Blog

Posted by | June 26, 2020
The anatomy of a phish

Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money...

Continue Reading
Posted by | April 26, 2020
Tips for Windows 10 Security

The good news is there is no lack of privacy settings in Windows 10. In fact, there are so many privacy settings that some are unknown to most users! The bad...

Continue Reading
Posted by | April 21, 2020
Contact Tracing Apps

Several countries — and now individual US states — are planning or have rolled out their smartphone-based contact tracing apps. These apps are designed so that local health agencies can figure...

Continue Reading
Posted by | April 17, 2020
Safe at home

Many business owners have recently found themselves working from home, perhaps for the first time in their professional lives. In fact, 90% of Americans are currently subject to stay-at-home orders. At...

Continue Reading
Posted by | April 17, 2020
Secure your iPhone

In the beginning, Apple products stood high, wide, and handsome in the face of cyberattacks. Average hackers found it nearly impossible to crack the company’s proprietary software, and an Apple product’s attack surface was...

Continue Reading
Posted by | April 15, 2020
Corona Virus Scams

The coronavirus pandemic has changed the way so many of us live our lives that it’s on many of our minds throughout most of the day. Cybercriminals, always camouflaging their...

Continue Reading