cyber security expert

Hands off my data! 15 more default privacy settings you should change on your TV, cellphone plan, LinkedIn and more.

Hands off my data! 15 more default privacy settings you should change on your TV, cellphone plan, LinkedIn and more.

It’s not just Google and Facebook that are spying on you.

Cybercrime Can Make You Rich

Cybercrime Can Make You Rich

It’s no surprise that global spending on cybersecurity products and services is predicted to surpass $1 trillion over the next four years, according to Cybersecurity Ventures. After all, a massive problem needs a massive solution.

Cybersecurity Tips That are Cost-effective and Efficient

Cybersecurity Tips That are Cost-effective and Efficient

We know that the subject of cyber security can be daunting. We know it is discouraging to hear about all of the ongoing cyber crime. We know you want to do the right thing and we know you have a budget. Begin with these tips to ease you into a more cyber secure environment

How to Secure Your Email (And Why It Matters More Than You Think)

How to Secure Your Email (And Why It Matters More Than You Think)

"Furthermore, despite the historic focus of hackers on governments and corporations, their gaze is gradually shifting towards individuals."

Calling All Computer or Credit Card Users...

Calling All Computer or Credit Card Users...

Top cyber security expert offers up his best advice for online holiday shopping and year round caution. Get the answer to questions like: How do criminals get credit card and personal information? What's the first thing I should do when making an online purchase? 

Two-Factor Authentication: Who Has It and How to Set It Up

Two-Factor Authentication: Who Has It and How to Set It Up

This article...does 4 important things. 1. It states the obvious, that password only authentication is an extremely inadequate from of authentication; 2. It lists roughly 30 commonly used sites and accounts that offer two-step authentication; 3. It walks the reader through how to set up a two-step verification system on each of these accounts (including videos and screenshots); and 4. It discusses the inconvenience of security.