Everyday Cyber Safety Practices

by Spencer Coursen

Recent news has once again shed light onto the ever increasing need to engage your cyber security with the same vigilance as your personal security.  All too often, our own complacency leaves us vulnerable to the exploitation efforts of the less than noble.  You don’t need to be a skilled practitioner of computer science or a tech guru to keep yourself safe.  You just need to know and employ the basics as discussed below:

  • Install strong virus and malware protection for all computers that access social networking sites.  Be sure to update the software whenever possible.  When the pop-up screen for an update is available try to always click “download and install” rather than “remind me later.”  Cyber probes and attacks increase greatly in the timeframe between software updates when they have figured out the old system, but have yet to figure out the new.  Don’t tip the advantage to the favor of your adversary.

  • Passwords should be strong and frequently changed.  It is important to not use the same password for more than one site, nor is it good to keep the same passwords in rotation.  Strong passwords are at least 6 characters long and combine numbers, symbols and letters (in varying case)  Do not use any passwords that contain anything that might be found in a dictionary or which have a personal association i.e.; your SS #,  school sports number (Jordan23) or anything with your day, month, year of birth.  The stronger a password, the more difficult it will be to be guessed or hacked.  4U@7Yu is a much stronger password than pass123word

  • Do not visit unknown websites sent to you via private messages and emails from persons you don’t know know - this also goes for website invites which may seem out of character for those persons you do know.  Your mom is very likely not recommending you buy pharmaceuticals from Korea.  If it seems like a fraud...it’s a fraud.

  • Social Media should never include private information.  Don’t put anything on your social media page you would not be comfortable sharing with everyone.  Privacy settings on websites like Facebook, LinkedIn, Twitter, Instagram and a variety of other social-sharing sites change often.  Familiarize yourself with the site’s privacy settings and be sure take advantage of the options offering you the most privacy.  Pictures of your home, car, and associated geotags are all useful pieces of information a potential hacker may use to exploit your cyber identity.

  • Create unique answers to password recovery questions.  Inevitably we will all at one time or another forget a password.  When setting up your recovery options, it is perfectly acceptably to answer the generic questions with something completely random. These answers are not checked for truthfulness and are simply in place to protect your information from unauthorized attempts at gaining access.  Cyber criminals are quite skilled at finding out the real answers to these password challenge questions from friends, colleagues, or from information you or your online acquaintances have previously posted online.  For the purposes of password recovery,  “Abracadabra” is a perfectly acceptable answer to “What is your mothers maiden name?” Your own imagination is often times your best security option.

  • Do not “jail break” your mobile device.  Doing so requires the user to disable the intrinsic security features of the device which means malicious applications will have access to all facets of information on your phone - regardless of your permission.  Applications downloaded from verified vendors like Apple’s App Store have requirements that help protect the user.  These requirements are bypassed once the jailbreak has taken place, which means the applications will no longer need to ask your permission before granting access to your contacts, GPS location or information associated with other files on your phone, like your pictures, text messages and emails.

  • Do not engage in illegal downloads.  Unlicensed internet services offering free downloads, zip files, or torrents of movies, music and other software packages often contain malicious spyware that is specifically designed to exploit your cyber security.  These illegal downloads are often the main distribution method for delivering a virus or a trojan horse to your system.

  • Create specific email addresses for specific uses.  Avoid using the same email account for all of your internet activity.  Employing task-specific email addresses will reduce your vulnerability by having your activities compartmentalized into those specific email accounts, and will limit the amount of damage any one compromised account can do to your overall cyber security.  There is no limit to email addresses you may create.  Trust me, you’ll still be able to find the friends you want to follow, it just won’t be as easy for them to find you...this is a good thing. Having one email account for Facebook, one for twitter, another for correspondence, and yet another for e-commerce is perfectly acceptable and encouraged.

  • Do not label folders or sub-folders with titles that promote intrigue or interest.  Labels such as “Passwords”  “Bank Account” and “Important” are all specifically targeted items of interest in cyber attacks and probing mechanisms.  Instead, label things with specific meaning to you with names of seemingly unrelated associations.  If you’re favorite dessert is chocolate cake this may be the name of your favorites folder, whereas the food that gives your heartburn may be the appropriately named folder associated with your annoying co-worker.  This practice also works great for the “notes” application on your mobile device.

  • Utilize “Drafts” in an unassociated email account.  With every website requiring a unique sequence of usernames, passwords, and additional log in features, it is often hard to keep track of them all - especially when they are all independently changed at varying intervals. Creating an additional email address known only to you, and then storing this information in a “Draft Email”  will afford you a secure online hiding place for your information that you can access globally.

  • Log out of accounts when done.  You don’t have to shut down your computer, but the simple act of logging out of accounts especially on shared wifi, networks or computers (think Starbucks free wifi) will prevent the unfavorable access of your private information.

Following these everyday practices will reduce your own likelihood of being victimized, and will help you to prepare today for a safer tomorrow.

On the radio program this week, Glenn Beck and Pat Gray discussed a series of recent polls that suggest presidential nominee Joe Biden's expected lead may be slipping with traditionally Democratic voters.

A new poll conducted by the Jewish Electorate Institute shows that two-thirds of Jewish voters still plan to vote for the Biden-Harris ticket in November. However, President Donald Trump's support within the Jewish community is also the highest among any Republican candidate in recent history.

In more bad news for Biden, a CNN poll (yes, CNN) released last month showed growing support for President Trump among black voters in swing states. Meanwhile, his support among Latino voters remains at roughly 33%.

"I don't think it's going to go the way the Democrats hope that it will," Glenn said of the election. "If you look at the groups that the Democrats have carefully fostered ... that's falling apart. If Donald Trump can grow that by 5%, and hurt the Democrats by 5% ... that alone could swing the election."

Watch the video below to catch more of the conversation:

Want more from Glenn Beck?

To enjoy more of Glenn's masterful storytelling, thought-provoking analysis and uncanny ability to make sense of the chaos, subscribe to BlazeTV — the largest multi-platform network of voices who love America, defend the Constitution and live the American dream.

We're being set up for a civil war. The Left is grooming us for an Eastern European-style revolution this election, and they're not even trying to hide it any more. The playbook for Mainstreet USA is the exact same that has been used in places like Ukraine, initiated by the same people in order to completely upend the American system.

On his Wednesday night special this week, Glenn Beck takes us through a tale of three chalkboards that will connect the dots: the Obama admin in Ukraine, the State Department's relationship with George Soros, Black Lives Matter and Antifa riots, the Great Reset, public school indoctrination, mail-in voting. It all points to something dangerous happening in November if we don't act now.

Watch the full video below:


The only way to watch the extended episode of tonight's show is on BlazeTV. Start your free trial and get $20 off a one-year subscription with code BANTHIS.

Want more from Glenn Beck?

To enjoy more of Glenn's masterful storytelling, thought-provoking analysis and uncanny ability to make sense of the chaos, subscribe to BlazeTV — the largest multiplatform network of voices who love America, defend the Constitution and live the American dream


The left has already determined that the wildfires raging across the West Coast were definitely caused by climate change and Big Tech is determined to silence anyone who dares suggest otherwise. Facebook even announced a sweeping policy on Saturday to remove posts that claim the fires were caused by arson from far-left activists.

But on his radio program Wednesday, Glenn Beck revealed multiple arrest records for suspected arsonists in California, Oregon, and Washington — and several of those charged and arrested were also instigators in Black Lives Matter rallies, violent protests, and Antifa riots. He also called out the "news gods" in Big Tech, daring them to try to censor his video.

"I asked my staff, to see if there was any evidence [of arson] on the fires. And I don't mean evidence from Twitter. I mean evidence. Is there anybody who has been arrested for arson?" Glenn said. "Well, here they are. And YouTube and Facebook, go ahead. I want you to demonetize this clip. I want you to somehow or another say that we're lying. I want you to throttle this. Go ahead. Because then you're going to have to explain what we got wrong. And I happen to have all the documents right here. So my attorney is really ready for that throttling or demonetization. You say you're a protector of the truth? Great, here it is."

Glenn read off the first 10 arrest records, which combined allege the destruction of more than 120,000 acres and 700 structures, as well as tens of thousands of people evacuated from their homes.

"You want to tell us, PolitiFact, how you came to the conclusion ... that there was no arson in these fires?" Glenn asked. "Can you tell me how you came to that conclusion? Because your fact-check seems to be entirely false."

Watch the video below for more details:


Want more from Glenn Beck?

To enjoy more of Glenn's masterful storytelling, thought-provoking analysis and uncanny ability to make sense of the chaos, subscribe to BlazeTV — the largest multi-platform network of voices who love America, defend the Constitution and live the American dream.

Former White House press secretary Sarah Huckabee Sanders joined Glenn Beck on this week's podcast to share her unique perspective as a trusted adviser and confidante to President Donald Trump for two and a half years, which she also details in her new book, "Speaking for Myself: Faith, Freedom, and the Fight of Our Lives Inside the Trump White House."

Sarah described the unprecedented levels of corruption she saw firsthand during the Russia probe and shocking lengths to which Democratic leaders and the mainstream media would go to "take the president down."

Sarah said she often saw sides of Donald Trump that the media never covered. Recently, she went on the record denying the Atlantic's claims that the president mocked our military during a 2018 trip to France. She was on that trip, she told Glenn, and her account of what really happened paints a very different picture.

"The people who are making this outrageous charge are such cowards for doing so in an anonymous way. If you really believed this, and believed it was wrong, one, why did it take you so long? And, two, put your name on it the way the rest of us have," Sarah said.

"He didn't say those things. Not only was I there that day, Glenn, I spent two and a half years traveling all over the world with the president, watching him interact with men and women of our armed forces almost every single day during that two-and-a-half year period," she added.

"This is a person who loves America and loves the people who allow the rest of us to live in America, free, and have prosperity. And I got to see that a lot. I think it is shameful that people are trying to distort who he is and what he has done, particularly when it comes to the men and women in the military."

Watch a clip from the full interview with Sarah Huckabee Sanders below:

Find the full podcast below, on Glenn's YouTube channel or on Blaze Media's podcast network.


Want to listen to more Glenn Beck podcasts?

Subscribe to Glenn Beck's channel on YouTube for FREE access to more of his masterful storytelling, thought-provoking analysis and uncanny ability to make sense of the chaos, or subscribe to BlazeTV — the largest multi-platform network of voices who love America, defend the Constitution and live the American dream.