Online Security for Kids

Background Our kids’ lives are online today more than ever, from socializing with friends and gaming, to online learning and education. So how can we help our kids make the

Read More »

The Power of Password Managers

Are You Frustrated with Passwords? Like most people, you likely find creating, managing, and remembering all your different passwords a daunting task. It seems like every website has different password

Read More »

Securing Your Financial Accounts

Overview Your financial accounts are a primary target for cyber-criminals. You have money, and they will do anything to steal it. By financial accounts, we mean not only your checking

Read More »

Scareware: A Story

Warning! Your computer is infected with Black Basta ransomware. Call this phone number right away to fix your computer! – If you saw this warning pop-up on your computer, would you call

Read More »

Do I Need Security Software?

Overview When you bought a new computer years ago, you often had to install additional security software on your computer to help ensure it was secure against cyber attackers. However,

Read More »

Browsers

Overview Browsers such as Google Chrome, Microsoft Edge, Apple Safari, or Mozilla Firefox are one of the most common ways people interact with the Internet. We use them for reading

Read More »

Got Backups?

Overview If you use a computer or mobile device long enough, sooner or later something will go wrong. You may accidentally delete the wrong files, have a hardware failure, or

Read More »

Charity & Disaster Scams

Cyber criminals know that one of the best ways to rush people into making a mistake is by creating a heightened sense of urgency. And one of the easiest ways

Read More »

Securely Gaming Online

What makes online gaming so fun is that you can play and interact with others from anywhere in the world, often you don’t even know the people you are playing

Read More »

The Power of Updating

Overview You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run

Read More »

Top Three Social Media Scams

Overview While social media is a fantastic way to communicate, share, and have fun with others, it is also a low-cost way for cyber criminals to trick and take advantage

Read More »

Spot and Stop Messaging Attacks

What are messaging attacks? Smishing (a portmanteau word combining SMS and phishing) are attacks that occur when cyber attackers use SMS, texting, or similar messaging technologies to trick you into

Read More »

Shopping Online Securely

Overview The holiday season is nearing. Soon millions of people will be looking to buy the perfect gifts, and many of us will shop online. Unfortunately, cyber criminals will be

Read More »

Securely Using the Cloud

Overview You may have heard of a concept called “the cloud.” This means using a service provider on the internet to store and manage your data. Examples include creating documents

Read More »

Securing Your Mobile Devices

Overview Mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since these

Read More »

Post Categories:

Support Articles:

Subscribe to Newsletter: