IMG_0160

The threat from bad actors who seek to access and exploit user data increases every year. The list includes for-profit gangs, unscrupulous developers, the world's largest social media companies and repressive governments. The information they could potentially use includes, but isn't limited to, financial records, political or social organizing records, medical records, blackmail material, passwords and personal communications. Those who seek to access your data have increasingly sophisticated methods of bypassing weak security.

There are many aspects of making your digital life as secure as possible. The links in today's post are to help you get started with encryption, protecting your data from prying eyes.

A Beginner's Guide to Encryption

Which Files Do You Need to Encrypt?

How to encrypt a flash drive for Windows and macOS

How to Encrypt Email on Gmail, Outlook, iOS, Android, and Other Platforms

Enjoyed it? Please upvote 👇