FAQ Password, Document, & Data Safety

FAQs

How Safe is my Password?

Passwords can be stolen through many kinds of attacks. Brute-force attacks, credential stuffing, traffic interception, and phishing are just a few of the many ways your passwords can be stolen. Using unique passwords and/or a password management tool can increase your safety online.

Are Password Managers Safe?

Passwords can be stolen through many kinds of attacks. Brute-force attacks, credential stuffing, traffic interception, and phishing are just a few of the many ways your passwords can be stolen. Using unique passwords and/or a password management tool like My LifeJars can increase your safety online.

What is Online Document Storage?

Online document storage is a way to organize and store all your digital files safely. This can be done through a website or an app, like My LifeJars. Online document storage also helps free up space on your computer, tablet, or phone.

You can store documents, photos, videos, presentations, and even graphics. Online document storage allows you to easily access and share your files anytime and from anywhere.

What is a Document Vault?

Think of a document vault like a secure virtual filing cabinet for all of your important documents. A document vault offers enhanced security. It also makes it easier to access and find your documents.

Storing your important documents in a document vault like the My LifeJars app allows for easy backup or disaster recovery so you don’t lose all your important documents in an accident, like a fire or flood or even a hack.

What is a Malware Attack?

A malware attack is one of the 3 major types and most common form of cyber attacks, although it’s an umbrella term for any malicious software installed on any device. Malware includes worms, viruses, trojans, spyware, keyloggers, bots and cryptojacking.

What are Computer Worms?

Computer worms are programs that can replicate and spread to other computers often using a network. They can infect several other computers concurrently causing exponential growth in the number of computers affected. Worms are different to viruses as they do not necessarily modify or corrupt files on the computer. However, they tend to damage networks by increasing network traffic and consuming bandwidth. 

What are Computer Viruses?

A computer virus is a piece of computer code that can spread between computers and is designed to damage a computer or steal data by modifying or deleting programs and files,altering the functionality of a computer or stop it working completely.

What are Trojans?

Trojans is a collective term for a trojan horse, which are viruses that infect computers and eventually stop their functionality.

What is a Trojan Horse?

A trojan horse is a virus that looks to be a piece of legitimate software to the person installing it onto their computer. As the program is launched it may appear to be working, but in reality it is slowly infecting the computer until it loses functionality.

What is Spyware?

Spyware is software that installs itself on a computer and starts covertly monitoring the user’s online behavior without their knowledge or permission. The spyware secretly gathers information about a person or organization and relays this data to other parties.

What is a Ransomware Attack?

A ransomware attack is one of the 3 major types of cyber attacks. It denies the user access to files or their computer or an organization’s network of computers or data storage until a ransom is paid to an unknown third-party.

What is a Phishing Attack?

A phishing attack is one of the 3 major cyber attacks, and is the process of deceiving a person into sharing sensitive information with an unknown third party. The attack begins with an email that looks convincing requesting sensitive information that the users discloses believing the request to be legitimate. This information is then used to steal assets.

What is a Brute-Force Attack?

This is a simple cyber-attack which uses automated methods, like software, to combine different letter-number combinations to gain access. If attackers know the password requirements for a specific company, they will apply that criteria to their attempts.

What is a Dictionary Attack?

This is a type of brute-force password attack that is based on a list of commonly used phrases, words, and passwords. This list could also include popular pet names, movie characters, and people.


Tags


You may also like

FAQ Organize Your Life

FAQ Organize Your Life

FAQ Journaling Your Life

FAQ Journaling Your Life
Leave a Reply

Your email address will not be published. Required fields are marked

  1. Hey there! Do you use Twitter? I’d like to follow you if that would be okay.
    I’m absolutely enjoying your blog and look forward to new
    posts.

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}