Featured Blogs
How Protected Am I Online?
“How protected am I online?” Customers often ask us some version of this question. It’s a good question, and in the past, there was no direct...
How ransomware attacks will soar with the growth of IoT
This blog post was written by Nick Viney. Last month I wrote about the rise of ransomware, a particularly nasty...
How Safe Is Your Android PIN Code?
Your Android PIN code is a critical aspect that protects your phone data from unauthorized access. But how safe is this four-digit code? This article aims to demystify this question and offers a comprehensive guide on the safety of Android PIN codes.
How Safe is Your Child’s Personal Data at School?
Right about now, most kids are thinking about their chemistry homework, the next pep rally, or chiming in on their...
How Safe is Your Child’s School WiFi?
School WiFi. For many of our digital natives, school WiFi may even be a more important part of their daily...
How Safe Is Your Personal Information Online?
How many websites have you shared information with? Do you use the same passwords across all your accounts? Is your...
How Scammers Hijack Your Instagram
Authored by Vignesh Dhatchanamoorthy, Rachana S Instagram, with its vast user base and dynamic platform, has become a hotbed for...
How Scammers Steal Your Identity and What You Can Do About It
Identity theft is a growing concern, and Data Privacy Week serves as an important reminder to safeguard your personal information....
How Searching for Funny Online Can Wreck Your Family Tech
Perhaps the most alarming thing about cybercriminals is that they know us so well. They study human behavior. They study...
How Searching For Your Favourite Celebrity May Not End Well
How Searching For Your Favourite Celebrity May Not End Well 2020 has certainly been the year for online entertainment. With...
How Secure is Video Conferencing?
For millions of people, it’s not a workday without it — video conferencing. And plenty of business gets done that...
How Senior Adults Can Safeguard Their Privacy
Smart speakers. Banking online. Location tracking. If you are a senior adult, there’s no doubt, the digital leaps and bounds...
How Teens Date in the Digital Age
Falling in love in the internet age is a whole different ball game to the social-media-free ’70s, ’80s and ’90s....
How the IoT supports the world’s largest industries
This blog post was written by Nick Viney. The Internet of Things (IoT) has already helped to connect our world...
How the McAfee Rotation Program is Providing Opportunities
By: Darius, Sales & Marketing Rotation Engineer “The sky is the limit.” It’s a phrase I heard frequently growing up,...
How to Ace Your Video Interview: Job Hunting From Home
How to Ace Your Video Interview: Job Hunting from Home, Part Two So, it’s game day. Your online video interview...
How to Adopt a Work-from-Home Mindset
By: Paige, Change Management Manager, Plano, TX, United States In the last few months, navigating through the pandemic has yielded...
How to Avoid Being Phished by Your Phone
By now you’ve probably heard of the term “phishing”—when scammers try to fool you into revealing your personal info or...