How-tos

10 best practices for MSPs to secure their clients and themselves from ransomware - For MSPs, securing themselves from ransomware is just as much a practice in securing clients.  See how to save data—and money—with these best practices.
Cloud data protection: how to secure what you store in the cloud - With robust security measures and a healthy dose of general internet safety guidelines, cloud storage can be as secure as any other option on the market.
Keep Zoombombing cybercriminals from dropping a load on your meetings - In a zeitgeisty moment, Zoom has become the web conference tool of choice for everyone. Unfortunately, cybercriminals are taking note and Zoombooming the public. We show readers how to protect against this intrusion of privacy.
Security tips for working from home (WFH) - Many people are working from home as part of a global social distancing effort to avoid spreading the coronavirus. Learn how to stay secure (plus a couple tips for staying sane) while WFH.
How to prevent a rootkit attack - Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.
Dubious downloads: How to check if a website and its files are malicious - Users often search the web for downloads when companies no longer support software, and what they find is dubious. How can they tell if the files are safe? We tell how to spot the difference.
Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press - When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?
How to protect yourself from doxing - Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.

Select your language