Featured Blogs
Learn How to Spot a Phishy Email and Stay Safe
This blog post was written by Bruce Snell. One piece of advice I always give (after update, update, update) is to never click on a suspicious link. A lot of times, those dodgy links are easy to spot, which is why cybercriminals try to be extra tricky to get you ...
Now Dolls Can be Hacked Too
This blog post was written by Bruce Snell. Soon after posting our Most Hackable Gifts blog, NBC 5 in Chicago released an investigative report on a popular interactive doll being hacked. In the report, the security researcher detailed some of what he was able to get from the Barbie doll ...
What is a Hacker?
You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with viruses or cracks passwords to raid the accounts of big business. This is one kind ...
How to Stop Sharing Your Location Information
The Internet helps us connect and share with people around the world, but there are some people with whom you definitely shouldn’t be sharing your information. Although it’s not pleasant to think about, it’s not just friends and family that can see your online posts, bad guys can too, including ...
Why use a VPN?
If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accounts unless you use a virtual private network (VPN). A VPN ...
Back to school Tech Security for College Students
Some of us remember college dorm days, when students were envied if they had their own typewriter. These days, college students must have a personal laptop computer, and a smartphone, and their lives revolve around these connected devices. Such dependency should be proactively protected from loss or theft. Campus security ...
Passwords in Real Life: Don’t be Lazy
It’s tough being responsible sometimes. And managing responsibilities for what is precious in your life usually takes a little extra thought. Let’s say you’ve just welcomed a beautiful set of triplets into the world. Lucky you . . . and lots to managed! But, you wouldn’t give all these babies ...
Don’t Rely on the Password Reset
Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains you bought on your previous vacations. Now, imagine you have a keychain full of these keys that all look the same, but each only opens a specific door. Sounds kind of like your ...
Be Cautious When Using Wi-Fi
The proliferation of mobile devices means that we can work or play online from almost anywhere, so it’s no surprise that public Wi-Fi networks have become more common. From hotels and coffee shops, to universities and city centers, Wi-Fi is widely available, but is connecting to these networks safe? If ...
What is a Cache?
Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should you do it? A cache is a folder of recently visited webpages, which is stored on your computer’s hard drive, and maintained by your Internet browser. The purpose of a ...