Approved MFA Apps Security Checkpoint

QR Code Icon

Security Checkpoint Approved MFA will show you which Apps to use and why to avoid all the others. The best ones are for free, or at least no additional costs so never pay someone for one of these Apps!

Approved MFA Apps (with links)

Too Many Choices?

However if that’s overwhelming, let’s make this easy. If you use Microsoft 365, Outlook, or Exchange for email like most of our clients do you should use the Microsoft Authenticator App.

Conversely, do you use Gmail for you email provider or Google Workspaces? Try the Google Authenticator.

If your business are our clients you probably already have Bitwarden and we encourage you to use that. If not use the link above to contact us to get started.

Finally are you a solo entrepreneur, individual, or not a decision maker at your company? Get started with Twilio Authy. Our founder Alan uses it all the time for work and personal accounts and it’s 100% free and great to use.

Security Checkpoint Approved MFA

QR Code Icon Security Checkpoint Approved MFA

Security Checkpoint Approved MFA is from a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. Start practicing great security and privacy practices now. Follow along as Alan goes through his digital life and cleans up data and access.

Indeed do you need help with your company’s cyber security? Contact us now to see how we can help!

Did we improve your digital security and privacy? Please like, subscribe, and click the YouTube bell. Immediately you’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Executive Summary APIs

Terminal with API JSON output

Executive Summary APIs is about Application Programmable Interfaces. This is a great way to automate routine tasks and be more productive. Special Thanks to Pexels content creators: Pressmaster, Bedrijfsfilmspecialist.nl, MrColo, All Iz Well, and RoyaltyFreeMusic Nver Avetyan https://pixabay.com/users/royaltyfreemusic-29393722/. Also give thanks to Hugo Static Site Generator that provides the tools Alan builds his personal blog!

Executive Summary APIs

Executive Summary API’s
Executive Summary APIs Terminal with API JSON output

Executive Summary is a new shorts video series where we break down the big ideas in tech into simple videos that give you the information you need. You bring the confidence, we provide the intel.

Need help with your company’s tech? Contact us now to see how we can help!

If Executive Summary helped you improve your tech knowledge please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Executive Summary for the hottest topics in tech.

Microsoft 365 iPhone Mail

Microsoft Outlook App Icon

Want your Microsoft 365 Mail on your iPhone? There’s plenty of great reasons to use Microsoft 365, so many that we will assume you’re already using it or you want to ask us how to set it up. One big trend we recommend to all our clients is being platform agnostic. So this means your technology should work everywhere you are. The good news is that many, in fact almost all of your Microsoft 365 Apps and services are available on your iPhone (demonstrated below) or Android phone. You can also use the Outlook App too if you are fine with having it in a separate App.

Add Your Microsoft 365 Email to your iPhone Mail App

Executive Summary MDMs manage your iPads and iPhones

Executive Summary is a new shorts video series where we break down the big ideas in tech into simple videos that give you the information you need. You bring the confidence, we provide the intel.

Need help with your company’s tech? Contact us now to see how we can help!

If Executive Summary helped you improve your tech knowledge please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Executive Summary for the hottest topics in tech.

Executive Summary MDMs

iPad and iPhone

Executive Summary MDMs takes a look at the world of Mobile Device Managers. If your company owns tablets, smartphones, or laptop PCs you need to track them and make sure they are serving your employees and customers best. Special Thanks to Pexels content creators: Jack Sparrow, Cottonbro studios, Fauxels, Athena, Tim Samuel, Foysal Ahmed, and RoyaltyFreeMusic Nver Avetyan https://pixabay.com/users/royaltyfreemusic-29393722/

Executive Summary MDMs

Executive Summary MDMs manage your iPads and iPhones
Photo by Richard Balane on Pexels.com

Executive Summary is a new shorts video series where we break down the big ideas in tech into simple videos that give you the information you need. You bring the confidence, we provide the intel.

Need help with your company’s tech? Contact us now to see how we can help!

If Executive Summary helped you improve your tech knowledge please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Executive Summary for the hottest topics in tech.

Executive Summary AI Human Perspective

Cloud Circuit

Executive Summary AI Human Perspective was fully human written to point out where AI works better and where humans work better. Special Thanks to Google Deepmind, Pavel Danilyuk, and RoyaltyFreeMusic Nver Avetyan https://pixabay.com/users/royaltyfreemusic-29393722/

Executive Summary Artificial Intelligence or AI

OpenAI, your executive summary: a prominent artificial intelligence researching and deployment company.

Executive Summary is a new shorts video series where we break down the big ideas in tech into simple videos that give you the information you need. You bring the confidence, we provide the intel.

Need help with your company’s tech? Contact us now to see how we can help!

If Executive Summary AI Human Perspective helped you improve your tech knowledge please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Executive Summary for the hottest topics in tech.

Executive Summary Artificial Intelligence

OpenAI LogoMark

Executive Summary Artificial Intelligence or AI and is written with ChatGPT3.5 Powered by OpenAI. This episode covers AI as a technique for computers independently learning and improving themselves apart from their initial programming. Special Thanks to Google Deepmind, Pavel Danilyuk, and RoyaltyFreeMusic Nver Avetyan https://pixabay.com/users/royaltyfreemusic-29393722/

Executive Summary Artificial Intelligence or AI

Video on AI written with ChatGPT3.5 AI
OpenAI, your executive summary: a prominent artificial intelligence researching and deployment company.

Executive Summary is a new shorts video series where we break down the big ideas in tech into simple videos that give you the information you need. You bring the confidence, we provide the intel.

Need help with your company’s tech? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Executive Summary for the hottest topics in tech.

Security Checkpoint Google Authenticator

QR Code Icon

Security Checkpoint Google Authenticator App: Join us as we bolster security in our Google Account using MFA and an Authenticator App. We prefer and demonstrate Authy, but you’re welcomed to use the official Google Authenticator or another trusted app like Microsoft Authenticator or Cisco Duo.

Security Checkpoint Google Passkeys

QR Code Icon Security Checkpoint

Security Checkpoint shows you how to setup a Google Authenticator App for better security on your account. It’s quick and easy, so why not join us?

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Google Passkeys

Passkey icon

Security Checkpoint Google Passkeys get us all one step closer to our goal from earlier this year to have secure simple sign ins.

Security Checkpoint Google Passkeys

Annoyed by passwords? Yeah we are too. What if I told you there’s already something better. It’s both more secure and easier to use? What is this magic? Simple, they’re called Passkeys and we highly recommend you use them with your Google account as we show here.

Passkey icon

How is this even possible? Well you can see what we said earlier this year about Passkeys, or go right to the source who’s developing them.

In short, Passkeys use your computer or smartphone device’s built-in security along with a biometric face or touch scan to make more secure multifactor authentication. So forget reusing your pet Fluffy’s name to protect important data. You weren’t still doing that right? Right?

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Google 2SV

google in playstore

Enable Google 2SV for Multifactor Authentication

Security Checkpoint Google 2SV can be enable for proactive protection on your Google account.

Google’s 2 Step Verification or Multifactor Authentication adds another layer of security to your Google account that will prevent more hacking attempts than simply using a password.

As we covered previously, authentication is proving you are who you say you are. Therefore, doing it several ways gives us a higher degree of confidence it’s actually you not some unauthorized punk snooping around.

Like other authentication systems it can be: something you know, something you have, or something you are. In the case of Google 2SV we are using a password (something you know) and a smartphone authenticator app or yubikey (something you have).

Security Checkpoint Google 2SV

google search engine on screen
Photo by Sarah Blocksidge on Pexels.com

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.

Security Checkpoint Google Enhanced Safe Browsing

google search engine on screen

Enable Google Enhanced Safe Browsing

Security Checkpoint Google Enhanced Safe Browsing can be enable for proactive protection when using Google Chrome or Gmail. Sounds good to us! Be aware that you are trading some privacy for the extra protection though. If you want the official terms and conditions see Google’s page here.

With that awareness this is a great time to remind you of a website called Terms of Service; Didn’t Read or tosdr.org. You can see their entry on Google Chrome. Before you get outraged at their “D” grade ranking be mindful that most commonly used services or technologies get an “E” ranking.

If you’re still concerned about privacy and think twice about using Google Chrome, you can use Brave Browser (which is based on the same underlying technology) and respects your privacy to the tune of a grade “B” on tosdr. Firefox also has a “B” grade and if you’re feeling really nerdy or adventurous you can get a modified version called Waterfox that has an “A” rating!

However if you still want to use Google Chrome and don’t mind sharing a bit more of your data and browsing with Google then Enhanced Safe Browsing is a great way to bolster your security!

google search engine on screen
Photo by Sarah Blocksidge on Pexels.com

Security Checkpoint – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. These are all great security and privacy practices. You can follow along as Alan goes through his digital life and cleans up data and access.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.