437-888-0111 help@agile.computer

At Agile Computer, we are strong proponents of being vigilant around cyber security. This is why we offer cyber security workshops at no cost to our //agileCOMPLETE customers and keep our fees to a minimum for our more casual customers. Cyber security starts with end users (There is a good chance, thats you!). End users for lack of a better term are the valued people we generally are here to support. In most cases cyber security breaches start with an attack on you! So to be forewarned, and armed with information against these social engineering dark arts is key!

The following article will help arm you with that defensive information to help keep your data secured.

The Basics: Keep It Fresh, Keep It Strong 💪

Imagine your password as a superhero cape, shielding your online world from malicious actors. Now, this cape needs to be fresh and strong. Don’t stick with the same password for eons – change it up regularly and most importantly, never — ever — use the same password for all your accounts.

When I say strong, I mean it! Mix it up with a combo of uppercase, lowercase, numbers, and special characters. Think of it as creating a secret code only you can crack. You can use memorable devices such as this; rather than the word secured, use $ecur3DGmail. You can also use a password manager to help remember those. We can talk about this in another article coming soon!

Two-Factor Authentication (2FA), also called MFA: Double Trouble for Cyber Baddies 🕵️‍♀️🕵️‍♂️

This has 2 names in industry. 2FA or MFA, they both mean the same thing. Two Factor Authentication or Multi Factor Authentication. At Agile, we cannot stress this enough. Think of 2FA as the sidekick to your superhero password. It adds an extra layer of protection by asking for a second form of identification – In its simplest form, with 2FA, when you login with your password, a text is then sent to your phone. You will also need to supply that code. This prevents somebody who has your password compromised from accessing your accounts.

Other forms of 2FA are an app installed on your phone such as Google Authenticator which maintains these codes for you so you don’t need cellular access to login. Its preloaded with a time sequence and codes so you simply open your app and read the current code for the account you are logging into.

Be Wary of Phishy Waters 🎣

Watch out for phishing attempts – those sneaky emails or messages pretending to be trustworthy. They might ask for your password or personal info. Stay sharp, don’t click on suspicious links, and never share your secrets with unknown digital strangers! If you are ever unsure, contact help@agile.computer and we are more than happy to assist in vetting any phishy messages.

Check-In Regularly

Give your passwords a spa day every now and then. Check if they’re still fit and fabulous. If an account has been gathering digital dust, it might be time for a refresh. Keep your passwords in tip-top shape!

So there you have it – the lowdown on keeping your digital life safe and sound. Remember, your online world is like your favorite pet dragon – it needs love, attention, and a strong password leash! Stay savvy, stay secure, and keep rockin’ the digital realm. 🚀✨

BONUS: Check to see if your account(s) are known to be compromised

“Have I Been Pwned” is a good free service to see if your emails have turned up on known breaches. Simply visit (opens in new tab) https://haveibeenpwned.com/ and enter your email. If there are results, change your password(s) asap.