
Digital Security Watch
@DS_Watch
Followers
709
Following
498
Media
14K
Statuses
26K
Daily cybersecurity news 🛡 | New video every Friday.
Joined January 2014
🚨 Top Cybersecurity Stories This Week - What You Missed (End of Week Recap)
0
0
0
Don't rely on a single password to protect accounts. Enable multi-factor authentication wherever you can.
0
0
0
The Blue Team Field Manual (BTFM): a valuable technical reference for cyber defenders:
digitalsecuritywatch.com
The maxim ‘use it or lose it’ applies as much to the array of operating system commands, scripting languages and toolset peculiarities as it does to the language classes many of us try …
0
0
0
Bluetooth is best disabled if you're not using it. Here's a few reasons why: https://t.co/xR6f0lGHQf
0
0
0
If you want to be know what AI is, what it isn't and how it might impact future life on earth (and potentially beyond), LIFE 3.0 is a fascinating read.
digitalsecuritywatch.com
Our reviews generally focus on products that will help enable or inform a secure lifestyle rather than more existential threats, but in the case of Life 3.0: Being human in the age of Artifi…
0
0
0
Here's a useful resource for victims of data breaches, including checklists and letter templates: https://t.co/0GFNScw8Iu
0
0
0
“Update later” is hacker fuel. Update your software NOW — future you will thank you.
0
0
0
Cyberphobia: An excellent primer for the non-techie on cyber threats and challenges: https://t.co/9rfv6wyxTd
0
0
0
USB flash drives are like taxicabs for malware. Virus scan them before use and don't use unfamiliar ones!
0
0
0
Many Wi-Fi routers allow you to activate a second 'guest' network, which could used to keep Internet of Things (IoT) or visitor devices separate from your private household network.
0
0
0
Internet browsing involving important personal data should only be done on devices you own and networks you trust.
0
0
0
If you see a post advertising a crypto 'giveaway' or asking you to send crypto to an address in order to get more back: it is a scam.
0
0
0
Learn, preserve or refresh key technical skills with the Operator Handbook: https://t.co/vHZ9ST0ouQ
0
0
0
Were you expecting that slightly odd email urging you to open an attachment? No? Leave it alone!
0
0
0
Protect your cards from the 21st Century RFID pickpocket with the stylish ATARA Credit Card Holder: https://t.co/CsM5uBP0Zo
0
0
0
USB flash drives are like taxicabs for malware. Virus scan them before use and don't use unfamiliar ones! #cybersecuritytips
0
0
0
🚨 Top Cybersecurity Stories This Week - What You Missed (September 12 Recap) #CybersecurityNews #Ransomware #CyberSecurityAwareness
0
0
0
The Blue Team Field Manual (BTFM): a valuable technical reference for cyber defenders:
digitalsecuritywatch.com
The maxim ‘use it or lose it’ applies as much to the array of operating system commands, scripting languages and toolset peculiarities as it does to the language classes many of us try …
0
0
0
Physical and virtual security should align: don't spend precious time securing tech and leave doors unlocked, papers lying out.. #cybersecuritytips
0
0
0