Featured Blogs
How to Recognize a Phishing Email
How do you recognize phishing emails and texts? Even as many of the scammers behind them have sophisticated their attacks,...
How to Raise Responsible Digital Citizens
‘So, what is the ultimate goal of all of our parenting?’ When I asked this question to a group of...
How to Quickly Remove Malware From an iPhone
For the most part, iPhones are well-protected devices — but they aren’t immune to malware attacks. These attacks range from...
How to Quickly Remove Malware
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the...
How to Protect Yourself on Social Networks
There are now over 5 billion active social media users worldwide, representing 62.3% of the global population. While social networks...
How to Protect Yourself From XLoader Malware
Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email,...
How to Protect Yourself from Vishing
“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers...
How To Protect Yourself From The Malware That’s Costing Consumers Millions
This blog post was written by Nick Viney. You may have heard about the hack of a Presbyterian Medical Center...
How to Protect Yourself from Tech Support Imposters
Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...