The Essential Guide to Strong Passwords (2021 Edition)

If there's one thing you do for your own computer safety, please, use strong, unique passwords! Doing so decreases your chances of suffering virus infection, account hijacking, identity theft, and even financial fraud. People continually re-use passwords, or create weak passwords, or don't change the default passwords on important devices like routers and smart home gadgets. … Continue reading The Essential Guide to Strong Passwords (2021 Edition)

What You Need to Know About Tech Support Scams

Tech support scams are a continuing threat to consumers, especially with so many people working from home. Here’s how to avoid them, and how to find real tech support. A tech support scam usually starts with a fake phone call, phishing email, or pop-up ad. Phone calls are an especially popular choice for reaching consumers … Continue reading What You Need to Know About Tech Support Scams

The Beginner’s Guide to Two-Factor Authentication

Two-factor authentication, or 2FA, is an easy way to add extra security to your accounts. Here’s what home users need to know about setting up and using 2FA. How Two-Factor Authentication WorksTwo-factor authentication works in tandem with your password. When logging in, you’ll enter your password plus a one-time token, such as a code sent … Continue reading The Beginner’s Guide to Two-Factor Authentication

Ransomware: A Dangerous Threat to Your Computer

Ransomware is a particularly nasty form of computer virus that encrypts your data, then demands payment for the encryption key. Why is ransomware so hazardous, and how can you remove it? Ransomware is vicious because it doesn’t just render your computer unusable. It encrypts all of your files, including those on networked computers, removable drives, … Continue reading Ransomware: A Dangerous Threat to Your Computer

A Home User’s Guide to Mobile Device Internet Security

Few of us maintain the same security precautions on our tablets and phones that we do on our computers. But mobile devices contain personal data, and they go wherever we do. Here’s what you need to know to keep your mobile devices protected. In general the same security rules we use for computers also apply … Continue reading A Home User’s Guide to Mobile Device Internet Security

How to Sell, Donate, or Recycle Your Old Computers, Tablets, and Phones

You shouldn't leave old electronics sitting around, and you certainly shouldn’t put them in the trash. Here’s how to dispose of your old computer, tablet, or phone in a responsible manner. E-waste is a terrible problem. As consumers, it’s our responsibility to minimize the environmental impact of the technology we use. Selling, donating, and recycling … Continue reading How to Sell, Donate, or Recycle Your Old Computers, Tablets, and Phones

How to Check Your Voice Assistant Privacy Settings

Voice activated assistants are everywhere, but they may reveal more than you intend. Many of the major tech companies including Amazon, Google, and Apple have admitted to allowing human employees or contractors to listen to recordings in an effort to improve their services. There have also been instances of voice assistants activating accidentally, and at … Continue reading How to Check Your Voice Assistant Privacy Settings

The Risks Of Sharenting: When Parents Post Too Much About Their Kids Online (And How To Share Safely)

There’s been a lot of talk lately about “sharenting,” or parents oversharing information about their children on the Internet. Some parents believe they should be able to share their parenting experience as they see fit. But many children, as they grow older and realize the plethora of information that their parents have posted about them, … Continue reading The Risks Of Sharenting: When Parents Post Too Much About Their Kids Online (And How To Share Safely)

How To Protect Your Mobile Devices From Malware

Mobile malware is on the rise, but few people maintain the same precautions on their tablets and phones that they do on their computers. Here’s what you need to do to stay protected. Mobile devices need antivirus software just like any other computer, but watch for malware masquerading as antivirus. In general the same security … Continue reading How To Protect Your Mobile Devices From Malware

How To Configure Security Settings For Windows, Mac, iOS, and Android

When was the last time you checked the security preferences on your computer, tablet, or smart phone? Unfortunately, the default security settings for most devices are woefully inadequate, leaving you vulnerable to viruses, malware, and hacking attempts. Here's more information on how to configure the security and privacy settings for Windows, Mac, iOS (iPhone and iPad), and Android. … Continue reading How To Configure Security Settings For Windows, Mac, iOS, and Android