Channel Avatar

The Security Advocate @UCmW6a9UfdaXXQ1COx8eUP8Q@youtube.com

859 subscribers - no pronouns :c

The Security Advocate specializes in explaining computer sec


08:54
Security Awareness Basics: Proper Data Disposal
05:22
Security Awareness Basics: Physical Security
06:25
Security Awareness Basics: Encryption
16:24
Security Awareness Basics: Mobile Devices
05:45
Security Awareness Basics: Data Breaches
13:01
Security Awareness Basics: Malware
07:22
Security Awareness Basics: Social Engineering
08:06
Security Awareness Basics: Phishing
02:09
Data Protection, Security & Legal Ethics
01:53
Legal Ethics & the Risk of Mishandling Electronic Evidence
03:21
Cyber Security for Attorneys
09:57
Security Awareness Basics: Passwords
03:19
What Is a Rootkit?
01:50
Cyber Security Explained: Baiting
03:13
What is Trojan Horse Malware?
02:32
Are You Giving Away Your Location When You Post Photos Online?
04:33
Scott Aurnou on Arise America News
02:08
How Effective Are Biometric Security Measures?
03:33
What is Social Engineering?
02:37
What Is the Internet of Things (and What Risks Come with It)?
01:30
What Is Open Source Software?
03:18
What Are Botnets & How Can You Protect Yourself From Them?
02:27
Text Bombing - What Is It and How Can You Stop It?
03:03
What is CryptoLocker & How Can You Protect Yourself From It?
04:23
Select a Qualified Computer Forensics Expert
03:15
Encryption & the NSA - a Few Tips to Protect Yourself
02:23
Should You Download LinkedIn's New 'Intro' Mobile App?
07:25
Online Shopping Safety Tips for the Holidays
04:02
Protect Your Personal Info on Social Media Sites (Facebook, LinkedIn, etc.)
01:31
Protect Your Computer Network Ports
03:30
Secure Your Wireless Network - a Few Tips
02:15
What Are Rainbow Tables (and How Can You Protect Yourself From Them)?
02:14
Mobile Banking Safety: a Few Tips
02:25
What Are Honeypots (and How Can They Protect Your Network)?
01:05
What Does a "Virus Detected!" Warning On My Computer Mean?
01:07
Can Anything Go Wrong If You Don't Log Out?
01:25
The Help Desk: An Unexpected Security Risk
02:58
Protect Your Website from Hackers - A Few Tips to Get Started
01:24
Too Many Passwords to Remember? Use a Password Manager
02:47
How Can You Email Clients (or Patients) Securely?
01:47
Is Your Router Secure? Be Sure Your Network Is Encrypted Properly
00:37
Welcome to The Security Advocate
01:57
Computer Forensics Is Never DIY - What Can Go Wrong?
02:42
What is BYOD and What Are the Risks That Come with It?
02:03
Do You Need a Cloud Computing Policy?
02:59
How to Choose a Strong Password
01:13
Protecting Medical Equipment from Hackers & Malware
00:50
Is It Bad to Reuse Passwords on Different Websites?
02:31
Do Macs Get Viruses & Other Malware?
02:04
Is Your Data Safe in the Cloud?
01:59
Can Anything Bad Happen If You Don't Turn Off Your Computer?
01:53
Can Remote Wiping Protect the Data On a Lost or Stolen Phone?
00:59
Is it Really That Dangerous to Use Older Software?
01:22
How Can Computer Forensics Safeguard Your Company Before There's a Problem?
01:19
Your GPS Can Pose a Security Risk. Yes, Really...
01:42
What is 'Spoofing' & Who REALLY Sent You That Weird Email?
02:38
What If Your Computer or Phone is Lost, Stolen or Just Breaks?
01:18
Anyone Can Use Your Phone or Tablet & View Your Files, Unless...
01:38
Is That 'Windows Tech Support' Call a Scam?
01:45
What is Two-Factor Authentication and How Can It Save You If an Attacker Has Your Password?