{"id":15687,"date":"2018-04-19T00:00:00","date_gmt":"2018-04-19T00:00:00","guid":{"rendered":"http:\/\/blog.toggl.com\/computer-security-guide\/"},"modified":"2024-06-12T06:29:36","modified_gmt":"2024-06-12T06:29:36","slug":"computer-security-guide","status":"publish","type":"post","link":"https:\/\/toggl.com\/blog\/computer-security-guide","title":{"rendered":"An Error-Proof Guide to Computer Security [Comic]"},"content":{"rendered":"<p>Most computer security<b><i>\u00a0<\/i><\/b>mishaps are a result of human error. Sure, systems can fail. However, most of the time, humans are the weak link. When it comes to digital security, the best tips are often the simplest. Here are our top six:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11004\" src=\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2018\/04\/computer-security-comic.jpg\" alt=\"computer-security-comic\" width=\"800\" height=\"6137\" \/><\/p>\n<p>This comic was created by\u00a0<a title=\"\" href=\"http:\/\/www.safelyendangered.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Safely Endangered comics<\/a>\u00a0for the Toggl Team \u2013 the people behind <a title=\"\" href=\"https:\/\/toggl.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">the\u00a0world\u2019s no. 1-time tracking app.<\/a> So what are these tips really about? Well let\u2019s break them down:<\/p>\n<h2>1. Use strong passwords<\/h2>\n<p>We know, you\u2019ve heard it a million times. But maybe this time it will stick.<\/p>\n<p>Using a <a title=\"\" href=\"https:\/\/support.1password.com\/strong-master-password\/\" target=\"_blank\" rel=\"noopener noreferrer\">series of random words<\/a> is much more secure a password then a jumble of letter and numbers. It makes the passwords you do need to remember (like the one to your password manager), more secure. It takes a computer much longer to guess full words than random letter scrambles.<\/p>\n<p>Opening a dictionary and just picking words at random is a good strategy. Want to know more about what makes a good password? Check out this <a title=\"\" href=\"https:\/\/xkcd.com\/936\/\" target=\"_blank\" rel=\"noopener noreferrer\">XKCD comic<\/a>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10930\" src=\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2018\/04\/password_strength.png\" alt=\"password_strength\" width=\"740\" height=\"601\" \/><\/p>\n<h2>2. Don\u2019t reuse passwords<\/h2>\n<p>Don\u2019t just use a variation of the same password. If someone guesses one password then a computer can, with ease, guess your variations, making it highly insecure. See comic above for more info.<\/p>\n<h2>3. Use a password manager<\/h2>\n<p>Let\u2019s face it: your brain is a dummy. It won\u2019t be able to remember plenty of good passwords. And after all, the best passwords are the ones you don\u2019t remember. A password manager is the only way to have a wide variety of truly secure passwords.<\/p>\n<p>Password managers are easy to use, cheap or free, and can save major frustrations in the long run. <strong>Worried what could happen if someone gets the password to your password manager? <\/strong>This is a common reason cited for not using managers and it\u2019s a bad one at that. Why?<\/p>\n<p>Most password managers use multiple login verification\u00a0steps. So if someone did get your password, they still wouldn\u2019t be able to login. Good managers will also have the option to enable 2-factor-authentication. Don\u2019t know what that is? Skip down to #5 for more info.<\/p>\n<h2>4. Look at URLs<\/h2>\n<p>Never enter personal information before knowing that you\u2019re on the correct site. Phishing is one of the easiest ways for hackers to get your information. What is phishing?<\/p>\n<p>Phishing\u00a0is the attempt to obtain sensitive information such as usernames, passwords, and credit card details etc. for malicious reasons, by disguising as a trustworthy entity (such as a site you know and trust with your information) in an electronic communication.<\/p>\n<p><strong>Always check URLs before you click on links (in emails and online).<\/strong>\u00a0Make sure you\u2019re on the right page when you enter login information. After all, it could be just a fancy copycat.<\/p>\n<h2>5. Don\u2019t allow physical access to your machine<\/h2>\n<p>This one is a bit different from the rest. The physical security of devices is important partially because people don\u2019t often think of it when they hear \u2018digital security.\u2019 Your actual physical phone or computer tends to be where you let your guard down.<\/p>\n<p>If you have an unlocked device, it wouldn\u2019t take much time for someone to install programs that do tons of fun malicious things (like tracking your keystrokes to get your passwords) without your knowledge. Make sure you lock your computer when you leave it and always protect it, and your other devices, with secure passwords.<\/p>\n<h2>6. Enable 2 Factor Authentication<\/h2>\n<p>If someone steals your password, then <strong>2FA can prevent them from logging into all your precious accounts<\/strong>.\u00a02 Factor Authentication means that you\u2019ll need 2 devices to login. Generally, the devices are a cellphone and a computer. Your first device (let\u2019s say your computer) will need a token (generally a string of random numbers or letter) that you can retrieve from an app on your phone.<\/p>\n<p>Enter it after your password and you\u2019re in your account. Don\u2019t have the second code? No dice. This helps prevent strangers from getting into your accounts. Unless someone takes your phone, then you may be screwed.<\/p>\n<p>We don\u2019t mean to worry you and by no means should you throw your computer out the window in an attempt to rid yourself of this threatening digital world to which you\u2019ve just been exposed. Instead, we\u2019d like you to <strong>think of the internet as a busy city. <\/strong><\/p>\n<p>It\u2019s somewhere you can go and experience amazing things. Sure, there are bad things that happen. But as long as <strong>you know what to look for and approach your activities with warranted caution<\/strong>, you\u2019ll be able to still have those experiences that drew you there initially.<\/p>\n<p>Now go change your passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most computer security\u00a0mishaps are a result of human error. Sure, systems can fail. However, most of the time, humans are the weak link. When it comes to digital security, the best tips are often the simplest.<\/p>\n","protected":false},"author":308,"featured_media":31373,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[857],"tags":[],"class_list":["post-15687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-creative"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>An Error-Proof Guide to Computer Security [Comic]<\/title>\n<meta name=\"description\" content=\"Most computer security mishaps are a result of human error. When it comes to digital security, the best tips are often the simplest. Here are our top six.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/toggl.com\/blog\/computer-security-guide\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Error-Proof Guide to Computer Security [Comic]\" \/>\n<meta property=\"og:description\" content=\"Most computer security mishaps are a result of human error. When it comes to digital security, the best tips are often the simplest. Here are our top six.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/toggl.com\/blog\/computer-security-guide\" \/>\n<meta property=\"og:site_name\" content=\"Toggl Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Toggl\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-12T06:29:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2018\/04\/computer-security-comic.jpg\" \/>\n<meta name=\"author\" content=\"Emma Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@toggl\" \/>\n<meta name=\"twitter:site\" content=\"@toggl\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide#article\",\"isPartOf\":{\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide\"},\"author\":{\"name\":\"Emma Murray\",\"@id\":\"https:\/\/toggl.com\/blog\/#\/schema\/person\/8d97021f83fa54f3dac4915ce1c57459\"},\"headline\":\"An Error-Proof Guide to Computer Security [Comic]\",\"datePublished\":\"2018-04-19T00:00:00+00:00\",\"dateModified\":\"2024-06-12T06:29:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide\"},\"wordCount\":795,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/toggl.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/08\/blog-image-2.jpeg\",\"articleSection\":[\"Time Killers\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide\",\"url\":\"https:\/\/toggl.com\/blog\/computer-security-guide\",\"name\":\"An Error-Proof Guide to Computer Security [Comic]\",\"isPartOf\":{\"@id\":\"https:\/\/toggl.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide#primaryimage\"},\"image\":{\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/08\/blog-image-2.jpeg\",\"datePublished\":\"2018-04-19T00:00:00+00:00\",\"dateModified\":\"2024-06-12T06:29:36+00:00\",\"description\":\"Most computer security mishaps are a result of human error. When it comes to digital security, the best tips are often the simplest. Here are our top six.\",\"breadcrumb\":{\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/toggl.com\/blog\/computer-security-guide\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide#primaryimage\",\"url\":\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/08\/blog-image-2.jpeg\",\"contentUrl\":\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/08\/blog-image-2.jpeg\",\"width\":1143,\"height\":690},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/toggl.com\/blog\/computer-security-guide#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/toggl.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An Error-Proof Guide to Computer Security [Comic]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/toggl.com\/blog\/#website\",\"url\":\"https:\/\/toggl.com\/blog\/\",\"name\":\"Toggl Blog\",\"description\":\"Everything works much better with Toggl\",\"publisher\":{\"@id\":\"https:\/\/toggl.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/toggl.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/toggl.com\/blog\/#organization\",\"name\":\"Toggl\",\"url\":\"https:\/\/toggl.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/toggl.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/10\/toggl-logo.png\",\"contentUrl\":\"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/10\/toggl-logo.png\",\"width\":814,\"height\":814,\"caption\":\"Toggl\"},\"image\":{\"@id\":\"https:\/\/toggl.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Toggl\/\",\"https:\/\/x.com\/toggl\",\"https:\/\/www.instagram.com\/usetoggl\/\",\"https:\/\/www.linkedin.com\/company\/toggl\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/toggl.com\/blog\/#\/schema\/person\/8d97021f83fa54f3dac4915ce1c57459\",\"name\":\"Emma Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/a4afa191a91b79c542f8ff3d0774a937344d9a74ce1e4a786b93c0d3b5119b9c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a4afa191a91b79c542f8ff3d0774a937344d9a74ce1e4a786b93c0d3b5119b9c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a4afa191a91b79c542f8ff3d0774a937344d9a74ce1e4a786b93c0d3b5119b9c?s=96&d=mm&r=g\",\"caption\":\"Emma Murray\"},\"description\":\"Emma Murray makes content and content and even more content. She believes everyone has a few good words in them. She also does photojournalism here: https:\/\/www.emmakathleenmurray.com\/\",\"url\":\"https:\/\/toggl.com\/blog\/author\/emma-murray\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An Error-Proof Guide to Computer Security [Comic]","description":"Most computer security mishaps are a result of human error. When it comes to digital security, the best tips are often the simplest. Here are our top six.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/toggl.com\/blog\/computer-security-guide","og_locale":"en_US","og_type":"article","og_title":"An Error-Proof Guide to Computer Security [Comic]","og_description":"Most computer security mishaps are a result of human error. When it comes to digital security, the best tips are often the simplest. Here are our top six.","og_url":"https:\/\/toggl.com\/blog\/computer-security-guide","og_site_name":"Toggl Blog","article_publisher":"https:\/\/www.facebook.com\/Toggl\/","article_published_time":"2018-04-19T00:00:00+00:00","article_modified_time":"2024-06-12T06:29:36+00:00","og_image":[{"url":"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2018\/04\/computer-security-comic.jpg","type":"","width":"","height":""}],"author":"Emma Murray","twitter_card":"summary_large_image","twitter_creator":"@toggl","twitter_site":"@toggl","twitter_misc":{"Written by":"Emma Murray","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/toggl.com\/blog\/computer-security-guide#article","isPartOf":{"@id":"https:\/\/toggl.com\/blog\/computer-security-guide"},"author":{"name":"Emma Murray","@id":"https:\/\/toggl.com\/blog\/#\/schema\/person\/8d97021f83fa54f3dac4915ce1c57459"},"headline":"An Error-Proof Guide to Computer Security [Comic]","datePublished":"2018-04-19T00:00:00+00:00","dateModified":"2024-06-12T06:29:36+00:00","mainEntityOfPage":{"@id":"https:\/\/toggl.com\/blog\/computer-security-guide"},"wordCount":795,"commentCount":5,"publisher":{"@id":"https:\/\/toggl.com\/blog\/#organization"},"image":{"@id":"https:\/\/toggl.com\/blog\/computer-security-guide#primaryimage"},"thumbnailUrl":"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/08\/blog-image-2.jpeg","articleSection":["Time Killers"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/toggl.com\/blog\/computer-security-guide","url":"https:\/\/toggl.com\/blog\/computer-security-guide","name":"An Error-Proof Guide to Computer Security [Comic]","isPartOf":{"@id":"https:\/\/toggl.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/toggl.com\/blog\/computer-security-guide#primaryimage"},"image":{"@id":"https:\/\/toggl.com\/blog\/computer-security-guide#primaryimage"},"thumbnailUrl":"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/08\/blog-image-2.jpeg","datePublished":"2018-04-19T00:00:00+00:00","dateModified":"2024-06-12T06:29:36+00:00","description":"Most computer security mishaps are a result of human error. When it comes to digital security, the best tips are often the simplest. Here are our top six.","breadcrumb":{"@id":"https:\/\/toggl.com\/blog\/computer-security-guide#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/toggl.com\/blog\/computer-security-guide"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/toggl.com\/blog\/computer-security-guide#primaryimage","url":"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/08\/blog-image-2.jpeg","contentUrl":"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/08\/blog-image-2.jpeg","width":1143,"height":690},{"@type":"BreadcrumbList","@id":"https:\/\/toggl.com\/blog\/computer-security-guide#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/toggl.com\/blog\/"},{"@type":"ListItem","position":2,"name":"An Error-Proof Guide to Computer Security [Comic]"}]},{"@type":"WebSite","@id":"https:\/\/toggl.com\/blog\/#website","url":"https:\/\/toggl.com\/blog\/","name":"Toggl Blog","description":"Everything works much better with Toggl","publisher":{"@id":"https:\/\/toggl.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/toggl.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/toggl.com\/blog\/#organization","name":"Toggl","url":"https:\/\/toggl.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/toggl.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/10\/toggl-logo.png","contentUrl":"https:\/\/toggl.com\/blog\/wp-content\/uploads\/2022\/10\/toggl-logo.png","width":814,"height":814,"caption":"Toggl"},"image":{"@id":"https:\/\/toggl.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Toggl\/","https:\/\/x.com\/toggl","https:\/\/www.instagram.com\/usetoggl\/","https:\/\/www.linkedin.com\/company\/toggl"]},{"@type":"Person","@id":"https:\/\/toggl.com\/blog\/#\/schema\/person\/8d97021f83fa54f3dac4915ce1c57459","name":"Emma Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a4afa191a91b79c542f8ff3d0774a937344d9a74ce1e4a786b93c0d3b5119b9c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a4afa191a91b79c542f8ff3d0774a937344d9a74ce1e4a786b93c0d3b5119b9c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a4afa191a91b79c542f8ff3d0774a937344d9a74ce1e4a786b93c0d3b5119b9c?s=96&d=mm&r=g","caption":"Emma Murray"},"description":"Emma Murray makes content and content and even more content. She believes everyone has a few good words in them. She also does photojournalism here: https:\/\/www.emmakathleenmurray.com\/","url":"https:\/\/toggl.com\/blog\/author\/emma-murray"}]}},"_links":{"self":[{"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/posts\/15687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/users\/308"}],"replies":[{"embeddable":true,"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/comments?post=15687"}],"version-history":[{"count":6,"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/posts\/15687\/revisions"}],"predecessor-version":[{"id":26291,"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/posts\/15687\/revisions\/26291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/media\/31373"}],"wp:attachment":[{"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/media?parent=15687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/categories?post=15687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/toggl.com\/blog\/wp-json\/wp\/v2\/tags?post=15687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}