Every time another website is hacked, or another company suffers from a data breaches, the same advice crops up in the media and in corporate blogs. Over and over again experts offer lists of all the things companies should do to protect...
We’ve all read about various forms of cybercrime and its various levels of impact. Oftentimes we hear about a company whose network has been compromised, leading to the loss of sensitive information. But that’s just one scenario out of many...
In many ways, your email account is the digital equivalent of your house address. You give it to people and businesses, so they know where to send the products and helpful information you requested. It offers a way to keep in touch with fam...
Many of us either use weak passwords or reuse passwords on multiple accounts. Storing your passwords in your browser, a document, or in writing opens you up to a number of threats, and also increases your risk of losing that important data...
A strong password should include a mix of lower-case and upper-case letters, numbers, and special characters. However, the overall password length is even more important than the characters used, as password cracking programs will start wit...
After 10 years, support for Windows 7 is coming to an end on January 14, 2020, with Office 2010 following shortly thereafter.
End of support means that your Windows 7 or Office 2010 software will no longer receive updates, including sec...