Archives - Cybersecurity Tips


Adjust the privacy settings on your browser

Whether it’s Google Chrome, Microsoft Edge, Mozilla Firefox or any other major browser, they all contain privacy settings that you can customize to fit your needs. These options control common features of websites, such as site permissions, location data, trackers and advertisements. For example, you can decide whether you’ll only receive trackers from sites you […]

How to defend against cryptojacking

Employ Cybersecurity best practices to help you protect your internet-connected systems and devices against cryptojacking. Be sure to use and maintain antivirus software – it recognizes and protects a computer against malware – allowing you to detect and remove a possibly unwanted program before it can do any harm. It’s best to make sure your […]

Biometrics: Which popular phone has the best security?

Biometrics have come a very long way since the original smartphones. As a welcome alternative to constantly typing in your PIN or password every time you want to unlock the phone, biometrics are both convenient and secure. So how do the newest phones handle biometric security? Let’s compare a few to see how each stacks […]

Use biometrics or a PIN

Biometrics includes data such as your fingerprint or face, which can be used to unlock your phone or log into apps. These tend to be much faster than typing in a password, and they’re generally secure. On the other hand, biometrics aren’t 100% secure and a stranger may still be able to unlock your phone. […]

Factory reset your phone before getting rid of it

Whether you’re trading it in, donating it or handing it off for any reason, you’ll want to wipe all the data from your phone before doing so. While the process for this varies by phone, you can easily find out how by searching your settings for something that says “Factory reset” or “Return to factory […]

Don’t allow unknown users into your online meeting

If there’s the potential for mischief on the internet, it’s almost certain someone’s going to take advantage of it. Such is the case with online meetings. There have been quite a few cases of bad actors trying to find their way into these meetings to disrupt them, often by displaying inappropriate or obscene content. This […]