{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Cybertraps Podcast","title":"Your Digital Hygiene Cybertraps Live 24","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/736620a5\"></iframe>","width":"100%","height":180,"duration":2179,"description":"Research 2020–09–14 What Is Digital Hygiene? - https://www.seaglasstechnology.com/what-is-digital-hygiene/ 2020–04–01 Hackers Play Dirty, So Practice Good Digital Hygiene - https://www.forbes.com/sites/forbestechcouncil/2020/04/01/hackers-play-dirty-so-practice-good-digital-hygiene/  2020–01–16 5 digital hygiene tips to start the new year fresh - https://www.cira.ca/blog/cybersecurity/5-digital-hygiene-tips Show Notes What Is Digital Hygiene? “the practice of cleaning up your electronic/information assets and regularly updating them.” Cybersecurity Is the Responsibility of All of Us Password Managers  Strong Passwords - A password is typically considered “strong” if it is long (at least 8 characters) and contains a combination of letters, numbers, and special characters Avoid reusing passwords Avoid using new passwords that are too similar to existing passwords Password Managers 1Password Dashlane  Avoiding Malware (Viruses, Keyloggers, RATs, Ransomware)  Use antivirus and antimalware sofware Built into both Windows 10 and Mac Microsoft Defender Antivirus macOS Security Keep existing protective software up to date Use firewalls Use pop-up blockers (some browsers are better than others) Minimize downloads and practice safe computing Know where you are downloading from Minimize or block automatic / unauthorized downloads Keep Operating Systems Properly Updated Practice Safe Surfing Avoid using public/open wifi connections without protection Do-it Yourself Online Safety Guide  Use a Virtual Private Network How They Work  Cisco: “A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. ”  Cisco How to Choose  A Complete Guide To Choosing and Using a VPN Great review of VPN services: ","thumbnail_url":"https://img.transistorcdn.com/-npbjlTwEpH5Ybi_ySNRhS-EfNqaI7Ep1svTppTGhLE/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQxNTcyLzE2ODM5/MjY0NDktYXJ0d29y/ay5qcGc.webp","thumbnail_width":300,"thumbnail_height":300}