How-tos

Website misconfigurations and other errors to avoid - Website misconfigurations can lead to hacking, malfunction, and worse. We take a look at recent mishaps and advise site owners on how to lock down their platforms.
Coughing in the face of scammers: security tips for the 2020 tax season - In spite of everything happening in the world, taxes are due in the US. Here are some tips to protect your personal info during this unusually taxing tax season.
Teaching from home might become part of every teachers’ job description - Teaching from home may soon become a part of the new normal. What do teachers have to keep in mind to pull it off? Privacy, data protection, and security.
10 best practices for MSPs to secure their clients and themselves from ransomware - For MSPs, securing themselves from ransomware is just as much a practice in securing clients.  See how to save data—and money—with these best practices.
Cloud data protection: how to secure what you store in the cloud - With robust security measures and a healthy dose of general internet safety guidelines, cloud storage can be as secure as any other option on the market.
Keep Zoombombing cybercriminals from dropping a load on your meetings - In a zeitgeisty moment, Zoom has become the web conference tool of choice for everyone. Unfortunately, cybercriminals are taking note and Zoombooming the public. We show readers how to protect against this intrusion of privacy.
Security tips for working from home (WFH) - Many people are working from home as part of a global social distancing effort to avoid spreading the coronavirus. Learn how to stay secure (plus a couple tips for staying sane) while WFH.
How to prevent a rootkit attack - Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.
Dubious downloads: How to check if a website and its files are malicious - Users often search the web for downloads when companies no longer support software, and what they find is dubious. How can they tell if the files are safe? We tell how to spot the difference.

Select your language