encrypt more sh*t

“encrypt more sh*t”  I love this comment, it isn’t mine, I heard it at a security conference once and it is just perfect, I agree, whole heartedly. While I might get carried away, you should absolutely encrypt everything, you really want to strive for end to end encryption online, whole drive encryption on your devices…

4 Steps to Spot Spam

1. The email has improper spelling or grammar This is one of the most common signs that an email isn’t legitimate. Sometimes, the mistake is easy to spot, such as ‘Dear eBay Costumer’ instead of ‘Dear eBay Customer.’ Others might be more difficult to spot, so make sure to look at the email in closer…

Home Computer Security

Scammers, hackers, and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to protect yourself, like keeping your computer software up-to-date and giving out your personal information only when you have a good reason. Use Security Software That Updates Automatically The bad guys constantly…

Phishing and Vishing

Phishing is a scam in which you receive a fraudulent e-mail designed to steal your identity or personal information, such as credit card numbers, bank account numbers, debit card PINs, and account passwords. The e-mail may state that your account has been compromised or that one of your accounts was charged incorrectly. The email will…