Approved MFA Apps Security Checkpoint

QR Code Icon

Security Checkpoint Approved MFA will show you which Apps to use and why to avoid all the others. The best ones are for free, or at least no additional costs so never pay someone for one of these Apps!

Approved MFA Apps (with links)

Too Many Choices?

However if that’s overwhelming, let’s make this easy. If you use Microsoft 365, Outlook, or Exchange for email like most of our clients do you should use the Microsoft Authenticator App.

Conversely, do you use Gmail for you email provider or Google Workspaces? Try the Google Authenticator.

If your business are our clients you probably already have Bitwarden and we encourage you to use that. If not use the link above to contact us to get started.

Finally are you a solo entrepreneur, individual, or not a decision maker at your company? Get started with Twilio Authy. Our founder Alan uses it all the time for work and personal accounts and it’s 100% free and great to use.

Security Checkpoint Approved MFA

QR Code Icon Security Checkpoint Approved MFA

Security Checkpoint Approved MFA is from a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. Start practicing great security and privacy practices now. Follow along as Alan goes through his digital life and cleans up data and access.

Indeed do you need help with your company’s cyber security? Contact us now to see how we can help!

Did we improve your digital security and privacy? Please like, subscribe, and click the YouTube bell. Immediately you’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Google Authenticator

QR Code Icon

Security Checkpoint Google Authenticator App: Join us as we bolster security in our Google Account using MFA and an Authenticator App. We prefer and demonstrate Authy, but you’re welcomed to use the official Google Authenticator or another trusted app like Microsoft Authenticator or Cisco Duo.

Security Checkpoint Google Passkeys

QR Code Icon Security Checkpoint

Security Checkpoint shows you how to setup a Google Authenticator App for better security on your account. It’s quick and easy, so why not join us?

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Google Passkeys

Passkey icon

Security Checkpoint Google Passkeys get us all one step closer to our goal from earlier this year to have secure simple sign ins.

Security Checkpoint Google Passkeys

Annoyed by passwords? Yeah we are too. What if I told you there’s already something better. It’s both more secure and easier to use? What is this magic? Simple, they’re called Passkeys and we highly recommend you use them with your Google account as we show here.

Passkey icon

How is this even possible? Well you can see what we said earlier this year about Passkeys, or go right to the source who’s developing them.

In short, Passkeys use your computer or smartphone device’s built-in security along with a biometric face or touch scan to make more secure multifactor authentication. So forget reusing your pet Fluffy’s name to protect important data. You weren’t still doing that right? Right?

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Google 2SV

google in playstore

Enable Google 2SV for Multifactor Authentication

Security Checkpoint Google 2SV can be enable for proactive protection on your Google account.

Google’s 2 Step Verification or Multifactor Authentication adds another layer of security to your Google account that will prevent more hacking attempts than simply using a password.

As we covered previously, authentication is proving you are who you say you are. Therefore, doing it several ways gives us a higher degree of confidence it’s actually you not some unauthorized punk snooping around.

Like other authentication systems it can be: something you know, something you have, or something you are. In the case of Google 2SV we are using a password (something you know) and a smartphone authenticator app or yubikey (something you have).

Security Checkpoint Google 2SV

google search engine on screen
Photo by Sarah Blocksidge on Pexels.com

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Google Enhanced Safe Browsing

google search engine on screen

Enable Google Enhanced Safe Browsing

Security Checkpoint Google Enhanced Safe Browsing can be enable for proactive protection when using Google Chrome or Gmail. Sounds good to us! Be aware that you are trading some privacy for the extra protection though. If you want the official terms and conditions see Google’s page here.

With that awareness this is a great time to remind you of a website called Terms of Service; Didn’t Read or tosdr.org. You can see their entry on Google Chrome. Before you get outraged at their “D” grade ranking be mindful that most commonly used services or technologies get an “E” ranking.

If you’re still concerned about privacy and think twice about using Google Chrome, you can use Brave Browser (which is based on the same underlying technology) and respects your privacy to the tune of a grade “B” on tosdr. Firefox also has a “B” grade and if you’re feeling really nerdy or adventurous you can get a modified version called Waterfox that has an “A” rating!

However if you still want to use Google Chrome and don’t mind sharing a bit more of your data and browsing with Google then Enhanced Safe Browsing is a great way to bolster your security!

google search engine on screen
Photo by Sarah Blocksidge on Pexels.com

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Google Session Security

iphone smartphone app i os

Using Google Session Security Checkup

Security Checkpoint Google Session Security shows us the importance of managing sessions on our digital accounts. Many people have a Google account for work or their personal lives.

Services like Google make things more convenient to you by allowing you to stay logged in longer. Because usability is fundamentally at odds with security this convenience can leave you vulnerable. Fortunately Google also makes it super easy to see and fix by signing out old sessions.

Remember: “When in doubt, log out.”

google search engine on screen
Photo by Sarah Blocksidge on Pexels.com

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint MultiFactor Authentication

close up of fingerprints on white background

What is MultiFactor Authentication and why use it?

Security Checkpoint Multifactor Authentication: easier to use than to abuse. According to some researchers as many as 73% of businesses don’t enforce Multifactor Authentication. Why use MFA and what is authentication anyways? Watch this video to learn and see why it’s worth investing a little time to add this to your work routine to keep many hackers out before they even get started.

Security Checkpoint MultiFactor Authentication image close up of fingerprints on white background
Photo by Towfiqu barbhuiya on Pexels.com

If this helped you out contact us to say thanks! You can also subscribe to our channel on YouTube to get some more tips you can’t afford to miss!

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Social Break Digital Business Cards

QR Code Icon

Security Checkpoint: Social Break

Ever run out of business cards right before meeting a really important contact? Still waiting on your company or printer to get your business cards ready? Want to have a business contact card ready to hand out to anyone at anytime? Of course you do!

QR Code Icon

This video shows you how to make a digital business card with a QR code that you can download to your smartphone and share with anyone to scan.

So the next time we meet at a social event you can share your business and contact info with me. No more excuses!

What you need to set up your digital business card

  • Your contact info on a webpage. This can be your personal or business website, LinkedIn page, facebook page, instagram, or digital business card.
  • A web browser that can generate the QR Code: We’ve tested Brave Browser (shown in video), Google Chrome, and Microsoft Edge. Others may work but we can’t verify that, so if you have a problem try one of those.
  • Be sure to download the QR Code image to your phone so it’s easy to show it off to new people you meet and share your contact info.

If this helped you out while socializing or marketing contact us to say thanks! You can also subscribe to our channel on YouTube to get some more tips you can’t afford to miss!

Be sure that you have the rights and consent to any information you are sharing. If it’s your company you might want to ask your manager or HR to make sure you are sharing public info. If you have your own company or want to promote yourself, make sure the info you are sharing is all available to the public and you’re comfortable sharing it in the first place. A little preparation and respect goes a long way to help everyone’s privacy and security.

Your friendly digital neighbor at Oak City IT

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Data Backups UrBackup

UrBackup Icon

Data Backups with UrBackup on Windows

Security Checkpoint is back with data backups in UrBackup! Data backups are an important part of your digital security plan. Don’t do them yet? That’s exactly why we use built-in tools or free open-source tools to make sure that everyone can set these up. You can’t afford to miss doing these. But like a lot of things, you or your company’s needs may vary so contact us to get setup on a plan that works for all your people and systems!

UrBackup Icon

In this example we show you a Network Attached Storage (NAS) where we sync all our data. If it’s just you and your PC Windows Backup works fine with an external Hard Drive which you can pickup affordably enough. We recommend a drive with capacity at least twice the capacity of your PC. For example if you have a PC with 256GB storage space get a drive with at least 512 GB storage space. Since you can use spinning hard drives that cost less you can certainly buy larger storage and use that.

But don’t take our word for it, check UrBackup’s official documentation.

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Data Backups Time Machine

Apple Time Machine Icon

Data Backups with Time Machine on macOS

Security Checkpoint is back with data backups in Time Machine! Data backups are an important part of your digital security plan. Don’t do them yet? That’s exactly why we use built-in tools or free open-source tools to make sure that everyone can set these up. You can’t afford to miss doing these. But like a lot of things, you or your company’s needs may vary so contact us to get setup on a plan that works for all your people and systems!

Apple macOS Time Machine Icon

In this example we show you a Network Attached Storage (NAS) where we sync all our data. If it’s just you and your computer Time Machine works fine with an external Hard Drive which you can pickup affordably enough. We recommend a drive with capacity at least twice the capacity of your Mac. For example if you have a Mac with 256GB storage space get a drive with at least 512 GB storage space. Since you can use spinning hard drives that cost less you can certainly buy larger storage and use that.

But don’t take our word for it, check out Apple’s official guide.

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.