Do you happen to have an old device and looking to upgrade? Maybe you already have a bunch of old…
Year: 2022
Mobile devices are our most commonly used technological devices on a day-to-day basis. It is imperative that we secure our…
Typosquatting is when a cybercriminal registers a domain closely related to a legitimate domain, in the hopes to lure unaware…
External hard drives and USB devices are integral to modern technology. They allow you to have data on an easily…
Firewalls have long been considered the first line of defense for computers against cyber attacks but are often considered a…
Cybersecurity firm Sophos has released a new report, “The State of Ransomware 2022”, they reported ransomware attacks have nearly doubled…
For Apple® users, downloading, deleting, and using apps is part of everyday usage. How is Apple® working to protect your…
Two-Factor Authentication or as it’s commonly known, 2FA, is another way to verify that you are actually the person who…
Spam sometimes known as junk mail, is a common annoyance even before email existed. Spam emails can flood our inbox…
Everyone in this day and age has at least one social media account. Whether your account is set to private…