tip of the week

Hands off my data! 15 more default privacy settings you should change on your TV, cellphone plan, LinkedIn and more.

Hands off my data! 15 more default privacy settings you should change on your TV, cellphone plan, LinkedIn and more.

It’s not just Google and Facebook that are spying on you.

Thirteen Tips to Achieve Great CyberSecurity Without Spending a Fortune

Thirteen Tips to Achieve Great CyberSecurity Without Spending a Fortune

With the new dynamics at play it is increasingly important for small business owners, entrepreneurs considering starting a business, and people in general to cyber-protect themselves.

Cybercrime Can Make You Rich

Cybercrime Can Make You Rich

It’s no surprise that global spending on cybersecurity products and services is predicted to surpass $1 trillion over the next four years, according to Cybersecurity Ventures. After all, a massive problem needs a massive solution.

Cybersecurity Tips That are Cost-effective and Efficient

Cybersecurity Tips That are Cost-effective and Efficient

We know that the subject of cyber security can be daunting. We know it is discouraging to hear about all of the ongoing cyber crime. We know you want to do the right thing and we know you have a budget. Begin with these tips to ease you into a more cyber secure environment

Cybercrime: A Boundless Threat

Cybercrime: A Boundless Threat

Digital technology continues to transform and disrupt the world of business, exposing organisations to both opportunities and threats. So it’s hardly surprising that cybercrime continues to escalate – ranking as this year's second most reported economic crime.

How to Secure Your Email (And Why It Matters More Than You Think)

How to Secure Your Email (And Why It Matters More Than You Think)

"Furthermore, despite the historic focus of hackers on governments and corporations, their gaze is gradually shifting towards individuals."

Calling All Computer or Credit Card Users...

Calling All Computer or Credit Card Users...

Top cyber security expert offers up his best advice for online holiday shopping and year round caution. Get the answer to questions like: How do criminals get credit card and personal information? What's the first thing I should do when making an online purchase? 

Two-Factor Authentication: Who Has It and How to Set It Up

Two-Factor Authentication: Who Has It and How to Set It Up

This article...does 4 important things. 1. It states the obvious, that password only authentication is an extremely inadequate from of authentication; 2. It lists roughly 30 commonly used sites and accounts that offer two-step authentication; 3. It walks the reader through how to set up a two-step verification system on each of these accounts (including videos and screenshots); and 4. It discusses the inconvenience of security.