Episode Details
Back to Episodes97 - Special topic Podcast Cyber Security with Dan and John
Description
Dan and John spend time exploring the topic of Cyber Security with Dan's work with schools and organisation and John's workshops and trainings on the topic. Dan shares his presentation on Cyber Security with thoughts, reflections and strategies on a topic that often is under the radar for educators and school leaders in International Schools.
With more options and flexibility to travel, and working remotely comes with some important steps to consider to ensure the cybersecurity of your devices and use.
- Cybersecurity Tips for International Travelers
- Guide to data security for travelers.
- Cyber Security while traveling
2 step verification
Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be.
How Two-Factor Authentication Works. (You can also use an app, but the phone is the most common method of using two-factor authentication.) Most forms of two-factor authentication ask you to sign in with your user name and password, and then enter a code that is sent to you via SMS.
Two-factor authentication:
- The best two step authentication apps for 2023
- What you need to know (FAQ): Twitter's got it. Apple's got it, too. Google, Microsoft, Facebook and Amazon have had it for a while. But why's two-factor authentication important, and will it keep you safe?
- Two-Factor Authentication for Beginners
Video
Virtual Private Networks (VPN) and your home
VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more
Surfing the web through a virtual private network ensures that your online activities are both private and secure.
VPN service is capable of keeping your private data safe from hackers, not viruses and malware. ... Well, we designed Buffered VPN to make use of 256-bit AES encryption. It's one of the most reliable encryption protocols out there. Articles
PC Magazine tested scores of VPN services, reviews and considered by PC Magazine to be the best VPN services.
Video