
How to Avoid Cell Phone Identity Theft
Smartphones including iPhones and Androids are growing in popularity, and as a result, cell phones are becoming a rapidly increasing target of identity theft. These phones have an ability to store vast amounts of personal information and…

Cyber Security for Home Networks – 5 Important Steps
When it comes to cyber security at home, it’s important to establish a game plan for all household technology users that is realistic and manageable. An updated and thorough game plan can greatly reduce and even prevent identity theft and…

How to Keep Track of Passwords and Usernames
With my rapidly growing list of over 165 passwords and usernames and an increase in mass password breaches, I decided today is the day to seek out a better and a safer way to create and to keep track of my passwords, usernames and other…
Follow Hayley on Social Media