Featured Blogs
How to Protect Yourself From Phishing Scams
Ping, it’s a scammer! The sound of an incoming email, text, or direct message has a way of getting your...
How to Protect Yourself from QR Code Scams
Imagine paying $16,000 to park your car in a lot for a couple of hours. That’s what happened to one...
How To Protect Yourself from SMiShing Attacks
SMiShing is a deceptive practice where scammers send fraudulent text messages masquerading as reputable institutions, aiming to dupe recipients into clicking on a link, calling a number, or providing sensitive personal information. The risk with SMiShing is that mobile users tend to trust their SMS messages more than their emails, ...
How to Protect Yourself From Social Engineering Scams
It’s Social Media Day! How are you celebrating? Reposting your very first profile picture from a decade ago? Sharing your...
How to Protect Yourself From Social Media Harassment
Some conversations on social media can get … heated. Some can cross the line into harassment. Or worse. Harassment on...
How to Protect Yourself From Tailgating Attacks
Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...
How to Protect Yourself from Tax Scams
Tax season is now upon us, and more than ever, we are opting for the convenience of filing taxes online...
How to Protect Yourself from Tech Support Imposters
Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...
How To Protect Yourself From The Malware That’s Costing Consumers Millions
This blog post was written by Nick Viney. You may have heard about the hack of a Presbyterian Medical Center...
How to Protect Yourself from Vishing
“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers...
How to Protect Yourself From XLoader Malware
Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email,...
How to Protect Yourself on Social Networks
There are now over 5 billion active social media users worldwide, representing 62.3% of the global population. While social networks...
How to Quickly Remove Malware
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the...
How to Raise Responsible Digital Citizens
‘So, what is the ultimate goal of all of our parenting?’ When I asked this question to a group of...
How to Recognize a Phishing Email
How do you recognize phishing emails and texts? Even as many of the scammers behind them have sophisticated their attacks,...
How To Recognize An Online Scam
It’s been a particularly busy and colourful week, scam-wise in our household. Between 4 family members, we’ve received almost 20...
How to Recognize an Online Scammer
Online scams are evolving faster than ever, with cybercriminals using AI, deepfake technology, and social engineering to trick unsuspecting users....
How To Recover Your Identity After It Has Been Stolen
It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll find thieves in the...
How to Remain Secure While Using Running Apps
When gyms were forced to close last year, you likely looked for other ways to get some exercise and stay active during quarantine....
How to Remove Personal Information From Data Broker Sites
Data brokers are companies that collect your information from a variety of sources to sell or license it out to...
How to Remove Trojan Horse Viruses
Basic online scenario—You log onto your computer and notice that something’s just not right, but you can’t quite put your...
How to Remove Unwanted Photos of Your Child Online
There’s a chance you may skip this blog post thinking to yourself: This will never happen to my child. I have a...
How to Remove Viruses from Your Android Phone
So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several things to...
How to Remove Viruses from Your Android Phone
One of my favorite binges of late is the Netflix series Halt and Catch Fire. It’s a story about the personal...
How to Remove Your Personal Information From the Internet
Scammers and thieves can get a hold of personal information in several ways, such as through phishing attacks that lure you into handing it over, malware that steals it from your devices, by purchasing your information on dark web marketplaces, or as a result of information leaked in data breaches, ...
How to Report an Online Scam
For many online consumers, money (or the power of it) hovers quietly and invisibly over an online shopping cart only...
How to Report Identity Theft to Social Security
In the hands of a thief, your Social Security Number is the master key to your identity. With a Social Security Number (SSN), a thief can...
