Security

Smart Device

A smart device is an electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, Wi-Fi, or cellular networks that can operate to some extent interactively and autonomously.

Why everyone should use a password manager

We are in an age where password security is becoming very important to our ability to function in society, but not for the reasons you expect. The password strength, although a problem, isn’t the real problem. The real problem is having to remember passwords for the multitude of online accounts we are forced to create to survive in the modern age of technology. In a survey performed last year by Digital Guardian, an average person or business associates their email address with 130 accounts....more

Part 1 Scam Avoidance: How to Spot and Protect Yourself from Scams

This is the 1st part of a 3 part series in protecting yourself from on-line and of-line scams. With the 2020 COVID-19 crisis causing many to work from home, it’s more important than ever to have a set of tools to deal with threats that come your way. In this publication, I will help you identify threats so that you can avoid being deceived by malicious calls to action. If your device has been compromised by a scam, its important to learn how to deal with an attack after the fact....more

Part 2 Scam Avoidance: Avoiding Scams

This is the 2nd part of a 3 part series in protecting yourself from on-line and of-line scams. In part 1 I attempted to make you aware of some of the common ways in which a scammer operates. In this part of series, I will talk about ways you can avoid scams by being aware what to look for, and using technology to help you avoid scamms altogeather. The best security is awareness The psychology behind decision making Avoiding Scams Protecting yourself after the Scam Protect your on-line accounts Conclusion Updates: Spying on the Scammers Video Terms Avoiding Scams Search Results Skipping Ads with an Adblocker...more

Part 3 Scam Avoidance: Protecting yourself after the Scam

This is 3rd part of a 3 part series in protecting yourself from on-line and of-line scams. In part 2 I discussed some ways you can avoid scams before you become a victum. In this part of the series I will outline some ways to handle yourself after the fact. The best security is awareness The psychology behind decision making Avoiding Scams Protecting yourself after the Scam Protect your on-line accounts Conclusion Updates: Spying on the Scammers Video Terms Protecting yourself after the Scam If you have already been a victim of an scam....more

What is Identity Theft Protection, and do you need it?

It is relatively easy from the standpoint of a thief to impersonate your online identity and assume your financial standing. Using your identity, a thief can open up a line of credit under your name and go on a shopping spree making you assume all of the responsibility until you rectify the problem. As more and more of our personal information gets warehoused online, protecting information against theft is a continuing challenge on both sides of the fence, customers and financial institutions alike....more

Protecting Your Smartphone From Being Hacked

Smartphones are much more than simple tools to make calls and take pictures. They have become our personal assistants. Storing everything about us. On the one hand, using a smartphone for our day to day living makes life much more convenient. On the other hand, storing all that info about our life on one device that we take with us on the go, opens us up to data theft. It’s nothing to be afraid of, its important for our society to be open....more

How to Securely Delete Data

This is a good guide that explains how to securely delete data from a Mac, but it also references a PC. These instructions might be beyond the capabilities for the average computer user, but it’s still good to know what is involved in securely deleting data.