Buyer’s guide: How to choose the right business laptops
With hundreds of business-oriented laptops to choose from, picking the right ones to outfit your company’s workforce can be daunting. We’re here to help with a buyer’s guide that breaks the options into categories and provides details, price estimates, and pros and cons of each. Ranging from $200 for the cheapest budget models to nearly […] more…Privacy, please! Why a VPN on your smartphone may be a smart move for you.
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking that’s happening out there today. For some time now, we’ve recommended a VPN when using public Wi-Fi in airports, libraries, hotels, and coffee shops. Given that these are public networks, a determined hacker can snoop […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…The New McAfee: A Bold New World of Protection Online
This news has been some time in the making, and I’m terrifically excited to share it. As of July 27th, we take a decisive step forward, one where McAfee places its sole focus on consumers. People like you. This marks the day we officially divest our enterprise business and dedicate ourselves to protecting people so they can freely enjoy […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Medical Care #FromHome: Telemedicine and Seniors
Medical Care From Home: Telemedicine and Seniors For weeks and even months now, millions of us have relied on the internet in ways we haven’t before. We’ve worked remotely on it, our children have schooled from home on it, and we’ve pushed the limits of our household bandwidth as families have streamed, gamed, and conferenced […] more…Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices tend to be smart meters, […] more…Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…Family Tech Check: 5 Ways to Help Kids Balance Tech Over Summer Break
It’s mind-blowing to think that when you become a parent, you have just 18 summers with your child before he or she steps out of the mini-van and into adulthood. So at the mid-summer point, it’s a great time to ask: How balanced is your child’s screen time? Don’t panic, it’s normal for screen time […] more…How to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…More information
- Mobile spyware customer data leaked online in apparent mSpy hack
- Why Getting Followers On Instagram Is Important For A Business
- Adobe Patches 42 Vulnerabilities Across Five Products
- NSA ends surveillance tactic that pulled in citizens’ emails, texts
- LockBit Affiliate Deploys New 3AM Ransomware in Recent Attack
- Resolved: Known Error impacting UCS Contacts
- Resolved: Update: Some CLC Services Unavailable This Morning
- Google Updates Policies to Reject Ads for Spyware
- Resolved: eDDS/Imaging Down
- Don’t replace your people with ChatGPT or other AI services