97 - Special topic Podcast Cyber Security with Dan and John




The International Schools Podcast show

Summary: Dan and John spend time exploring the topic of Cyber Security with Dan's work with schools and organisation and John's workshops and trainings on the topic. Dan shares his presentation on Cyber Security with thoughts, reflections and strategies on a topic that often is under the radar for educators and school leaders  in International Schools. With more options and flexibility to travel, and working remotely comes with some important steps to consider to ensure the cybersecurity of your devices and use. Cybersecurity Tips for International Travelers Guide to data security for travelers. Cyber Security while traveling 2 step verification Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be. How Two-Factor Authentication Works. (You can also use an app, but the phone is the most common method of using two-factor authentication.) Most forms of two-factor authentication ask you to sign in with your user name and password, and then enter a code that is sent to you via SMS. Two-factor authentication:  The best two step authentication apps for 2023 What you need to know (FAQ): Twitter's got it. Apple's got it, too. Google, Microsoft, Facebook and Amazon have had it for a while. But why's two-factor authentication important, and will it keep you safe? Two-Factor Authentication for Beginners Video How to video setting up your two step verification Explaining Two-Factor Authentication   Virtual Private Networks (VPN) and your home  VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more Surfing the web through a virtual private network ensures that your online activities are both private and secure. VPN service is capable of keeping your private data safe from hackers, not viruses and malware. ... Well, we designed Buffered VPN to make use of 256-bit AES encryption. It's one of the most reliable encryption protocols out there. Articles How—and why—you should use a VPN any time you hop on the internet Best VPN reviews and ratings for 2023e) PC Magazine tested scores of VPN services, reviews and  considered by PC Magazine  to be the best VPN services. Video What is a VPN and How Does it Work? What is a VPN?  Anti Virus Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer. The Best Antivirus Protection for 2023 What is anti-virus software How Does Antivirus and Antimalware Software Work? Passwords According to the traditional advice—which is still good—a strong password: Has 15 Characters, Minimum: You need to choose a password that's long enough. ... Includes Numbers, Symbols, Capital Letters, and Lower-Case Letters: Use a mix of different types of characters to make the password harder to crack.  Using passwords to protect your devices and data infographic. (pdf handout) Advice and Guidance Password Guidance and Tips 8 Tips to Make Your Passwords as Strong as Possible Password manager buyers guide The best password managers for 2022 Ditch the sticky notes and get peace of mind. Smartphone security  Best mobile antivirus: how to choose a mobile security app 7 best practices for smartphone security 9-Smartphone tips for security 10 top tips for smartphone security Smartphone tips on security as you travel Additional resources The Wired guide to digital security Security.org : A 2023 Guide to Personal Digital Security & Online Safety   John Mikton on Social Media LinkedIn: https://www.linkedin.com/in/jmikton/ Twitter: https://twitter.com/jmikton Web: beyonddigital.org   Dan Taylor on social media: Li