Super Simple Security Principles

Digital security principles in tiny powerful packages that are easy to understand, no matter your sk

Episodes

Total: 47

What is a protection partner and how can having one help you?  It's a free strategy that anyone can

What are passkeys?   How are they different from passwords?   Why are passwords so flawed?   What ar

What is Makani’s favorite way to send money to friends and family, and why?   Which disturbing Venmo

How do an estimated 91% of cyberattacks start?   What critical feature is email missing that every m

What free tool can help you block harmful websites on any device without slowing it down?   Wait, fr

What is an allowlist?   What is a blocklist?   How can they keep me safe?  

How is a cookie banner like a road sign?   What does it mean to "read the signs"?   How can you use

Why is the IHP Academy getting rebranded?   What does it mean to become bulletproof?   What are the

What are cookies?   Do I have to accept them?   Do cookies ever go away after I accept them?   Unles

How does typing in your password make you vulnerable to phishing? When do you authenticate someone i

What is Backblaze?   How long has Makani been using Backblaze?   What feature is Backblaze missing? 

What are the 3 big reasons people don't backup their data?   What is the sad story that first intere

What's safer - Apple or Windows?   How does one famous Windows software developer answer this questi

What's the most important step to take if an account gets hacked?   - Spoiler alert: it's not changi

Why do I want the 2FAS app?   What is Google Authenticator?   Why does Makani trust the 2FAS app?  

What is a browser extension?   Are there any I might want to use?   What bad things can a browser ex

Today we are answering a listener question: which is safer - Apple or Android? We also talk about ho

If you listened to last week's episode, and are wondering what to do, this episode is for you.   We

Get simple answers to all your questions about this breach:   How many countries were affected by th

In part two, we talk about step two of protecting your online accounts.   There are many kinds of tw