Keeping Your Security Questions Secure
Keep all these things in mind when signing up for accounts and filling out security questions.
Oh No! You Forgot to Backup Your Files
Your laptop got fried and you’ve lost all your files! What do you do now, and importantly, how do you to prevent it from happening again?
The 3-2-1 Backup Method
The 3-2-1 Backup Method is a backup strategy in which you have three copies of your data with two copies stored locally and one copy stored off-site. Here’s the info on how-to.
Five Ways to Protect Your Child Online
As parents, our job is to protect our children in every way possible. Here are five ways that you can protect your child online so that internet use can be a joy and not a burden to you and your family.
Hackers Invited by the Government’s Top Military Office – The Pentagon
The Pentagon joins a growing number of organizations that are taking their security issue to the public for help.
Computer Security Bug Threatens 1000s of Devices Across the Globe
The bug that is a possible threat to thousands’ of devices across the globe is named CVE-2015-7547.
The Rising Demand for Cybersecurity Professionals Worldwide
The year 2016 has set out to be quite promising for the cyber-security market. According to recent reports, the burgeoning industry is going to see about 1-million job openings this year.
Scam Watch: This Is Tech Support Calling
It’s been almost 2 years since I first heard about the Microsoft Tech Support call scams, but it looks like they are still alive and well and trying to get into our computers.
Familiarizing Yourself with How to Use Firewalls
Your home computer security should include having firewall protection for your computer in order to protect both incoming and outgoing information.
Sandboxing 101: Protect Yourself When Opening Suspicious Documents
A sandbox is a controlled environment where testing can be done and results can be scientifically studied. Here are two excellent and free ways to get started with sandboxing.