Phishing scams use deceptive messages to steal personal information from victims to access their...
Digital security
Wearable devices: handy, but not secure
Using connected wearable devices such as smart watches is convenient, but also presents risks...
Is cloud computing secure?
Cloud services such as Dropbox or Apple’s iCloud make it easy to access and share files from any...
USB safety Part 2: Protect your USB port
The USB port, if left unsecured, provides an easy path to bypass the plugged device’s...
USB safety Part 1: Use secure USB drives
USB drives are generally used without much concern for security, but they actually present a number...
Two-factor authentication (2FA) to better protect digital...
Two-factor authentication (2FA) is the process of using two different ways to log in into a digital...