Is Someone Else Using My Microsoft – Apple – Google – Facebook Account ?

Microsoft , Google , Facebook , Apple all can show you where and what devices you are signed into.

Why is this a great thing ?

Well if you are having issues with your account and wonder if someone else has access to your account ( they may know your password).

Continue Reading

Is Someone Else Using My Microsoft Account ?

Do you have a Microsoft account , Hotmail account or Outlook.com ( the online email account service from Microsoft) and wonder if someone else has access to your account ( they may know your password). First log onto your Microsoft account at Microsoft Account Then look for your Recent Activity Page If you notice that you are logged on somewhere where you are not , then it is time to examine your security settings. Change passwords Turn on 2 factor authentication – you should do this anyway – give Microsoft your mobile phone number it will keep you secure. 

Continue Reading

Experts Vs Non – Experts Top 5 Security Practises

Google asked two groups—experts and non-experts—what they do to stay safe online. The non-experts provided some good answers (like using antivirus software), the experts placed certain items as much higher priority, as shown in the graphic. The experts prioritised keeping your software up to date, and using two-factor authentication, two things that did not appear on the non-experts’ list. Most importantly, however, the experts noted that strong passwords aren’t enough: you also need to use a different one for every account you have, which means you probably also need a password manager to keep them all straight. More information can be found here :New research – Comparing how security experts and non-experts stay safe online

Continue Reading

The One Setting On Your Mac You Should Make Sure You Have On

If you are running a Mac whether laptop or desktop there is one setting you should make sure is turned on and not altered  Open up Security & Privacy in System Preferences and in the General tab make sure that Allow apps downloaded from is set to Mac App Store or  Mac App Store and identified developers  This will ensure that apps or software from unidentified developers or software that may try to download from unidentified sources will not be installed UNLESS you change the setting. This will keep you safe.

Continue Reading

Quicktime For Windows – It Is Time To Go

Quicktime will be on many peoples Windows computers as it is usually installed as part of iTunes , however Apple will no longer be supporting it. This means it becomes a security issue for Windows users , which is so serious that the US government want you to uninstall it.  Apple Ends Support For Quicktime For Windows “Computer systems running unsupported software are exposed to elevated cybersecurity dangers, such as increased risks of malicious attacks or electronic data loss. Exploitation of QuickTime for Windows vulnerabilities could allow remote attackers to take control of affected systems.” — https://www.us-cert.gov/ncas/alerts/TA16-105A So how do you uninstall it ? Go into the Control Panel – Programs and features – then locate Quicktime , then uninstall.

Continue Reading

5 Tips To Start The Year

Turn on two-step verification: This means giving Microsoft , Google your mobile phone number .This will make it harder for “hackers” to access your account even if they guess your password because if they try to sign in on a device Microsoft or Google doesn’t recognize, they’ll be asked for an extra security code (which you can get from a special app on your phone, sent to a different email address or via SMS text message). Use a strong password and change it often: Make sure your password contains a mix of letters, numbers and symbols, isn’t a complete word and is different than the password you use on other sites. Be sure to change your password often. Watch for suspicious activity on your account: The “Recent Activity” page on your Microsoft Account shows recent sign-ins and changes to your account, and allows you to let Microsoft know if you… Read More

Continue Reading

Overwhelmed By Spam – Here Are Some Tactics To Help

v:* {behavior:url(#default#VML);} o:* {behavior:url(#default#VML);} w:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:””; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-ansi-language:EN-US;}v:* {behavior:url(#default#VML);} o:* {behavior:url(#default#VML);} w:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:””; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-ansi-language:EN-US;} Spam – We Will Give You Some Strategies To Handle It Anonymous, mass-mailed, unsolicited messages are an inbox blight that are difficult to escape. It’s a battle as over 70% of all sent emails are spam. 1.     Don’t Unsubscribe Your first instinct is to click the little unsubscribe button that’s hidden at the bottom of your email subscriptions and most spam messages. All it does… Read More

Continue Reading