Featured Blogs
How to Remove Trojan Horse Viruses
Basic online scenario—You log onto your computer and notice that something’s just not right, but you can’t quite put your...
How to Remove Personal Information From Data Broker Sites
Data brokers are companies that collect your information from a variety of sources to sell or license it out to...
How to Remain Secure While Using Running Apps
When gyms were forced to close last year, you likely looked for other ways to get some exercise and stay active during quarantine....
How To Recover Your Identity After It Has Been Stolen
It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll find thieves in the...
How to Recognize an Online Scammer
Online scams are evolving faster than ever, with cybercriminals using AI, deepfake technology, and social engineering to trick unsuspecting users....
How To Recognize An Online Scam
It’s been a particularly busy and colourful week, scam-wise in our household. Between 4 family members, we’ve received almost 20...
How to Recognize a Phishing Email
How do you recognize phishing emails and texts? Even as many of the scammers behind them have sophisticated their attacks,...
How to Raise Responsible Digital Citizens
‘So, what is the ultimate goal of all of our parenting?’ When I asked this question to a group of...
How to Quickly Remove Malware From an iPhone
For the most part, iPhones are well-protected devices — but they aren’t immune to malware attacks. These attacks range from...