Articles by Author
Internet Security
What Is Bloatware and How Can It Impact Security?
The joy of purchasing a new device is liberating. Now you can work, learn, and play faster...Nov 14, 2022 | 5 MIN READ
Internet Security
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through...Nov 10, 2022 | 6 MIN READ
Privacy & Identity Protection
How much of your personal info is available online? A simple search could show you plenty.
What you paid for your home, who lives there with you, your age, your children, your driving...Nov 03, 2022 | 9 MIN READ
Privacy & Identity Protection
How To Stay Safe from Phishing Attacks
Staying safer online from phishing and other social engineering attacksOct 26, 2022 | 4 MIN READ
Internet Security
Ransomware Masquerading as Microsoft Update Targets Home Computers
A new ransomware threat is currently sweeping its way across home computers. And what’s making it extra...Oct 24, 2022 | 4 MIN READ
Internet Security
Protect yourself from scams this Diwali
It’s Diwali, a time of light, a time of togetherness, and, of course, a time of celebration....Oct 24, 2022 | 7 MIN READ
Internet Security
What Is Smishing and Vishing, and How Do You Protect Yourself
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through...Oct 20, 2022 | 6 MIN READ
Internet Security
What Is Tailgating in Cybersecurity and How to Protect Yourself
Tailgaiting in cybersecurity is when hackers exploit authorized access. Learn about tailgaiting tactics and how to protect...Oct 20, 2022 | 5 MIN READ
Privacy & Identity Protection
Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself
Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to...Oct 18, 2022 | 6 MIN READ
Privacy & Identity Protection
True Security Requires a Holistic Approach
While recent surveys have shown that consumers are very concerned about their privacy, nearly half feel that they cannot fully...Oct 17, 2022 | 5 MIN READ
Privacy & Identity Protection
57 Million Users Compromised in Uber Leak: Protect Your Digital Privacy and Identity
“I’ll just Uber home.” Who hails a taxi anymore? These days, city streets are full of double-parked...Oct 11, 2022 | 5 MIN READ
Internet Security
The Seven Main Phishing Lures of Cybercriminals
One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene...Oct 10, 2022 | 5 MIN READ