Have you gotten any of these spam emails?
Here are the five most common types of spam emails you'll see. Do you know how to spot them and protect yourself?Read More
Don't Fall for Phishing Hook, Line, & Sinker!
We're excited to share our new video blog format with you! Watch our video to learn how to avoid getting caught in a phishing attempt. Then, test your skills with Google's spam-spotting quiz! Joe got 100%- think you can get 100%, too?Read More
What is a patch, and why is it so important?
We all sometimes ignore notifications that our computers, phones, and tablets are ready to update. Here's why you should stop, and how you could be compromising your cybersecurity safety by doing so!Read More
The GDPR: Here's what you need to know
You may have noticed recently that your inbox is filling up with companies informing you that their privacy policies and terms of service have changed. That’s no coincidence: on Friday, May 25th, the European Union will put into effect a sweeping new legislation that deals with data privacy and how companies handle personal data. Here's […]Read More
6 Reasons Why You Need a Backup and Business Resumption Plan
In this quickly-expanding cybersecurity landscape, it’s not good enough to ask yourself “if” your data will be threatened, you have to ask yourself “when.” There’s only one way to ensure your business and personal files are protected from this sort of (very popular) ransomware threat: you need a complete backup, recovery, and business resumption plan. […]Read More
Winterize Your Laptop, Save Your Computer!
There are a lot of things we do to prepare for winter: we buy snow tires for our cars, start wearing heavier coats, and make sure the outside of our houses are adequately prepared for the months of cold and snow. But do you think about your laptop? If you don't, it could cost you!Read More
“Windows Tech Support” calling? Watch out!
Someone calling you might claim they’d like to help you fix a problem, but they’re likely just after your personal information. Here’s a conversation I had with one- and the questions I asked that stopped him in his tracks.Read More
How to Create Hack-Proof Passwords
For most of us, a password means something easily-remembered that doesn’t change too much- if at all- from site to site. Your dog’s name, maybe, or the street you grew up on. This is what hackers count on when they start trying to crack your password.Read More
Do you have this dangerous backdoor for hackers?
Many of us rely on older printers and scanners to help us at work and at home. But what would you do if trying to print family photos, a school paper, or an important work report meant giving hackers a chance to hijack your system and hold your files for ransom? Learn how to prevent this with one small step that will have a big impact on your cybersecurity protection.Read More
Hackers are using you to make money - here’s how to avoid it
Bitcoin has been called “the currency of the future,” but could hackers be using it to slow and damage your systems? Learn what bitcoin is, how it’s earned, how malware associated with it is spreading, and how to protect yourself using important cybersecurity knowledge.Read More