Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
History
Business
Sports
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/bb/d2/fb/bbd2fb34-d4b4-396c-cecd-9b9d1bf4cab8/mza_10504351678181233505.jpg/600x600bb.jpg
Super Simple Security Principles
Makani Mason
101 episodes
4 days ago
Learn how to think not what to think.
Show more...
Technology
Education,
How To
RSS
All content for Super Simple Security Principles is the property of Makani Mason and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Learn how to think not what to think.
Show more...
Technology
Education,
How To
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/bb/d2/fb/bbd2fb34-d4b4-396c-cecd-9b9d1bf4cab8/mza_10504351678181233505.jpg/600x600bb.jpg
96. Why Your Email Account Should Only Be For Email
Super Simple Security Principles
1 week ago
96. Why Your Email Account Should Only Be For Email
Episode summaryI believe your email account should only be for email. Instead, most free email providers turn your email account into an account for all their services.Google is probably the worst for this. Your Gmail account is actually a Google account that gives you access to Google Docs, Google Drive, Google Photos, Google Chat, YouTube, and much more.On top of that, many websites allow you to "Log in with Gmail." This expands even further the number of accounts that are directly connected to your email account.Taken all together, this is a security nightmare. Email accounts are already enough of a master key to your online identity, just through their ability to reset forgotten passwords.All these accounts being tied to your email also means a lot more opportunities for you to get caught in a phishing attack - because you’re entering your email password not just to access your email, but to access all sorts of other services as well.Linkshttps://workspace.google.com/blog/identity-and-security/defending-against-account-takeovers-top-threats-passkeys-and-dbsc (https://workspace.google.com/blog/identity-and-security/defending-against-account-takeovers-top-threats-passkeys-and-dbsc)https://blog.checkpoint.com/research/phishing-trends-q2-2025-microsoft-maintains-top-spot-spotify-reenters-as-a-prime-target/ (https://blog.checkpoint.com/research/phishing-trends-q2-2025-microsoft-maintains-top-spot-spotify-reenters-as-a-prime-target/)Get the FREE Bulletproof My Identity Starter Kit (https://bulletproofmyid.com)Get help from Makani (https://forum.makanimason.com)
Super Simple Security Principles
Learn how to think not what to think.