How to create strong and secure passwords and general password guidelines.

, , ,

How to Avoid Cell Phone Identity Theft

Smartphones including iPhones and Androids are growing in popularity, and as a result, cell phones are becoming a rapidly increasing target of identity theft.  These phones have an ability to store vast amounts of personal information and…
, , , ,

Cyber Security for Home Networks – 5 Important Steps

When it comes to cyber security at home, it’s important to establish a game plan for all household technology users that is realistic and manageable. An updated and thorough game plan can greatly reduce and even prevent identity theft and…
, , , ,

How to Keep Track of Passwords and Usernames

With my rapidly growing list of over 165 passwords and usernames and an increase in mass password breaches, I decided today is the day to seek out a better and a safer way to create and to keep track of my passwords, usernames and other…