Spot that Phish By now, you’ve probably heard about “phishing” emails. Perhaps you even know about these dangerous messages by personal experience. These malicious attacks are a common method used by those trying to steal your personal (or business) information.
Losing your wallet It’s funny how times change. Back in the days before cell phones, the loss of a wallet – a physical wallet – was a significant disaster. What other piece of property contained so much information about yourself?
Private Data in the Cloud As human beings, we all appreciate a certain level of privacy. That’s why we have shower curtains and window blinds. It’s also why we tend towards journals for our thoughts and quiet conversation in public
Passwords Management Passwords, passwords, passwords! If you are concerned about the security of your online information and personal identity (and who wouldn’t be?), then you’ve had to think about passwords. Security people talk about them. Every website you create an
Online Bank Security Remember those old movies where the bank robber needed to “crack” the safe? In my mind’s eye he’s crouched in front of a big metal cube, holding something like a stethoscope up to the door as he
Unlocking the Green Padlock So you’re doing some online banking – or shopping or logging into your health insurance or HSA account, etc. – and you suddenly remember all those terrible stories about fake websites luring unsuspecting customers into giving
Keeping Online Shopping Safe – Things You Might Not Think Of The holiday season often brings out news reports and articles highlighting the increased use of the internet for Christmas shopping and how many billions of dollars will be spent
Online Gaming Security “It’s just a game, right?” Well, sort of….
Geolocation Where are you, right now? Of course, you know the answer to this question (I assume!), but how many other people are privy to your exact location? Family? Close friends? Acquaintances? Strangers? Your phone? Yes, your phone. Geolocation –
You’re cautious. You use long, complicated passwords. You never click on links from sources you are unfamiliar with. You never respond to suspicious emails. You don’t reuse passwords and even use 2-factor authentication for your online accounts when it’s available.