Questions to Ask about That Suspicious Text
A suspicious text may be an obvious cyberattack, but if you’re unsure, here are some questions to help you. Continue reading Questions to Ask about That Suspicious Text
A suspicious text may be an obvious cyberattack, but if you’re unsure, here are some questions to help you. Continue reading Questions to Ask about That Suspicious Text
This post will help you learn the ropes to navigate a breach. You’ll need to clean up accounts, emails, and passwords. Continue reading How to Navigate a Data Breach
I was about to hand-address 34 mailing labels. I thought it would save time to print them. Unfortunately, it took me several hours to figure this out. That’s okay. I now know how to print labels and can tell you so I can save YOU time. Continue reading Using Avery Labels: Step-by-Step
Do you want to know if your friends are okay? Were they in the path of dangerous storms? Are firefighters battling a wildfire near them? Did you learn of an earthquake in an area that will change your travel plans? I tracked down some tools that might help you. I’ll share a lot of screenshots of the sites. Continue reading Online Disaster-tracking Tools
Your new habit for the new year is to secure your key fob at home in one of several ways. Continue reading Security Tips for the New Year
You must change the way you think about passwords. The National Institute of Standards and Technology (NIST) recommends we use our power of association and unique mental images. Continue reading Passphrases Are the New Passwords