/protect-login-podcast-episode-2-getting-started/feed/ 0 <p>Before we can get started, we first need a basis to get started from. A previous post on ProtectYourLogin.com gives an abbreviated list of commonly use passwords that make your account an easy target for even the most basic of hacking attempts. Other commonly use words/phrases like the name of your favorite sports team (i.e. […]</p> <p>The post <a rel="nofollow" href="https://protectyourlogin.com/protect-login-podcast-episode-2-getting-started/">Protect Your Login Podcast – Episode 2 – Getting Started</a> appeared first on <a rel="nofollow" href="https://protectyourlogin.com">Protect Your Login</a>.</p> password graphicBefore we can get started, we first need a basis to get started from. A previous post on ProtectYourLogin.com gives an abbreviated list of commonly use passwords that make your account an easy target for even the most basic of hacking attempts. Other commonly use words/phrases like the name of your favorite sports team (i.e. Chiefs, Cardinals, etc) or type of sport can make your account easy to break into. It is unfortunate but in today’s world you have to go on the offensive and automatically assume that some time into going to try to get into your account. The key takeaway here is to be proactive on what you do, so you will have to spend less time in fixing the problem after it has occurred.

This may not seem like a big deal but with more websites offering the “convenience” of storing your credit card information in your profile, that increases the importance of having a good strong password. Before I get too far, let’s explain what a “strong” password is. This is generally a password that has both upper and lower case letters, at least one or two numbers and depending on the website, using one or more punctuation characters/symbols. It is generally accepted that a good password should be at least 8 characters in length. The longer the password the better. That comes with a trade-off. The longer the password is the more careful that you will need to be with entering it correctly. It is becoming more common with websites to automatically lock an account for a period of time after a certain number of password attempts or disable the account all together and make you call in to get the account reactivated. Having a good, strong password is just the beginning. One of the common hacks tried is that once a password has been identified, that is one of the first things that will be tried on another site. So if you use the same password on more than one site, the hackers job of getting into another account has just been made easier.

In coming episodes of this podcast, we will look at tools such as password managers to help with keeping your online accounts all in one place. This will also help in using unique passwords on each site. I am just as guilty as anyone else in using a unique password on every site. This is one area where password managers can help you come up with a difficult to guess password since they either have the function built in to do this or there are a variety of 3rd party apps written to do nothing but this.

There are also new method being developed to make it harder to get into an account. Those will also be looked at in future episodes. Some of the best options to protect your account are here today and are either free or very affordable to use. Others are in discussed or early proof of concept stage. If you see something that you would like to know about, reach out to me and I will see what I can come up with for use on a future podcast.

——

LinkedInThe second part of this episode is how to protect your LinkedIn account in as little as three steps. This is one of the first sites where we talk about something called Two Factor Authentication to increase the protection of your login account.

HackerBook3DTo learn how to protect your other social media and login accounts, please purchase a copy of my book “The Hackers Are Coming… How-To Safely Surf The Internet”. This book covers how to protect your other online accounts to make it as difficult as possible for someone to hack into your account.

The post Protect Your Login Podcast – Episode 2 – Getting Started appeared first on Protect Your Login.

]]>
Before we can get started, we first need a basis to get started from. A previous post on ProtectYourLogin.com gives an abbreviated list of commonly use passwords that make your account an easy target for even the most basic of hacking attempts. Before we can get started, we first need a basis to get started from. A previous post on ProtectYourLogin.com gives an abbreviated list of commonly use passwords that make your account an easy target for even the most basic of hacking attempts. Other commonly use words/phrases like the name of your favorite sports team (i.e. […] Protect Your Login clean 11:59
Protect Your Login Podcast – Episode 1 – Inaugural Show https://protectyourlogin.com/protect-login-podcast-episode-1-inaugural-show/ Sun, 05 Jun 2016 22:56:17 +0000 http://protectyourlogin.com/?p=57 https://protectyourlogin.com/protect-login-podcast-episode-1-inaugural-show/#respond https://protectyourlogin.com/protect-login-podcast-episode-1-inaugural-show/feed/ 0 <p>Welcome to Episode 1 of the Protect Your Login podcast. This will be taking material from my recently released book “The Hackers Are Coming… How-To Safely Surf The Internet and combining that with new information that is being released all the time. There are several basic steps that we can all take to keep our […]</p> <p>The post <a rel="nofollow" href="https://protectyourlogin.com/protect-login-podcast-episode-1-inaugural-show/">Protect Your Login Podcast – Episode 1 – Inaugural Show</a> appeared first on <a rel="nofollow" href="https://protectyourlogin.com">Protect Your Login</a>.</p> Welcome to Episode 1 of the Protect Your Login podcast. This will be taking material from my recently released book “The Hackers Are Coming… How-To Safely Surf The Internet and combining that with new information that is being released all the time. There are several basic steps that we can all take to keep our accounts safe and make them harder for others to get into.

Ask yourself this question – would you rather spend a few minutes and a little bit of money now making your accounts safer from being taken over or would you rather spend a lot of time and unknown amounts of money cleaning up the problem after it has happened ? That is a question that only you can answer.

We will be looking at all sorts of options and ways to protect your accounts. The beauty of what we will be covering is that you don’t have to do it all at once. You can gradually increase the protection on your accounts as you increase your understand of the options and find out what will work best for you.

Anytime that you have a question or have something that you would like for me to cover on a future episode, please reach out to me. The more I know what to cover, the better I can made the show for you and help everyone in the process get to the best solution for their particular situation. There is noe one right way to implement increased protection for your accounts. The main thing is to start work on that today.

Initially the podcast will be available directly from this site. I am working on getting listed on both iTunes and the Google Play Store. Thanks for your time in listening to the show and helping me help you make your accounts safer.

The post Protect Your Login Podcast – Episode 1 – Inaugural Show appeared first on Protect Your Login.

]]>
Welcome to Episode 1 of the Protect Your Login podcast. This will be taking material from my recently released book “The Hackers Are Coming… How-To Safely Surf The Internet and combining that with new information that is being released all the time. Welcome to Episode 1 of the Protect Your Login podcast. This will be taking material from my recently released book “The Hackers Are Coming… How-To Safely Surf The Internet and combining that with new information that is being released all the time. There are several basic steps that we can all take to keep our […] Protect Your Login clean 4:04