Posts Tagged ‘Security’

Protect yourself from the Heartbleed vulnerability

Published by | Tuesday, April 15th, 2014

Heartbleed - what you need to know

Learn how to protect yourself and your sites from the Heartbleed vulnerability, the security flaw that can put sensitive user data at risk and affects hundreds of thousands of websites. Today lynda.com released Protecting Yourself from the Heartbleed Bug, a short course that explains what Heartbleed is and how to protect yourself from it, and offers resources for tracking the developing situation. Heartbleed Tactics for Small IT shops also released today; it provides tactics and information to help those who administer a small web server diagnose their vulnerability and fix issues.

Troubleshooting Wi-Fi security: Monday Productivity Pointers

Published by | Monday, March 24th, 2014

Troubleshooting wi-fi security

Before we get started, I’m happy to announce this week marks our 52nd week of Monday Productivity Pointers–one whole year of productivity with lynda.com! Thanks to each and every one of you for sending in your requests and your recommendations.

Secure yourself when using cloud apps: Monday Productivity Pointers

Published by | Monday, February 10th, 2014
Enabling 2-step authentication to Google web apps

Explore Monday Productivity Pointers at lynda.com.

Here on Monday Productivity Pointers, I love to talk about cloud apps. I love using apps that you can access from anywhere—your computer, laptop, phone, or tablet. This week, we’ll discuss an important topic around cloud apps: how to secure yourself when using them. In my first video, I’ll show you how to enable two-step authentication, a more secure way of logging in, also referred to as “two-factor authentication.”

More and more cloud apps are offering two-step authentication. When you enable it, step one is to log in to the app with your user name and password as usual. You’ll then receive a text message on your phone from the cloud app itself, containing a second password. Step two is to go back into the app and enter that second password for access.

Protect the integrity of your documents: Monday Productivity Pointers

Published by | Monday, November 25th, 2013

Protect the integrity of your documents with PDF files

Explore Monday Productivity Pointers at lynda.com.


Your business may involve creating and sending contracts to your clients—but the problem with using Microsoft Word documents for contracts is that they can be easily altered. It’s important to know when you receive a contract back from your clients that it’s the exact same contract you sent them.

In this week’s Monday Productivity Pointers, I’m going to show you how easy it is to turn your Word document into an unalterable PDF file right from within Microsoft Word. While it’s not impossible to alter a PDF file, it’s far more challenging, which is why PDF is becoming the industry standard file format for sending contracts over email.

Firewalls and the Cloud: Monday Productivity Pointers

Published by | Monday, August 19th, 2013
Firewalls and the Cloud

More Monday Productivity Pointers at lynda.com.

 

In this week’s Monday Productivity Pointers, we’ll take a look at how to secure your computer online to protect your privacy and data. We’ll go back to basics and explore how data travels through the Internet, what a firewall is and how it works, and the types of online threats a firewall can protect you from.

Monday Productivity Pointers: Setting up Find My iPhone

Published by | Monday, July 1st, 2013

Using Find my iPhone on an iPad

It’s a scenario no one wants to think about—but it happens all the time: You lose your iPhone or it gets stolen. What do you do? Fortunately, a native iOS app called Find My iPhone can help you track its location as soon as you realize it’s missing.

Keep your iPhone secure by keeping it clean

Published by | Thursday, February 4th, 2010

Recently a colleague of mine set down his passcode-secured iPhone on the desk we were sitting at. As I was marveling at how smudged the screen was from his constant use, I noticed that among the various smudges I could clearly see four distinct fingerprints, whose positions I realized revealed the four numbers he used for his passcode lock. The passcode lock is a feature of the iPhone that, when enabled, requires the user to enter a four-digit code to unlock the phone. It’s a great feature to keep your contacts, email, and account secure should your iPhone get lost or stolen. But because you have to type in your passcode every time you use the phone, the four fingerprints over those numbers can easily become the most distinct marks among the smudges.