Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Security Articles

A trash container full of paper on a blue floor in front of a lighter blue wall

Security

What Really Happens to Deleted Files on Your Devices?

Do you know what really happens to deleted files on your devices? Learn what goes on after you hit the "delete" button. Read more...
calendar with hand written reminder to change password on the first of the month

Security

What to Know Before Changing a Password

We all loathe getting the prompt to change a password, but security is important. Learn some tips and best practices before you create your next password. Read more...
sticky note with hand written password stuck to a keyboard

Security

The Most Common Password Mistakes (and How to Avoid Them!)

How many passwords do you have? How many do you think could be stronger? Learn the most common mistakes people make with the passwords they create. Read more...
overhead view of a person sitting on a couch working on a laptop computer

Security

Follow These Steps if You’ve Been Hacked

Do you think you have been hacked? Follow these steps to understand if you have been hacked and what to do if your device has been compromised. Read more...
mobile phone showing an airline boarding pass on the screen

Security

Wireless Safety Tips for Travelers

Are you looking to travel for a weekend getaway or perhaps overseas? Help keep your devices and data safe with our wireless security tips for travelers. Read more...
woman walking and pulling a rolling suitcase while looking at their phone

Security

You're on Vacation – Is Your Personal Data Really Secure?

While you might be on vacation, those that wish to obtain your data never take a break. Get tips to protect your personal data while vacationing. Read more...
man in deep thought while sitting at a desk with his laptop

Security

Your Must-Have Cheat Sheet for Cybersecurity Terms

Baffled by what some Cybersecurity terms mean? You aren't alone. Read on to learn about Malware, Spoofing and many other terms. Read more...
person looking at their mobile phone display that is showing an alert for an incoming suspected spam call

Security

Are Your Online Activities Putting You at Risk for Identity Theft?

Do your habits online and offline put you at risk for identity theft? See what you can do or need to stop doing to help reduce the risk of identity theft. Read more...
Person holding a TV remote in front of a TV screen

Security

The Hidden Dangers of Downloading Pirated Content

Read what hidden issues you and your devices could face when downloading pirated content. Read more...
Woman sitting down with a confused expression while looking at her laptop

Security

The Many Faces of Malware

So what is malware and how can you avoid getting your device infected? Read our tips and explore a great visual guide of malware. Read more...
a person's finger about to press the delete button

Security

5 Ways to Help Prevent Online Phishing Attacks

Get tips on what to look for in an online phishing attack, and how to best protect yourself from phishing attempts. Read more...
Person holding their locked phone and entering their passcode in front of a laptop

Security

Why Experts Warn You to Update Security Features on Your Devices

How often do you update your devices? Do you ever update your devices? Read why your security might be at risk if you aren't updating your devices. Read more...
Spotlight shining on a microphone in front of a brick wall

Security

Cybersecurity Dad Jokes Are No Laughing Matter

Learn about what cybersecurity is and get 5 good reasons why cybersecurity is not a joking matter. Read more...
Top