Blog
Contact us
Go to BlackCloak.io
Login
Contents
x
Getting Started With BlackCloak
Client Guides
Concierge Assistance
Cybersecurity Alerts
Client Educational Webinars
Newsletters
Blog
White Papers & Reports
BlackCloak Social Media
Glossary
Powered by
Privacy and Security Basics
31 Articles
in this category
Contributors
+ 2
Print
Dark
Light
Contents
Privacy and Security Basics
31 Articles
in this category
+ 2
Written by
Ryan Chiavetta
,
Buddy Rikard
,
Brian Hill
and 2 others
Dark
Light
Mobile Hardening Guides
3 Articles
in this category
Written by
Ryan Chiavetta
How to Create Email Filters
Here are step-by-step instructions on how to set up email filters for Google, Yahoo and Microsoft.
Written by
Ryan Chiavetta
Updated on : 12 Jun 2023
Physical Two Factor Authentication Methods
Physicial devices can be used as two factor authentication methods to protect your online accounts. These are devices you would interact with to access your bank accounts, credit cards accounts, social media accounts and more. This guide will expl...
Written by
Ryan Chiavetta
Updated on : 08 Aug 2023
An Overview on Data Brokers
You may not know it, but your personallly identifiable data is likely available for free or for purchase right now. Plenty of groups, both reputable and malicious, can buy personal data through a data broker. This guide will explain what data broker...
Written by
Buddy Rikard
,
Ryan Chiavetta
,
Brian Hill
Updated on : 28 Aug 2023
WhatsApp Hardening Guide
Here are step-by-step instructions on how to secure your WhatsApp account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Snapchat Hardening Guide
Here are step-by-step instructions on how to secure a Snapchat account.
Written by
Daniel Floyd
,
Ryan Chiavetta
Updated on : 07 Jul 2023
Instagram Hardening Guide
Here are step-by-step instructions on how to secure your Instagram account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
TikTok Hardening Guide
Here are step-by-step instructions on how to secure a TikTok account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
LinkedIn Hardening Guide
Here are step-by-step instructions on how to secure your LinkedIn account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Twitter Hardening Guide
Here are step-by-step instructions on how to secure your Twitter account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Facebook Hardening Guide
Here are step-by-step instructions on how to secure your Facebook account.
Written by
Ryan Chiavetta
Updated on : 16 May 2023
Enabling a Passcode On Your Mobile Device
Enabling a passcode on your mobile device helps to protect your data from unauthorized access. Apple Here are Apple's instructions for enabling a passcode on your iPhone or iPad device. Android Here are Google's instructions fo...
Written by
Ryan Chiavetta
Updated on : 29 Mar 2023
ChatGPT Privacy and Security Considerations
ChatGPT has become an incredibly popular tool, but while it can be used for a number of purposes, there are privacy and security considerations you should know about. This guide will highlight what ChatGPT is, and what you should and shouldn't do wh...
Written by
Ryan Chiavetta
Updated on : 12 May 2023
Securing Your Email Account
The most important and vulnerable account in your digital life is your email account. Your email can be the doorway to access numerous linked accounts and personal information. If an email account is compromised, a malicious actor could have the a...
Written by
Ryan Chiavetta
Updated on : 30 Mar 2023
Keep Your Browser(s) Updated
Here are steps for updating or checking to see if an update is available for your browser on the most popular browser platforms. Google Chrome Update (or Check for Updates) on Google Chrome - Google's instructions for checking and installi...
Updated on : 30 Mar 2023
Updating/Upgrading Mobile Devices or Computers
We recommend setting devices for automatic updates in order to receive the latest security patches from your device manufacturer. Sometimes those automatic updates don't happen, but here's you can update for your particular device. Apple Upd...
Written by
Ryan Chiavetta
Updated on : 29 Mar 2023
Helping Children Stay Safe Online
Whether you're using the internet for school, entertainment, or to keep in touch with friends and family, it's important to know how to stay safe while you're online. Today, we're going to talk about some best practices for staying safe online, an...
Written by
Ryan Chiavetta
Updated on : 03 Jul 2023
Social Engineering Red Flags
Scams and hackers use convincing stories to frame a situation, rush you into making a decision, and heighten your emotions in order to trick and defraud you. Here’s some common scams and some tips to recognize their schemes before you get scammed: ...
Written by
Ryan Chiavetta
Updated on : 29 Mar 2023
Virtual Private Network (VPN) Overview
This guide explains the ins and outs of a VPN, and how to set one up What Is a VPN? As the name implies, a virtual private network offers improved security when using the Internet. It is an encrypted connection between two endpoints. VPNs once h...
Written by
Ryan Chiavetta
Updated on : 29 Mar 2023
Brave Browser Settings iOS/Mac OS/Windows
Recommended Settings for Your Brave Browser Please use the following guidance to install and configure the Brave Browser on both your iOS and macOS/Windows devices. ➔ Check that the browser is up-to-date If using iPhone or iPad, navigate to ...
Written by
Ryan Chiavetta
Updated on : 31 Mar 2023
How to Securely Wipe Devices
Below are instructions to securely wipe your device SSD in the event of selling the device, trading it in, passing it on to a new user, or throwing it away. This process will prevent unauthorized access to data that was on your phone once it is out ...
Updated on : 29 Mar 2023
ChromeBook Security Hardening Guide
No matter how hard you try to secure your ChromeBook- the most important thing is to secure your Google account. Your Google account is the gate to your Chromebook, so you want to make sure you have the proper security measures set in place. Yo...
Written by
Ryan Chiavetta
Updated on : 29 Mar 2023
Apple Watch Security and Privacy Recommendations
What is the Purpose for Privacy and Security Hardening? Limit the information that is shared with device manufacturers and third party apps. Configuring Recommended Security & Privacy Settings ➔ Begin by navigating to the Settings app on your ...
Written by
Ryan Chiavetta
Updated on : 31 Mar 2023
Zoom Conference Security
Secure Your Zoom Meetings Please note, there is no true end-to-end encryption for this platform so urge caution with what is said or sent in chat rooms during meetings. ➔ Password Protect Meetings Add passwords to all meetings. Previousl...
Written by
Ryan Chiavetta
Updated on : 29 Mar 2023
Mail Fraud, Mail Theft and USPS Informed Delivery
This document serves as a guide to explain how mail fraud works, and what you can do to report it, as well as explains how to utilize USPS's Informed Delivery service. MAIL FRAUD What is mail fraud? Mail fraud is where scammers attempt to gain...
Written by
Ryan Chiavetta
Updated on : 30 Mar 2023
How to Check the Extensions on Your Browser
Occasionally you may find an extension on your browser that you did not download, or you may decide you want to uninstall an extension you no longer use. This guide will show you how to find the extensions installed on your browser. Google Chrome ...
Written by
Ryan Chiavetta
Updated on : 29 Mar 2023
AI and "Vishing:" An Overview and Preventative Measures
AI impersonation technology is a new and concerning cyber threat that uses machine learning algorithms to impersonate people online. Hackers can use this technology to create convincing, fake personas that they can use to trick their targets into di...
Written by
Ryan Chiavetta
Updated on : 02 Jun 2023
What to Do When You Are Impacted By a Data Breach
Data breaches can cause a great deal of headaches for victims, and even though the aftermath of a breach may seem stressful, it doesn't mean all hope is lost. There are steps you can take to minimize the risk you face following an incident. This gui...
Written by
Ryan Chiavetta
,
Ingrid Gliottone
Updated on : 22 Jun 2023
Best Practices for Keeping Children Safe Online
Whether you're using the internet for school, entertainment, or to keep in touch with friends and family, it's important to know how to stay safe while you're online. Today, we're going to talk about some best practices for staying safe online, an...
Written by
Ryan Chiavetta
Updated on : 05 Jul 2023
Resources for Children and Parents for Staying Safe Online
Educational Cybersecurity Resources for Kids We have compiled a few resources to share with your children to teach them the essentials of best practices for cybersecurity. CommonSense Media - Great resource for parents and kids alike. ...
Written by
Ryan Chiavetta
Updated on : 05 Jul 2023
An Overview of SIM Hijacking
SIM hijacking is a cyberattack that can cause victims a lot of headaches. It became notable enough for law enforcement agencies, such as the FBI, to issue warnings about SIM hijacking. This client guide will explain what SIM hijacking is, and how ...
Written by
Ryan Chiavetta
Updated on : 25 Jul 2023
Parental Controls for Popular Video Games/Discord
Online gaming allows players to connect with people all over the world. For children, this means they will likely interact with older players. It is a good idea to adjust security settings on the games your children play and turn on any parental con...
Written by
Ryan Chiavetta
,
Brian Hill
Updated on : 28 Aug 2023
Change password!
Changing your password will log you out immediately. Use the new password to log back in.
Current password
Current password is required
New password
New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password
Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password should be same as new password
Update
Change profile
Success!
First Name
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last Name
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
New email
Enter a valid email
Re-enter your password
Enter a valid password
Your profile has been successfully updated.
Update
Logout