Security

hacking

How To Spot Fake Emails

The two most frequently used methods for hacking a company and stealing their information over the past year were phishing and the use of stolen credentials (think user IDs and passwords). Both method ...
prevent-social-engineering-v2

How to Prevent Social Engineering

Humans are inherently social; we are built to engage with one another.  Our kids are drawn to the connections they find on social media — often one of the easiest and fastest ways to communicate an ...
security

How To Protect Your Data From Theft

Legend has it that the famous bank robber Willie Sutton answered the question, “Why do you rob banks?” with “That’s where the money is.” Today’s cybercriminals focus on stealing something ...
PRzKLL9w

Which Wireless Security Type is Best?

Summary: As we conduct more of our lives online, wireless security is increasingly important. From WEP in the 1990s to WPA2 and the up-and-coming WPA3, we explain the strengths — and weaknesses — ...
moving-boxes-in-new-home

How to Connect to Safe Wi-Fi During my Move

Ensuring a secure wireless internet connection is always tricky, but throw it into the mix while moving into a new house and it can become a massive headache! Just because you are starting a new chapt ...
for-your-protection

How to Easily Update Your Phone or Computer Operating Systems

Not many of us view it this way, but owning technology should be treated like owning a car. In order for a car to run as it should, there is certain maintenance that needs to be done. For your safety, ...
know-your-password

Ways to Keep Your Passwords Safe

Passwords. We all have them, and we all hate coming up and keeping track of them. Why? We are busily trying to complete our daily list of to-do items as efficiently as possible. Yet, every time we wan ...
security

Convenience vs. Security: Is It Possible To Have Both?

As technology makes our lives more convenient, it also raises more concerns about hackers and other vulnerabilities. But is it always a trade-off? Can you balance the desire for convenience without sa ...
four-ways-to-protect

4 Ways to Protect Your Privacy Online

Changes in privacy regulation often get attention in the mass media, but not always enough clarity. Although the headlines are designed to elicit a wide range of emotional responses, the details about ...