Password Breach? Digital privacy compromised?

Stealth Agents

Tools To Protect Yourself

1

First Step

Understand the scope of the assault on your privacy.

2

Second Step

Determine the tools best for your situation

3

Third Step

Implement

password breachA serious part protecting your digital privacy is managing your passwords and resolving a password breach.  I manage literally hundreds as I care not only for my own but also those of a number of clients.  I do this the old fashion way with writing them down on a piece of paper.  Not is a spreadsheet, not produced by a service.  Kind of a hassle but the password is often the frontline of your privacy protection.

Here is an interesting service that attempts to tell you if your password has been revealed in a breach.  Pwned Passwords.  Interesting application.  I think I will not use it, but change some passwords of the most critical services I use.

2018-03-16T21:22:24+00:00March 3rd, 2018|