Blog
Contact us
Go to BlackCloak.io
Login
Contents
x
Getting Started With BlackCloak
Client Guides
Concierge Assistance
Cybersecurity Alerts
Client Educational Webinars
Newsletters
Blog
White Papers & Reports
BlackCloak Social Media
Glossary
Powered by
Privacy and Security Basics
23 Articles
in this category
Contributors
Print
Dark
Light
Contents
Privacy and Security Basics
23 Articles
in this category
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Dark
Light
Mobile Hardening Guides
3 Articles
in this category
Written by
Ryan Chiavetta
,
Ryan Chiavetta
How to Create Email Filters
Here are step-by-step instructions on how to set up email filters for Google, Yahoo and Microsoft.
Written by
Ryan Chiavetta
Updated on : 17 May 2023
WhatsApp Hardening Guide
Here are step-by-step instructions on how to secure your WhatsApp account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Snapchat Hardening Guide
Here are step-by-step instructions on how to secure a Snapchat account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Instagram Hardening Guide
Here are step-by-step instructions on how to secure your Instagram account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
TikTok Hardening Guide
Here are step-by-step instructions on how to secure a TikTok account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
LinkedIn Hardening Guide
Here are step-by-step instructions on how to secure your LinkedIn account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Twitter Hardening Guide
Here are step-by-step instructions on how to secure your Twitter account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Facebook Hardening Guide
Here are step-by-step instructions on how to secure your Facebook account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Enabling a Passcode On Your Mobile Device
Enabling a passcode on your mobile device helps to protect your data from unauthorized access. Apple Here are Apple's instructions for enabling a passcode on your iPhone or iPad device. Android Here are Google's instructions fo...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 29 Mar 2023
ChatGPT Privacy and Security Considerations
ChatGPT has become an incredibly popular tool, but while it can be used for a number of purposes, there are privacy and security considerations you should know about. This guide will highlight what ChatGPT is, and what you should and shouldn't do wh...
Written by
Ryan Chiavetta
Updated on : 12 May 2023
Securing Your Email Account
The most important and vulnerable account in your digital life is your email account. Your email can be the doorway to access numerous linked accounts and personal information. If an email account is compromised, a malicious actor could have the a...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 30 Mar 2023
Keep Your Browser(s) Updated
Here are steps for updating or checking to see if an update is available for your browser on the most popular browser platforms. Google Chrome Update (or Check for Updates) on Google Chrome - Google's instructions for checking and installi...
Written by
Ryan Chiavetta
Updated on : 30 Mar 2023
Updating/Upgrading Mobile Devices or Computers
We recommend setting devices for automatic updates in order to receive the latest security patches from your device manufacturer. Sometimes those automatic updates don't happen, but here's you can update for your particular device. Apple Upd...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 29 Mar 2023
Helping Children Stay Safe Online
Whether you're using the internet for school, entertainment, or to keep in touch with friends and family, it's important to know how to stay safe while you're online. Today, we're going to talk about some best practices for staying safe online, an...
Written by
Ryan Chiavetta
Updated on : 12 May 2023
Social Engineering Red Flags
Scams and hackers use convincing stories to frame a situation, rush you into making a decision, and heighten your emotions in order to trick and defraud you. Here’s some common scams and some tips to recognize their schemes before you get scammed: ...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 29 Mar 2023
Virtual Private Network (VPN) Overview
This guide explains the ins and outs of a VPN, and how to set one up What Is a VPN? As the name implies, a virtual private network offers improved security when using the Internet. It is an encrypted connection between two endpoints. VPNs once h...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 29 Mar 2023
Brave Browser Settings iOS/Mac OS/Windows
Recommended Settings for Your Brave Browser Please use the following guidance to install and configure the Brave Browser on both your iOS and macOS/Windows devices. ➔ Check that the browser is up-to-date If using iPhone or iPad, navigate to ...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 31 Mar 2023
How to Securely Wipe Devices
Below are instructions to securely wipe your device SSD in the event of selling the device, trading it in, passing it on to a new user, or throwing it away. This process will prevent unauthorized access to data that was on your phone once it is out ...
Written by
Ryan Chiavetta
Updated on : 29 Mar 2023
ChromeBook Security Hardening Guide
No matter how hard you try to secure your ChromeBook- the most important thing is to secure your Google account. Your Google account is the gate to your Chromebook, so you want to make sure you have the proper security measures set in place. Yo...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 29 Mar 2023
Apple Watch Security and Privacy Recommendations
What is the Purpose for Privacy and Security Hardening? Limit the information that is shared with device manufacturers and third party apps. Configuring Recommended Security & Privacy Settings ➔ Begin by navigating to the Settings app on your ...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 31 Mar 2023
Zoom Conference Security
Secure Your Zoom Meetings Please note, there is no true end-to-end encryption for this platform so urge caution with what is said or sent in chat rooms during meetings. ➔ Password Protect Meetings Add passwords to all meetings. Previousl...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 29 Mar 2023
Mail Fraud, Mail Theft and USPS Informed Delivery
This document serves as a guide to explain how mail fraud works, and what you can do to report it, as well as explains how to utilize USPS's Informed Delivery service. MAIL FRAUD What is mail fraud? Mail fraud is where scammers attempt to gain...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 30 Mar 2023
How to Check the Extensions on Your Browser
Occasionally you may find an extension on your browser that you did not download, or you may decide you want to uninstall an extension you no longer use. This guide will show you how to find the extensions installed on your browser. Google Chrome ...
Written by
Ryan Chiavetta
,
Ryan Chiavetta
Updated on : 29 Mar 2023
Change password!
Changing your password will log you out immediately. Use the new password to log back in.
Current password
Current password is required
New password
New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password
Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password should be same as new password
Update
Change profile
Success!
First Name
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last Name
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
New email
Enter a valid email
Re-enter your password
Enter a valid password
Your profile has been successfully updated.
Update
Logout