Qr code digital payment at coffee shop

QR Codes

Overview Have you ever wondered what those squares of dots or bars called “QR codes” are all about? You most likely have seen them posted on websites, printed on posters,

Read More »
Woman's hand holds a password on paper, that covers the password with finger

The Power of the Passphrase

Are you tired of constantly creating complex passwords? Frustrated with having to remember and type all those characters, symbols and numbers? Well, we have a solution for you: the ever-powerful

Read More »
Female hacker wearing a hoodie using a dangerous virus

I’m Hacked, Now What?

Have I Been Hacked? The internet can be overwhelming, with new technologies changing all the time. No matter how safe you try to be, sooner or later you may be

Read More »
stylish african american businessman using laptop in cafe

The Power of Updating

Overview Cyber attackers are constantly looking for and finding new vulnerabilities in the software you use every day. A vulnerability is a mistake or weakness in how software was developed.

Read More »

Online Security for Kids

Background Our kids’ lives are online today more than ever, from socializing with friends and gaming, to online learning and education. So how can we help our kids make the

Read More »

The Power of Password Managers

Are You Frustrated with Passwords? Like most people, you likely find creating, managing, and remembering all your different passwords a daunting task. It seems like every website has different password

Read More »

Securing Your Financial Accounts

Overview Your financial accounts are a primary target for cyber-criminals. You have money, and they will do anything to steal it. By financial accounts, we mean not only your checking

Read More »

Scareware: A Story

Warning! Your computer is infected with Black Basta ransomware. Call this phone number right away to fix your computer! – If you saw this warning pop-up on your computer, would you call

Read More »

Do I Need Security Software?

Overview When you bought a new computer years ago, you often had to install additional security software on your computer to help ensure it was secure against cyber attackers. However,

Read More »

Browsers

Overview Browsers such as Google Chrome, Microsoft Edge, Apple Safari, or Mozilla Firefox are one of the most common ways people interact with the Internet. We use them for reading

Read More »

Got Backups?

Overview If you use a computer or mobile device long enough, sooner or later something will go wrong. You may accidentally delete the wrong files, have a hardware failure, or

Read More »

Charity & Disaster Scams

Cyber criminals know that one of the best ways to rush people into making a mistake is by creating a heightened sense of urgency. And one of the easiest ways

Read More »

Securely Gaming Online

What makes online gaming so fun is that you can play and interact with others from anywhere in the world, often you don’t even know the people you are playing

Read More »

The Power of Updating

Overview You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run

Read More »

Top Three Social Media Scams

Overview While social media is a fantastic way to communicate, share, and have fun with others, it is also a low-cost way for cyber criminals to trick and take advantage

Read More »

Spot and Stop Messaging Attacks

What are messaging attacks? Smishing (a portmanteau word combining SMS and phishing) are attacks that occur when cyber attackers use SMS, texting, or similar messaging technologies to trick you into

Read More »

Post Categories:

Support Articles:

Subscribe to Newsletter: