Bigger Insights Privacy & Security Blog

Description

The Bigger Insights Privacy & Security blog helps you live a more private and secure life by exposing the latest threats to your privacy and security and teaching you how to mitigate them. The goal of this blog is to give you the education and insights you need to protect yourself, your family, your business, and your assets from all kinds of threats, whether those be:

  1. Corporate surveillance and tracking
  2. Device and browser fingerprinting
  3. Creepy and malicious advertisements
  4. Data breaches
  5. Account takeovers
  6. Ransomware and other malware
  7. Social engineering, phishing, spamming, and scamming

We’ll also be discussing many apps, services, devices, and operating systems including:

  1. Security Tools: Password managers, security keys, multi-factor authentication, encryption (drives, PGP, communications, documents, DNS), virtual machines (VM)
  2. Privacy Tools: VPNs, Tor Network, browsers and extensions, email alias services, virtual payment cards, metadata removal
  3. End-to-end encrypted email, text messaging, VOIP, documentation, file transfer and syncing between devices
  4. Mobile devices, PCs, IoT devices, “smart” devices, security systems
  5. Private and secure desktop OS: Linux, Qubes OS, TAILS, Whonix
  6. Private and secure mobile OS: GrapheneOS, CalyxOS

Bigger Insights is about sovereignty and resilience. In addition to our blog and podcast content, we provide consulting services to clients like you in one-on-one sessions. We help our clients achieve their goals and secure their future through finance, security, privacy, and technology. If you like this content, see our Finance and Technology blogs as well.

Posts

Mobile Phone - Cell Phone - Flip Phone - Dumb Phone - Man Using Flip Phone

Should You Use a Dumb Phone for Privacy & Security?

The constant stream of news regarding mobile phone spyware (e.g. Pegasus) and hacks may have you wondering – should you use a dumb phone for privacy and security? We often see criminals in movies and TV using dumb phones as burners, but does this really make you more private and secure relative to using a smart phone? We answer these questions in this episode, as well as impart some cold, hard truths about the privacy and security implications of voice (PSTN) and SMS. Finally, we wrap up by explaining some of the ways you can improve the security of your ...
Read More →
Cybersecurity - Password Manager - Lock - Nodes

Don’t Use LastPass, Use These Instead

LastPass is better than nothing, but is it the best password manager for you? We discuss pros, cons, and alternatives worth considering. LastPass has a lot going for it: Many features, good MFA support, handy password tools, emergency access, etc. However, LastPass has many issues to consider. LastPass has a terrible security track record - not something you want from a security service. Go to Wikipedia and read how many incidents they’ve had. In 2022, a hacker breached their corporate vault and stole their users’ vaults. We’ve since discovered that some users vaults are unnecessarily vulnerable to being cracked and ...
Read More →
Lawyer - Attorney - Law - Justice - Using Mobile Phone - Smiling - Man in Suit

Why Lawyers Should Care About Privacy & Security

On October 1, 2015, attorney Karla Salas received a highly-personalized text message about a wake for her friend’s deceased father. This message contained a link, which she clicked on. It was a targeted attack. In an instant, her phone had been hacked by a sophisticated spyware tool called Pegasus. She is not alone. In an unrelated incident, an anonymous UK attorney was targeted by the same spyware, this time through WhatsApp messages. If you’re thinking, “I’m not a high-profile lawyer working on a high-profile case, so I’ve got nothing to worry about.”, you’re mistaken. According to the Coveware, small and ...
Read More →
VPN - NordVPN - Privacy and Security - Use a More Trustworthy VPN

Don’t Use NordVPN, Use These Instead

If you’ve spent any time researching VPNs, you’ve probably heard of NordVPN. It’s basically in every top VPN review list. However, is it really as good as the marketers claim? We discuss the pros and cons of NordVPN, based on our own experiences, so you can make an informed decision. Please note that, as of the time of this writing: As of the time of this writing, we have no affiliations with any VPN provider We have neither been paid, nor requested by anyone to write any portion of this post The Good Side of NordVPN Let’s start out on ...
Read More →
QR Code Scanning - QR Code Dangers - Think Twice Before Scanning that Next QR Code - Malware - Phishing - Corporate Surveillance

Think Twice Before Scanning that Next QR Code

Being in the security industry can be downright depressing. Your neighborhood friendly system administrators and IT managers are probably questioning their lives at this very moment. As threats and threat actors become more sophisticated at an alarming rate, we still struggle with convincing everyday users to perform even the most basic security tasks. One of those tasks is inspecting links before you click on them. You can make a link appear as one URL, but point to a different one. For example, https://duckduckgo.com actually points to https://biggerinsights.com. When users don’t inspect links, this makes phishing and other attacks like shooting fish ...
Read More →
Cybersecurity - Login - Username - Password - Biometrics - Password Manager

Why You Need a Password Manager

If you’re not using a password manager, your passwords, accounts, and data are vulnerable. Do your passwords contain the names of your pet, spouse, or kids? What about phone numbers, dates, travel destinations, sports, or hobbies? Hackers understand how people create passwords and have powerful tools for cracking them. If you’re reusing passwords, you’re at high risk of multiple accounts being breached in a credential stuffing attack. Your passwords need to be unique enough to not be in password dictionaries, which contain billions of passwords. They also need to be strong enough to avoid being brute-forced by devices that can ...
Read More →
Virtual Private Network (VPN) - Connecting to VPN - Should You Use a VPN

Should You Use a Virtual Private Network (VPN)?

A Virtual Private Network (VPN) is networking technology intended to improve your privacy and security online or between networks. If you’ve spent any time in the privacy community, you’ve realized that there are a lot of heated and binary opinions, particularly around VPNs. The more devout members typically recommend that you only use the Tor network. Although Tor has a lot to offer, and VPNs certainly have their faults, the answer isn’t this black and white. For the purposes of this post, we’ll focus on commercially-available VPNs for personal use, particularly in regard to privacy. IP Address Tracking Before we ...
Read More →

Disclaimer

Bigger Insights, LLC, an Ohio limited liability company (“we”, “our”, or “us”), provides general educational information on various topics in our blogs, as a public service, which should not be construed as professional, financial, real estate, business, tax, legal, marital/relationship, family planning, health, or other advice. The content in our blogs only represents opinions and views expressed by the authors of said content. See our full Disclaimer for more details.

Scroll to Top