5 answers to common tech questions revealed

6 min read
fairly easy
A woman called her company's tech support desk, and the technician asked for her password.
She replied, "Snow White Cinderella Snoopy Dopey Pinocchio Harry Potter Ariel 5." The technician said, "That's a great long password." The woman replied, "Thank you! I was told my password needs to have seven characters and one number."

Jokes aside, you should never give anyone your password. As hacking methods get more sophisticated, there are new rules for creating hard-to-crack passwords. Tap or click here to make sure your passwords are up to snuff.

It's also essential to set up two-factor authentication (2FA) on your accounts. If someone tries to hack your account, he won't have access to the one-time code sent to your phone or email. Here is a step-by-step guide to setting up 2FA on your Facebook, Google, Twitter, Instagram, and Dropbox accounts.

There are common questions those of us in technology continually answer. If you want to endear yourself to your IT department techs, share this post with your family, friends, and co-workers. They'll thank you later.

1. I got an email that says the sender has a video of me taken with my webcam while I was watching porn. He is threatening to release the video if I don't pay him. He showed me a password that was real!

You're the victim of a sextortion scam. I bet that password is one you've used before and if so, change it now. It's details like these that frighten people into paying.

Here's what is happening. Scammers scrape your email address along with other information from data breaches or public listings. They compile this information to appear as if you alone are being targeted. The truth is, they're sending a similar email to as many people as possible.

Tap or click here to see if your email address and passwords are part of about 10 billion records of stolen data.

Get the podcast: Have I Been Pwned? is the world's largest database of stolen user names and passwords. I spoke to the man behind it, Troy Hunt, for this step-by-step guide on what you can do if your information has been compromised. Don't…
The Kim Komando Show
Read full article