<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Tim Clemans]]></title><description><![CDATA[Software Engineer]]></description><link>https://timclemans-blog.fly.dev/</link><image><url>https://timclemans-blog.fly.dev/favicon.png</url><title>Tim Clemans</title><link>https://timclemans-blog.fly.dev/</link></image><generator>Ghost 5.43</generator><lastBuildDate>Wed, 13 May 2026 12:15:36 GMT</lastBuildDate><atom:link href="https://timclemans-blog.fly.dev/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Cyber Hygiene]]></title><description><![CDATA[<p>I put this together for a previous employer. It&apos;s slightly modified here.</p><p>Also, <a href="https://www.privacyguides.org/en/?ref=timclemans-blog.fly.dev">PrivacyGuides.org</a> is a solid website with tips on what tools to use. A little over the top for some users, but a good place to go if you have questions.</p><h1 id="personal-cybersecurity">Personal Cybersecurity</h1><p>Password reuse</p>]]></description><link>https://timclemans-blog.fly.dev/cyber-hygiene/</link><guid isPermaLink="false">6446c3d279d03402096a19f5</guid><dc:creator><![CDATA[Tim Clemans]]></dc:creator><pubDate>Wed, 03 May 2023 20:17:17 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1615632444708-267548ac666d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDI4fHxjeWJlcnxlbnwwfHx8fDE2ODMyMTUxOTM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1615632444708-267548ac666d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDI4fHxjeWJlcnxlbnwwfHx8fDE2ODMyMTUxOTM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="Cyber Hygiene"><p>I put this together for a previous employer. It&apos;s slightly modified here.</p><p>Also, <a href="https://www.privacyguides.org/en/?ref=timclemans-blog.fly.dev">PrivacyGuides.org</a> is a solid website with tips on what tools to use. A little over the top for some users, but a good place to go if you have questions.</p><h1 id="personal-cybersecurity">Personal Cybersecurity</h1><p>Password reuse and phishing are the top ways accounts are compromised and companies are hacked.</p><p>Using a password manager to ensure unique, strong and random passwords in conjunction with multi factor authentication mitigates this risk.</p><p>You should be securing both your personal and work accounts with a strong password from a password manager and multi factor authentication when possible.</p><h2 id="passwords"><strong>Passwords</strong></h2><ul><li>Must be long (15+ characters), unique, private, and random (generated by password manager)</li><li>Recommended Password Managers include <a href="https://www.1password.com/?ref=timclemans-blog.fly.dev">1Password </a>(paid) and <a href="https://www.bitwarden.com/?ref=timclemans-blog.fly.dev">Bitwarden </a>(free/paid, open source)</li><li>Pick a good Master Password (passphrase, or better yet, a password generated by a password manager that you memorize). It&apos;s ok to write down your master password and store it in a <strong>safe</strong> place until you memorize it. <a href="https://support.1password.com/strong-account-password/?ref=timclemans-blog.fly.dev">How to choose a good master password</a></li><li>Goal is to have unique passwords for each account.</li><li><strong>Don&#x2019;t</strong> store passwords or credentials in documents or share over email</li><li>&quot;Avoid generating passwords or password recovery pass phrases based on information that can be derived from publicly available information or social media. Malicious actors will attempt to perform a password recovery against a target, then attempt to determine the recovery question against the target&apos;s social media profiles.&quot; (added by a security consultant)</li></ul><h3 id="password-resources"><strong>Password resources</strong></h3><ul><li><a href="https://support.1password.com/explore/get-started/?ref=timclemans-blog.fly.dev">Getting started with 1Password</a></li><li><a href="https://www.privacyguides.org/en/passwords/?ref=timclemans-blog.fly.dev">https://www.privacyguides.org/en/passwords/</a></li></ul><h2 id="multi-factor-authentication-mfa"><strong>Multi-Factor Authentication (MFA)</strong></h2><p>Additional methods of authentication provide another layer of protection in case your password is compromised.</p><p>We will mostly be using cell phone apps as our second method of authentication.</p><p><strong>Use MFA for any accounts/logins that support it. </strong>But especially your important accounts, like your main Email, your Bank, social media, etc. </p><ul><li>Google Account (Gmail, etc.)</li><li>Bank</li><li>Tax software</li><li>Social media sites</li><li>Any business resources should have MFA enabled</li></ul><p>Some MFA methods are stronger than others. Here&#x2019;s a list in order of strength:</p><ol><li>Hardware Keys</li><li>Authentication App - Push Notifications</li><li>Authentication App - One Time Codes</li><li>Email</li><li>SMS/Text message</li></ol><h3 id="recommended-mfa-apps"><strong>Recommended MFA Apps</strong></h3><ul><li><a href="https://authy.com/?ref=timclemans-blog.fly.dev">Authy</a> - syncs to cloud, open source</li><li>Google Authenticator - no backups</li><li><a href="https://support.microsoft.com/en-us/account-billing/download-and-install-the-microsoft-authenticator-app-351498fc-850a-45da-b7b6-27e523b8702a?ref=timclemans-blog.fly.dev">Microsoft Authenticator</a></li><li><a href="https://raivo-otp.com/?ref=timclemans-blog.fly.dev">Ravio</a> - syncs to iCloud</li><li>1Password&apos;s 2FA (but don&apos;t store your 2FA for 1Password in 1Password &#x1F642;)</li><li>Also see <a href="https://www.privacyguides.org/en/multi-factor-authentication/?ref=timclemans-blog.fly.dev#authenticator-apps">PrivacyGuide.org recommendations</a></li></ul><h2 id="phishing"><strong>Phishing</strong></h2><p>Phishing is when you receive a fake email or text message that tries to get you to click a link, download a file or fill out a password form.</p><ul><li>Take this phishing quiz:<a href="https://phishingquiz.withgoogle.com/?ref=timclemans-blog.fly.dev"> phishingquiz.withgoogle.com</a></li><li>A CEO or manager won&#x2019;t ask you to purchase gift cards or wire money</li><li>Only open attachments if you are expecting them and they are in a format you are comfortable with.</li><li>Opening documents in Google Docs or Google Drive is better. Since you won&#x2019;t be opening them on your computer.</li><li>If you are suspicious of an email or a request then confirm with the sender via another channel (e.g. Slack/Mattermost, Signal/Whatsapp, phone call, etc.)</li><li>If you receive Spam text messages, report the message to your carrier and block the unknown sender. <a href="https://consumer.ftc.gov/articles/how-recognize-and-report-spam-text-messages?ref=timclemans-blog.fly.dev#what_to_do">What to do about Spam Text Messages</a></li><li>&quot;Users should take extra time when they receive an email in which the sender is attempting to induce a sense of urgency, even if the email appears to have come from a coworker. Anything that is urgent, the user should take an extra moment to look for other suspicious indicators. This is a common tactic utilized to get people to skip steps in their process or just click a link or download an attachment without verifying.&quot; - security consultant</li></ul><h3 id="phishing-resources"><strong>Phishing Resources</strong></h3><ul><li><a href="https://ssd.eff.org/en/module/how-avoid-phishing-attacks?ref=timclemans-blog.fly.dev">How to avoid phishing attacks</a></li><li><a href="https://about.gitlab.com/handbook/security/?ref=timclemans-blog.fly.dev#how-to-identify-a-basic-phishing-attack">How to identify phishing attacks</a></li></ul><h2 id="opsec-beware-of-what-you-share"><strong>OPSEC (beware of what you share)</strong></h2><p>Operational Security (OPSEC) is &#x201C;the process of protecting individual pieces of data that could be grouped together to give the bigger picture&#x201D; -<a href="https://en.wikipedia.org/wiki/Operations_security?ref=timclemans-blog.fly.dev"> Wikipedia</a></p><p>Be cautious of what you post on social media. Don&#x2019;t overshare.</p><p>Lock down your Instagram, Facebook, etc. Set to private.</p><p>Don&#x2019;t leave &#x201C;breadcrumbs&#x201D; of information on the internet; like Company info, addresses, etc.<br></p><h2 id="additional-security-resources">Additional Security Resources</h2><ul><li><a href="https://danielmiessler.com/blog/not-all-mfa-is-equal-and-the-differences-matter-a-lot/?ref=timclemans-blog.fly.dev">Not All MFA is Equal</a></li><li><a href="https://brianlovin.com/security?ref=timclemans-blog.fly.dev">Security Checklist</a></li><li><a href="https://sudo.pagerduty.com/?ref=timclemans-blog.fly.dev">Open source security training</a></li></ul>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[<p>Blog posts on the following:</p><ul><li>How to self host: MatterMost and Outline</li><li>How to setup your own personal &quot;netflix&quot; with Plex</li><li>Walk-through of how to setup GPT4 with Siri</li></ul>]]></description><link>https://timclemans-blog.fly.dev/coming-soon/</link><guid isPermaLink="false">643dc7d1c5b821020a3b57f6</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Tim Clemans]]></dc:creator><pubDate>Mon, 17 Apr 2023 22:27:29 GMT</pubDate><content:encoded><![CDATA[<p>Blog posts on the following:</p><ul><li>How to self host: MatterMost and Outline</li><li>How to setup your own personal &quot;netflix&quot; with Plex</li><li>Walk-through of how to setup GPT4 with Siri</li></ul>]]></content:encoded></item></channel></rss>