Password Check

You’ve heard it before. Don’t use the same password on multiple sites. Don’t write it down and leave it beside your computer. Make it strong.

How secure is your password? How long would it take to crack it?animated-clock-image-0025

Days? Weeks? Centuries? Or seconds?

You can check a password for strength and security. Two good tools for this are

So once you have a good strong password, How do you remember it? And how do you remember two or three complex passwords, let alone dozens for all the different sites you log into?

You don’t. This is where a password manager comes to the rescue. It will remember all of your passwords for you. You only need remember one, the one that logs you into the password manager.Kaspersky Total Security

There are lots of choices some free, some paid. If you are using Kaspersky Total Security a password manager is included.

Another I am familiar with is Roboform. This can be used with multiple devices using Roboform Everywhere. It stores your passwords on their server and allows you to use your passwords on a computer tablet or phone.

Worried about using “the cloud”?

Read about the benefits and the risks in this article from Malwarebytes Labs.

There are a variety of free password managers as well with different features available. Some work with one device only and others sync across all your devices. They also have paid versions with extra features.Antispy

Here are just a few of the many choices. See which options work for you.

If your computer security and personal identity are important, and I’m sure they are, consider using tough passwords and using a password manager.

Keep the bad guys out.

Your peace of mind and privacy are worth it.

Ouch! Newsletter – I’m Hacked Now What?

Excerpt from Ouch! newsletter, April 2016Ouch I'm hacked now what


We know you care about protecting your computer .and mobile devices and take steps to secure them ,However, no matter how securely you use technology you may eventually be hacked or “compromised.” In this newsletter, you will learn how to determine if your ,computer or mobile device has been hacked and, if so what you can do about it. Ultimately, the quicker you ,detect something is wrong and the faster you respond .the more likely you can reduce the harm a cyber attacker can can cause.”

Read the full article


OUCH – I’m Hacked, Now What? April 2016

Password Managers – Why you should use one.


How many passwords?Password Managers make logging in easier and more secure.

How many passwords do you have?

You might not remember how many, let alone what they are.

We tend to be lazy with passwords, making them simple and easy to remember, and often using the same one for multiple sites.

Why do we do it? Because it’s easier!!

Continue reading Password Managers – Why you should use one.

Encryption – What is it? How to use It.

Encryption – What is it? How to use It.

laptop, smart phones and tablet pc
Encryption can protect any device.

Chris Crowley explains what encryption is, how it works and some key steps to using it properly.

Quite often, we tell people to encrypt everything to protect themselves, but fail to explain what encryption is or how to use it properly.

Read the newsletter to find out more about using encryption to protect your data.

OUCH Newsletter – 201408_en

Check the archives at


Email Do’s and Don’ts – Be smart. Stay safe!

Email Do’s and Don’ts

OverviewEmail Do's and Don'ts

“Email has become one of the primary ways we communicate in our personal and professional lives. However, we can often be our own worst enemy when using it. In this newsletter, we will explain the most common mistakes people make and how you can avoid them in your day-to-day lives.” -OUCH! newsletter July 2014


Read more about wise use of email tools.  


If you have other valuable tips for email, or anything else, fill in your comments below.

Be smart. Stay safe!

Cyber Crime – Actually You are a Target

 Are You Safe From Cyber Crime?

A common misconception many people have is that they are not a target for cyber crime: that Cyber Crimethey or their computers do not have any value. Nothing could be further from the truth. If you have a computer, mobile, device, an online account, email address, credit card or engage in other type of online activity, you are worth money to cyber criminals.

Read the April Newsletter from SANS Securing the Human for tips on protecting yourself.

Yes, You Actually Are A Target

Visit Sans Securing the Human

for monthly newsletters.


International Travel


If you wish to travel abroad you will likely want to stay in touch with family and friends back home. Or you may be working and need to keep in touch with business associates or colleagues. How do you do that while staying safe with your laptop, tablet, or cell phone?

Check out these tips on international travel from Sans Securing the Human. Don’t be the weakest link in the chain of security.

 International Travel – Securing the Human



Multiple Gmail accounts on one computer

If you use Gmail or other Google accounts on a computer, you may notice that if you open a new tab in Chrome or Internet Explorer while logged in to your account, that the new tab will default to the open Google account. What if you have two Gmail accounts, or  someone else in the house wants to look at their account, while you are logged into yours? Can you open multiple Gmail accounts?

How to Log into Second Google Account

Multiple Gmail Accounts

This is not difficult to do. If you are logged into your account, click on your ID picture, in the upper right corner. Click on the “Add account” button.

The “choose account” screen will open. If you are doing this for the first time, you will see only your account.

Click Add Account. Fill in email and password of the account you would like to add. Sign in.

Google Sign in Screen


Google will open the account you just signed in with, but the previous account will still be open. Now you can just click on the account you wish to view, since they are both open.

Multiple Gmail Accounts

Gmail Account

When you click on your ID icon, the above drop down will show the active account first, with the avatar (photo). You can do the usual things here: View profile, check your account or privacy settings, or change your photo.

All other open accounts will appear below. You can have any number open at the same time.  Just click on the one you wish to view and it becomes the active account.


If privacy is important opening multiple Gmail accounts may not be for you. All accounts that are open at one time are accessible to all users. Signing out of one account signs out of all of them.

You will be returned to the sign on-screen to sign into your account.

On the other hand if you have multiple Gmail accounts, or share your computer with someone you trust, or don’t have confidential information, this will work well for you.

Try this and let me know how it works for you.

Comments are always welcome.

Wireless Router -Secure It Now!

Secure your Wireless RouterSecure your wireless router

Your router is part of your window to the world. At home everything you see and do on the internet goes through your router, and wireless routers are becoming the normal way of connecting. But if you can see out the window, there is a possibility someone may be looking in. And you don’t want that. Your wireless router should be set up so that information comes and goes only when you want it to, and is only used by those to whom you have given permission.

Why change the settings on your wireless router?

If you don’t someone else can connect to your WiFi and use your bandwidth. What difference does that make?

  • Slows down your connection. Your ISP only gives you a certain download/upload speed. The more it is being shared the slower it will get.
  • Security. If they can get on your wireless, they may be able to get inside your computer. They may get personal information from your computer.
  • Malware and viruses can be installed on your computer without your knowledge.
  • Illegal Activity. Your internet may be used to do file sharing, or send spam. Worst case, imagine that child pornography or some other terrible activity was originating from your connection. It may be difficult to prove that you were not involved.

Consider this scenario: “When setting up a wireless network at home, I was surprised to be able to connect to my neighbor’s unsecured wireless router. Not only could I have used his bandwidth for free, but had I been so inclined, I could have used the connection for illegal activities. If the police came looking, he may not have been able to prove the activity didn’t come from one of his computers.”

Properly securing a wireless router is not difficult.

There are a number of settings to look at.

    • SSID -Service Set IDentifier- This is the name of your wireless connection. You give it a unique name, preferably one that doesn’t directly relate to you. For example you may wish to avoid using your personal name, or other personal information that may identify you. It can be a random set of characters if you wish. Routers will often come from the factory with a default name, such as “dlink” or “linksys”. Be sure to change this.
    • Change the administrator name and password.
    • Use a passkey, or password. Turn on WPA (avoid WEP) for authentication and TKIP for encryption.wireless router



How to secure your wireless router.

There are lots of blogs detailing how to set up security for YOUR wireless router. Get the name and model and google it. If you like assistance with a specific router Contact Us with the name and model of your router and we’ll try to help. For an overview of changing settings follow this link:

Pay special attention these sections:

  • Change the SSID and Administrator Password

  • Change Your Security Settings

These few steps will result in a greater level of security with your wireless router, with no one looking in your window.