Computer Data Loss

Oh No! You Forgot to Backup Your Files

Your laptop got fried and you’ve lost all your files! What do you do now, and importantly, how do you to prevent it from happening again?

Continue Reading
3-2-1 File Backup Method

The 3-2-1 Backup Method

The 3-2-1 Backup Method is a backup strategy in which you have three copies of your data with two copies stored locally and one copy stored off-site. Here’s the info on how-to.

Continue Reading
Child on Computer

Five Ways to Protect Your Child Online

As parents, our job is to protect our children in every way possible. Here are five ways that you can protect your child online so that internet use can be a joy and not a burden to you and your family.

Continue Reading
Hack the Pentagon

Hackers Invited by the Government’s Top Military Office – The Pentagon

The Pentagon joins a growing number of organizations that are taking their security issue to the public for help.

Continue Reading
glibc-exploit

Computer Security Bug Threatens 1000s of Devices Across the Globe

The bug that is a possible threat to thousands’ of devices across the globe is named CVE-2015-7547.

Continue Reading
Computer Security Specialist

The Rising Demand for Cybersecurity Professionals Worldwide

The year 2016 has set out to be quite promising for the cyber-security market. According to recent reports, the burgeoning industry is going to see about 1-million job openings this year.

Continue Reading
Tech Support Scam Calls

Scam Watch: This Is Tech Support Calling

It’s been almost 2 years since I first heard about the Microsoft Tech Support call scams, but it looks like they are still alive and well and trying to get into our computers.

Continue Reading
Using a Firewall

Familiarizing Yourself with How to Use Firewalls

Your home computer security should include having firewall protection for your computer in order to protect both incoming and outgoing information.

Continue Reading
Sandbox Environment

Sandboxing 101: Protect Yourself When Opening Suspicious Documents

A sandbox is a controlled environment where testing can be done and results can be scientifically studied. Here are two excellent and free ways to get started with sandboxing.

Continue Reading
Cyber Criminals

Cyber Extortion: How Hackers Use Stolen Data to Blackmail You

Cyber extortion, like blackmail, is often used to obtain money, property, or information from someone against their will. Here are a few tips that can help keep you from falling victim to a cyber extortionist.

Continue Reading