Blog, News & Article

''You don’t have to be big. You have to be remarkable''-Joe Pulizzi
14 September 2020
01
4 tips to boost your home Wi-Fi

It’s an historic moment. No less than the entire human race finds itself banded together as we all do our part to fight a global pandemic. Along the way, we’re learning a lot about epidemiology, healthcare infrastructure, adaptability, and human nature. And while we do need to commend ourselves for getting through this crazy time...

Countinue Reading
26 June 2020
02
The anatomy of a phish

Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money – phishing is unique in seeking your personal data, usually in the form of passwords and bank details. Understanding different types of phishing attacks and the...

Countinue Reading
26 April 2020
Posted by Avast Software
03
Tips for Windows 10 Security

The good news is there is no lack of privacy settings in Windows 10. In fact, there are so many privacy settings that some are unknown to most users! The bad news is...just that. It’s easy to get overwhelmed by the sheer volume and variety found within the settings. There are preferences you can set for...

Countinue Reading
21 April 2020
Posted by Avast Software
04
Contact Tracing Apps

Several countries — and now individual US states — are planning or have rolled out their smartphone-based contact tracing apps. These apps are designed so that local health agencies can figure out who was near someone who was infected, in the hopes of gaining insight into the spread of infections. Let’s talk about what you need to know...

Countinue Reading
17 April 2020
05
Safe at home

Many business owners have recently found themselves working from home, perhaps for the first time in their professional lives. In fact, 90% of Americans are currently subject to stay-at-home orders. At home, these individuals face new challenges. They are forced to grapple with long periods of indoor confinement, find time to educate and entertain their kids,...

Countinue Reading
17 April 2020
06
Secure your iPhone

In the beginning, Apple products stood high, wide, and handsome in the face of cyberattacks. Average hackers found it nearly impossible to crack the company’s proprietary software, and an Apple product’s attack surface was almost nonexistent. But over the years, those attack surfaces got bigger, and hackers and their tools became more sophisticated. The hackers’ holy grail has always...

Countinue Reading
x Logo: Shield
This Site Is Protected By
Shield