How to create strong and secure passwords and general password guidelines.

, ,

Beware of sneaky and effective gmail attack

A new successful gmail phishing attack has come to my attention and it's so subtle and successful that both inexperienced…
Cyber Tips
, , , , ,

Six fraud avoidance tips from FBI Special Agent

At a recent Cyber Security/Fraud event in Los Angeles, I learned new and valuable information from an FBI Supervisory Special…
, , , , , , , ,

Dangers of Seniors and Technology

Looking over my dad’s new smartphone photos, my heart skipped a beat. I was staring at vibrant photographs of every credit…
, , , , , ,

What do you do when you or someone you know has been hacked or spoofed?

I'd like to tell you that I've never clicked on a link I shouldn't have clicked on, but that would be a lie. Do you realize…
, , , , , , , , , , , ,

Anthem Breach: 7 Tips to Protect Yourself Amidst Attacks

Whether directly impacted or not, there are things we must all learn from the Anthem breach. The sensitive information…
, , , , , , , , ,

Taking Control of Privacy

There is no doubt there are aspects of privacy that are out of our control, but as discussed in the last post called Privacy…
, ,

4 Simple Home and Work Cyber Safety Tips

Upon arrival at the Riverside County Sheriff's Department for cyber security training by a division of Homeland Security,…
, ,

How to Protect your Smartphone from Mobile Attacks

With increasing popularity of tablets and more than 1 billion smartphone users in the world, access and storage of sensitive…
, , ,

How to Keep Hackers Out of Your Website or Blog

I was uncomfortable and unhappy after I watched someone hack into a site in less than 5 minutes. It was so easy to do! So,…
, , ,

How to Create Strong Passwords and General Password Guidelines too

Strong password protection has become critical as we use the internet for just about everything, including shopping, Social…
, , , ,

How to Secure your Smartphone and Increase Your Mobile Security

As smartphones increase in popularity, threats to privacy grow too.  We enjoy the convenience of using our phones for online…
, , ,

How to Avoid Cell Phone Identity Theft

Smartphones including iPhones and Androids are growing in popularity, and as a result, cell phones are becoming a rapidly…