Two Factor Authentication Instructions for Major Online Services

Apple Facebook Google Microsoft Twitter Description of Two-Factor authentication: One way to greatly strengthen your password is to enhance it with another authentication system. It’s called “two factor” or “multi-factor” authentication and it works the same way your...
Tips for Safe and Civil Use of Anonymous Apps

Tips for Safe and Civil Use of Anonymous Apps

A growing number of apps allow people to post anonymously. There are some very positive aspects to anonymous apps, including the ability to reach out for help and post with less worry about being criticized or embarrassed. But of course there are some risks. Here are...
Parent’s Guide to Cybersecurity

Parent’s Guide to Cybersecurity

Download Free Guide (PDF) Download Free Quick Guide (PDF) Just about everyone is online these days, including the vast majority of teens and a growing number of young children. Whether by using a smartphone, accessing the web, watching a video, texting or playing a...

Seven good smartphone security habits

by Monica Vila As we load up our smartphones and tablets with more and more personal information, it’s time to get serious about mobile security. Despite the proliferation of cloud backup services, we still remain vulnerable to lost or stolen handsets, data theft, and...

Connected devices at CES raise security, privacy and safety questions

It seems as if almost every exhibitor at CES was showing things that connect to other things. LG showed off washing machines and kitchen appliances that send messages to smartphones. Schlage announced a Bluetooth-enabled smart lock that enables iPhone users to use...