What Not to Post On Social Media

Many of the tips this blog provides are active measures to protect yourself from cyber security threats. However, sometimes less is more. You can be super secure with your security setup, then blow it all away by oversharing on social media. Here's a list of items you should avoid posting on social media sites like … Continue reading What Not to Post On Social Media

Tech Tip: Hidden Secrets of the iPad

  Apple is one of the most recognizable global brands in today's tech market, and one of their signature products is the iPad. There are several cool little tricks you can do with your iPad. Interested? Read on: 1.) Four Finger Swipes If you are running multiple apps at once, and need to quickly switch … Continue reading Tech Tip: Hidden Secrets of the iPad

Best Free Antivirus Security Suites

In previous posts, I've repeatedly driven the point that having up-to-date antivirus protection on your machine is a must. Some of you might not want to shell out $70-120 for antivirus services. While the paid services are generally much higher end and better quality than free antivirus programs, even free antivirus is better than no … Continue reading Best Free Antivirus Security Suites

Tech Tip: Using a VPN to Secure Your Internet Usage

Online privacy is of serious concern to many users of the internet. In today's age, the public should be wary of hackers, spy agencies and governments trying to tap into users online activities in order to monitor their sessions or steal their information. With the increased focus on information security and narrative control by many … Continue reading Tech Tip: Using a VPN to Secure Your Internet Usage

The Gap Between Technology and the Law

It is illegal for a potential employer to ask you about your religion, race, ethnicity or national origin while conducting a job interview. Discriminating against your application based on the results of those queries would be an absolute violation of your rights. However, there is nothing stopping a potential employer from looking you up on … Continue reading The Gap Between Technology and the Law

Tech Tip: Securing Your Systems and Information From Hackers

In the modern era, services involving sensitive information, such as shopping and banking, are commonly conducted over the internet. However, many of us are not careful enough with accessing our banking accounts or inputting credit card and social security information while utilizing these services. Here's a couple of steps you can take to ensure that … Continue reading Tech Tip: Securing Your Systems and Information From Hackers

NIST and the New Standards of Password Security

When it comes to password policies, most organizations have similar rules about what qualifies as a good password. Normally, they require a minimum of 8 characters, including upper case, lower case, numeric and special characters, cannot be one of the five most recent passwords used, and have a maximum age ranging from 30-120 days depending … Continue reading NIST and the New Standards of Password Security