Two-Factor Authentication (also known as two step verification) is an extra layer of security that can be enabled on…
Author: Gerald Johnson Jr.
Public unsecured Wi-Fi is a huge target for malicious actors looking to steal the identities of others in order to…
Public Wi-Fi at first glance can appear to be a blessing. While the ability to connect to an unsecured Wi-Fi…
US-CERT warns users to remain vigilant for malicious cyber activity seeking to capitalize on interest in Hurricane Matthew. Users are…
Protecting your mobile devices is another thing you can do to remain cyber aware. Using a passcode or thumbprint to…
Setting a strong password is the first line of defense when trying to protect your personal data and devices. Strong…
Suspicious and misleading links and emails can lead to the compromise of your machine and your online accounts. Beware of…
Identity theft still ranks as one of the highest cases of cyber crime to date. As more infrastructures become digital,…
When setting up your home network not much thought is put into the setup as much of that is automated…
Keeping with our cyber aware mentality, it is pertinent to monitor our persistent connections. Wi-Fi direct, Bluetooth, and NFC technologies…