Andrew is looking for a good password manager. Leo says that Last Pass, 1Password, are among the best options out there. And don't trust browser password vaults. They can be easily compromised, though some security gurus prefer it. Leo says that a password manager is the best way to go.
If you have a Facebook and are taking precautions in case you get hacked (and used to post/click on things that you wouldn't do), you should assign at least one trusted contact. Friends or family you trust can help you recover your account by sending you a special URL via recovery code. Go to Security & Login Settings, scroll to "Choose 3 to 5 friends to contact if you get locked out", and edit which friends you want to assign. You can also change or remove those chosen friends later for whatever reason.
Ken has a number of emails running in Outlook. A few are Gmail. Everything works fine at home, but Gmail thinks he's being hacked and won't let him log in when he uses a hotspot or VPNs. So he has to go outside the VPN to log into Gmail in order to register the IP. And that only works sometimes. Leo says to go into the Outlook settings and make sure you have a proper profile created using GMail's SMTP for those Gmail addresses, along with your login and password. Leo suspects that is where the hiccup lies. Also, turn on two-factor authentication.
Jan is trying to fire up an old HP laptop and it's asking for a Windows login password. She doesn't know it. It's Windows 8. Leo says that there are some cracks that can hack a Windows 8 login. But she needs to be careful that she isn't making the problem worse with malware. If she doesn't need the data, the easiest would be to wipe the laptop and reinstall Windows. Then, if she has a backup, she can just restore it.
Harry wants to know if his smartphone can be hacked and would he know if it was? Leo says yes, and no. Smartphone operating systems are very sophisticated, but Android is more open source and, as such, could be more vulnerable. If anything, your smartphone knows where you are at all times, and as such, so does your phone company. And police can get that data by a simple request.
But unless you're a celebrity, a politician, or a member of a "three-letter agency," it's extremely unlikely you'll get hacked. Just don't download suspicious apps from questionable sources.
Vick is concerned with network security, especially with ransomware. Leo says it's important to adopt a layered approach to online security, especially with employees. Train your employees to be able to identify so-called Phishing attacks and malware. Be aware of spear-phishing attacks, especially when working from home via VPN. Password management is important, too, with rotating passwords. Have good offline backups, so if your network is compromised, you can get back up and running. It's a complicated full-time job, but it's worth hiring someone to do it.
Vee wants to know if she needs any more protection than her router to keep her safe online while she's teaching. She doesn't need to add anything to the router itself, but the best thing is to guard her online behavior and keep everything online up to date. Update the OS regularly, when available, as well as the apps. Your browser should automatically update. Also, the router needs to be kept up to date and periodically, it pays to look for an update for it. Also, change the password from default. Turn off WAN administration. And turn off UPnP (Universal Plug n Play).
Richard is having a major problem with Facebook. Someone hacked into his account and altered all his information. So he's lost complete control of every account he uses. Leo says that's what Two Factor Authentication , with an authenticator app. It can guard against. You can also set up trusted contacts, which can aid in verifying who you are as you are trying to get control back. But since it's too late for that, you can only hope to get ahold of someone at Facebook to get help in getting control of your account back.
Ed wants to know if he can use a YubiKey authenticator with his iPhone. Leo says it works great with the iPhone. It's what he uses every day, and he thinks that a hardware key is the best two-factor option. How does it work? Leo says you can get one with a Lightning connector or use the NFC mode and tap it on the phone.
Will it work for Linux? Leo says most flavors of Linux, yes. But there are a few that don't support it, but you can add some code to it to make it work. Here's how.
Karen's work stores their data up in the cloud, but her boss wants to password protect all files because he isn't thrilled with anyone in the company having access to all their data on One Drive. Leo says that Microsoft's Sharepoint is a collaborative security service, which allows companies to provide permissions to folders, files, and other data. Microsoft One Drive for Business also has that feature.