Home Computer Security -- Human Behavior - Part I
http://edu-observatory.org/olli/HCS/Week1.html



WE ARE THE WEAKEST LINK
WE ARE A CLEAR AND PRESENT DANGER



OUCH! -- Social Engineering
  OUCH-201701_en.pdf




OUCH! -- Phishing
  OUCH-201512_en.pdf
Stop That Phish  
  OUCH-201804_en.pdf
Identifying Fraudulent "phishing" Email
  https://support.apple.com/en-us/HT204759
Here's What Can Happen (11+ min)
  https://www.youtube.com/watch?v=bjYhmX_OUQQ


OUCH! -- Email Do's and Don'ts
  OUCH-201609_en.pdf
OUCH! -- Social Media
  OUCH-201507_en.pdf


OUCH! -- Securing Today's Online Kids
  OUCH-201705_en.pdf
What unique risks are associated with children?
  https://www.us-cert.gov/ncas/tips/ST05-002





Password Strength is a function of length, complexity, and 
unpredictability. Length is the dominant factor.
  https://en.wikipedia.org/wiki/Password_strength

OUCH! -- Passphrases
  OUCH-201504_en.pdf
  https://xkcd.com/936/

Have You Been Pwned? Check Passwords - Change if pwned!
  https://haveibeenpwned.com/Passwords

OUCH! -- Two-Factor Verification
  OUCH-201712_en.pdf
  https://support.apple.com/en-us/HT204915

OUCH! -- Password Managers
  OUCH-201709_en.pdf
John Kheit | The Cloud Is a Lie
  https://www.macobserver.com/columns-opinions/devils-advocate/the-cloud-is-a-lie/

  

Learning Home Computer Security is not sufficient -- One has
to commit the knowledge to practice.


 
    sam.wormley@gmail.com