How to use unique passwords, multi-factor authentication, and cookie management as a means to hinder distraction. [Read More]
A collection of my blog posts tagged as being related to multi-factor authentication (two-factor, 2FA) including software, implementations, security features, etc.
I recommend lying properly on website security questions to block hacks by data miners and phishers. [Read More]
The first step in cyber security is to ensure that nobody can access your email account. Your email is a valuable tool for phishing as well as a data trove. [Read More]