Fake apps are a real problem on the official app stores. Tech companies like Apple, Google, and Microsoft are all struggling to keep them at bay. Learn how to recognize and remove fake apps in my latest article for The Northwest Herald/Shaw Media: Tech Companies Struggle to Remove Fake Apps.
Modern Security Software Protects Against Today’s Threats
Today’s Internet threats pose increasing risks to consumers. Is your antivirus protection adequate? What about your firewall? Are there other security features that can help? Learn how to find the right security solution for your home computer in my latest article for The Northwest Herald/Shaw Media: Modern Security Software Protects Against Today’s Threats.
Steps to Securing Your Cloud Storage
Cloud storage is convenient and efficient, but it can also be a gold mine for cybercriminals. Our reliance on cloud storage means that it’s important to understand why criminals want our data and the lengths they’ll go to get it. Learn how to protect your cloud data in my latest article for The Northwest Herald/Shaw … Continue reading Steps to Securing Your Cloud Storage
Phishing Scams Grow More Sophisticated
Today’s phishing scams are sophisticated, targeted, and designed to trap consumers. Find out how you can avoid falling victim to these scams in my latest article for The Northwest Herald: Phishing Scams Grow More Sophisticated.
Is Your Phone Revealing Your Location?
Your phone’s location services are used by many apps — but they don’t always need it and could be revealing your location to strangers. Location information is valuable to hackers and is even bought and sold on the Internet. Find out if the apps on your phone are revealing your location and what to do … Continue reading Is Your Phone Revealing Your Location?
How to Organize Your Email Like A Pro
Need help organizing your email? Many people store all of their messages in their inboxes, but this can be unwieldy. By creating folders and using rules to divide your messages between those folders, you can quickly organize even the most chaotic inbox. Another way to keep email from getting out of control is to pick … Continue reading How to Organize Your Email Like A Pro
Could We Quit It With Stereotypes About “Tech Gifts For Women?”
Tis the season for that perennial favorite: yet more lists of “tech gifts for women.” It seems like every year I run across this rubbish on one site or another, and it gets more annoying every time. Here’s one of this year’s entries, but they’re all pretty much the same, assuming that women only want … Continue reading Could We Quit It With Stereotypes About “Tech Gifts For Women?”
How To Configure Security Settings For Windows, Mac, iOS, and Android
When was the last time you checked the security preferences on your computer, tablet, or smart phone? Unfortunately, the default security settings for most devices are woefully inadequate, leaving you vulnerable to viruses, malware, and hacking attempts. Here's more information on how to configure the security and privacy settings for Windows, Mac, iOS (iPhone and iPad), and Android. … Continue reading How To Configure Security Settings For Windows, Mac, iOS, and Android
How To Protect Your Web Browser
Your Web browser lets you access Internet sites, but it can also be a gateway for viruses, malware, and more. Here’s how to keep your browser protected and secure. (Don't miss my latest article for The Northwest Herald - Protect Your Window To The Internet by Triona Guidry) Remember that it’s vital to keep your browser up … Continue reading How To Protect Your Web Browser
How To Secure Your Web Browser
Did you know that most viruses sneak onto your computer through your Web browser? Here's how you can secure your Internet surfing experience. Take a look at your Web browser(s) with the following advice in mind. Related Article: Eight Tips For Safer Web Browser Searching by Triona Guidry (The Northwest Herald) How To Clear Your … Continue reading How To Secure Your Web Browser