We all have multiple email accounts and many of us do always have the best plan in place to secure and recover those accounts. Let’s cover some basics and tips that I use to maintain my email infrastructure. The tips will vary depending on your email provider, but can be adapted to your unique situation. […]
When it comes to our security, we have to weigh the need for security and connectivity and make the most informed choices that will protect our data, devices, and privacy.
Passwords are necessary, complex, shared, written down, forgotten, lost, and despised. What is legal, safe, and smart?
What access permissions have you given others to your phone and the data contained within it?
We are at a time when your phone is your kingdom, and you would be wise to erect a mote to keep out marauders.
In this ever changing time, and with the constant influx of social media platforms to choose from, everyone is likely to find something that intrigues them. We have Twitter for short thoughts, Facebook for long ones, Periscope for videos, Instagram for photos, and numerous other for everything under the sun.
With the summer travel season in full swing and the current state of our world it is wise to be prepared for problems,which brings us to a tip I read some time ago and have had in practice since then with minor adjustments for changing technology and environments.
The past few weeks brought news of a rush of new hacks and old ones brought back to light. We saw LinkedIn, Tumbler, and Twitter with breaches in the tens of millions of accounts. We saw major celebrities get hacked from Mark Zuckerberg and Lana Del Rey, Katy Perry, the NFL, and DeRay Mckesson.