Securely Using the Cloud
Overview You may have heard of a concept called “the cloud.” This means using a service provider on the internet to store and manage your data. Examples include creating documents…
Overview You may have heard of a concept called “the cloud.” This means using a service provider on the internet to store and manage your data. Examples include creating documents…
Overview Mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since these…
Overview Mobile devices, such as tablets, smartphones, and smartwatches, have become one of the primary technologies we use in both our personal and professional lives. What makes these devices so…
Overview When you think of a cyber criminal you probably think of an evil mastermind sitting behind a computer, launching sophisticated attacks over the internet. While some of today’s cyber…
What is Privacy? There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today's digital world, you…
What is Identity Theft? Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a…
Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and…