Category: Cybersecurity
Here we break down complex topics into easy-to-understand guides and articles. From identifying phishing scams and preventing malware to understanding data breaches and securing your personal information, this is where you’ll find the knowledge you need to navigate the digital world safely.
-
What the Heck is a Passkey? Your Easy Guide to Password-Free Logins
by Shane Coursen with assistance from Gemini Tired of remembering dozens of complex passwords? Annoyed by those clunky two-factor codes? Get ready, because a new technology called passkeys is here to make your online life both easier and much, much safer. The Problem with Passwords For decades, passwords have been our digital keys. But let’s…
Written by
-
Stop Panicking About the Latest Data Breach – Your PII is Likely Already Out There!
by Shane Coursen with assistance from Gemini Every time there’s news of a major data breach the same panic erupts: “Oh no, my PII (Personally Identifiable Information) has been compromised! Now I need to be careful!” Caution is always wise, however this reaction often stems from a significant misunderstanding. The uncomfortable truth is that for…
Written by
-
You Spent Thousands on a Website. Now Watch It Get Hacked
by Shane Coursen with assistance from Gemni Most web designers are too busy talking about “user experience” and “brand identity” to tell you the truth: they’ve just built a target on your back. They hand over a shiny, new website, collect their check, and then disappear. But as a cybersecurity engineer, I see what happens…
Written by
-
Google/YouTube is Extending Protections to More US-Based Teens
by Shane Coursen with assistance from Gemini More oversight! More tyranny!! People freaking out!!! Are we all riled up yet? Cool. Take a breath and let’s get down to brass tacks. Google recently put into effect a type of age verification system. It uses a variety of markers to guess a person’s age. those who…
Written by
-
Secure Connections
What is Secure Connections? Secure connections: a connection that is encrypted by one or more security protocols to ensure the security of data flowing between two or more nodes. This week’s buried & forgotten news is next week’s big news! Chrome browser will begin to mark certain types of HTTP pages as not secure in…
Written by