#DailyBloggingChallenge (54/100)
How much #paranoia is permitted in the digital sphere of communication until one is categorized as a tinfoil hat carrier?
This depends to whom one is communicating and how valuable the data is that could be potentially abused.
Situation:
Let there be a group account without the possibility to create individual members and let the leader have 2FA activated. When the ask for the password for the account followed by generating a gift code from an unknown website.
Does this satisfy to take precautions on how one chooses to communicate further?
#DailyBloggingChallenge (55/100)
The rule of thumb is that the more secure it is the less convenient it becomes and vice versa.
Though there are plenty of examples where this is not the case like #PasswordManager | s. It is true that some are more convenient than others, thus we will stick with the concept. |
Good security practices state that one should have an unique #password for each account.
Doing this by hand is not that difficult, just choose a special character, use it as glue between two, at least, five letter words and append a counter.
This method is fine with a couple accounts. Now, if one has 100+ accounts, knowing if account X had counter Y or counter Z is not that straight forward.
With a password manager this task becomes trivial.
#DailyBloggingChallenge (57/100)
Account #isolation #security
Account isolation security is when one does specific tasks with specific accounts.
Situation:
Let’s say one got a work laptop and one wants to use it privately as well. The best would be to set up three accounts/users: root, work, and personal. This way one has a clear cut between the three scenarios.
This also comes with the mental fortitude of creating a new location for every task at hand and thereby using the strategy of priming to create an environment to set the tone.