2022's best place for Cybersecurity Insights and Advice for Everyone

Find What You're Looking For

What is Shoulder Surfing?

What is Shoulder Surfing?

Shoulder surfing is a form of social engineering that enables cybercriminals to gather information just by looking over their victims’ shoulders. The aim of shoulder surfing is to obtain personal data, such as usernames, passwords or personal identification numbers (PINs), bank account numbers or credit card numbers.

12 Ways to Help Older Adults Stay Safe Online These Days

12 Ways to Help Older Adults Stay Safe Online These Days

Seniors, like everyone else, have special vulnerabilities in addition to the common Internet risks. They have specific characteristics that make them vulnerable online, particularly to online fraud. Isolation and lockdowns caused by the pandemic have forced seniors to embrace technology like never before. Here are 12 ways to key seniors safe online.

What is a Website Security Certificate?

What is a Website Security Certificate?

A website security certificate is a digital certificate that asserts the identity of a website. It’s a virtual file approved by an industry-trusted third-party called a certificate authority (CA)

What is Social Engineering?

What is Social Engineering?

Social Engineering in the digital world is the intentional deception and manipulation of victims to cause the release and sharing of confidential information used to commit fraud and other cybercrimes.

What is Business Email Compromise (BEC)

What is Business Email Compromise (BEC)

Business email compromise is one of the most financially destructive cyber crimes. These are emails that appear to be sent by known or trusted sources asking for something legitimate.

What is Spear Phishing?

What is Spear Phishing?

Spear phishing is a targeted cyberattack to steal your information. You should be aware of the dangers of this and how to address them.

10 Cybersecurity Trends for Small Businesses in 2022

10 Cybersecurity Trends for Small Businesses in 2022

Knowing the latest cybersecurity trends spells the difference between keeping your business safe and opening it up to cyber attackers.

What is a deep fake video and how to spot It

What is a deep fake video and how to spot It

People can easily be fooled into believing they are seeing or hearing something that has no basis in truth in a culture filled with misinformation and deception. Deepfake videos have forced viewers to wonder whether or not what they are seeing or hearing in a video or audio recording is real.

Element Chat Review: How Secure Is It, Really?

Element Chat Review: How Secure Is It, Really?

Element is a secure messaging app for safer personal and corporate communication and other group chats.

Why should you use a Password Manager?

Why should you use a Password Manager?

How many passwords do you have? Did you know the average Internet user has 100 passwords. That's a lot of passwords to remember on a daily basis. How do manage all those password effectively - a password manager.

What is a Remote Access Trojan (RAT)?

What is a Remote Access Trojan (RAT)?

A remote access Trojan is a software used by hackers to gain unauthorized access and remote control on a user’s computer or mobile device, including mouse and keyboard manipulation. 

What is a Computer Virus?

What is a Computer Virus?

What's a computer virus? We hear about it all the time but do you really know what it is and how to prevent one?