Digital Inheritance
Posted February 21, 2020
What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and...Posted February 21, 2020
What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and...Posted February 6, 2020
Be careful with email auto-complete. This is an email feature that automatically completes a name for you when you begin typing it in the...Posted January 24, 2020
The Dark Web is a network of systems connected to the Internet designed to share information securely and anonymously. These capabilities are abused by...Posted December 12, 2019
Some of the most common indicators that you may have been hacked include the following: Your friends tell you that they have received odd...Posted December 9, 2019
The greater the deals are, the less secure your devices may be. Black Friday/Cyber Monday may offer you great deals, but at what price...Posted December 6, 2019
In the News Tech giants are only gaining more enemies in the field of ethics and human rights. In Amnesty International latest to slam...Posted December 6, 2019
Never share your passwords with others, including your supervisor or coworkers. Your password is a secret; it only works if only you know it....Posted December 4, 2019
In the News Twitter seems to continue to step up their emphasis on privacy and information security. In Twitter will finally let you turn...Posted December 4, 2019
Virtual Private Networks (VPN) create encrypted tunnels when you connect to the Internet. They are a fantastic way to protect your privacy and data,...Posted December 2, 2019
Technology alone cannot protect you. Bad guys are constantly developing new ways to get past firewalls, anti-virus and filters. You are the best defense...