How-tos

How to send an anonymous email - How can you send an anonymous email? And how do cybercriminals go about sending them, in large quantities even?
How to delete your Instagram account - If you want to take a break from Instagram either temporarily or permanently, we'll walk you through it step by step.
How to deactivate or delete your Facebook account - If you want to take a break from Facebook temporarily or delete your account permanently, we provide the instructions on how to do either.
How to delete your Twitter account: the deactivation process - We explain how to delete your Twitter account via a 30-day process known as deactivation, whether on desktop or mobile.
Employee education strategies that work to change behavior - Using technology alone to combat cyberattacks is not enough. That's why employee education on security awareness should be an integral part of any company's cybersecurity policy.
The lazy person’s guide to cybersecurity: minimum effort for maximum protection - How can we help our less tech-savvy friends stay more secure online? By giving them a lazy person's guide to cybersecurity, we can offer maximum protection for minimal effort.
Should you delete yourself from social media? - All the recent news—from Facebook's Cambridge Analytica snafu to various abuses of Twitter vulnerabilities—has you wondering: Should I delete myself from social media? We provide advice and links on how to tighten security if you want to cool down, or, if you're ready to go nuclear, delete yourself permanently.
Collection 1 data breach: what you need to know - In what's being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.
Assessing the security of a portable router: a look inside its hardware, part deux - In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.

Select your language