Privacy and Security Basics
23 Articles in this category
Mobile Hardening Guides
3 Articles in this category
How to Create Email Filters
Here are step-by-step instructions on how to set up email filters for Google, Yahoo and Microsoft.
WhatsApp Hardening Guide
Here are step-by-step instructions on how to secure your WhatsApp account.
Snapchat Hardening Guide
Here are step-by-step instructions on how to secure a Snapchat account.
Instagram Hardening Guide
Here are step-by-step instructions on how to secure your Instagram account.
TikTok Hardening Guide
Here are step-by-step instructions on how to secure a TikTok account.
LinkedIn Hardening Guide
Here are step-by-step instructions on how to secure your LinkedIn account.
Twitter Hardening Guide
Here are step-by-step instructions on how to secure your Twitter account.
Facebook Hardening Guide
Here are step-by-step instructions on how to secure your Facebook account.
Enabling a Passcode On Your Mobile Device
Enabling a passcode on your mobile device helps to protect your data from unauthorized access. Apple Here are Apple's instructions for enabling a passcode on your iPhone or iPad device. Android Here are Google's instructions fo...
ChatGPT Privacy and Security Considerations
ChatGPT has become an incredibly popular tool, but while it can be used for a number of purposes, there are privacy and security considerations you should know about. This guide will highlight what ChatGPT is, and what you should and shouldn't do wh...
Securing Your Email Account
The most important and vulnerable account in your digital life is your email account. Your email can be the doorway to access numerous linked accounts and personal information. If an email account is compromised, a malicious actor could have the a...
Keep Your Browser(s) Updated
Here are steps for updating or checking to see if an update is available for your browser on the most popular browser platforms. Google Chrome Update (or Check for Updates) on Google Chrome - Google's instructions for checking and installi...
Updating/Upgrading Mobile Devices or Computers
We recommend setting devices for automatic updates in order to receive the latest security patches from your device manufacturer. Sometimes those automatic updates don't happen, but here's you can update for your particular device. Apple Upd...
Helping Children Stay Safe Online
Whether you're using the internet for school, entertainment, or to keep in touch with friends and family, it's important to know how to stay safe while you're online. Today, we're going to talk about some best practices for staying safe online, an...
Social Engineering Red Flags
Scams and hackers use convincing stories to frame a situation, rush you into making a decision, and heighten your emotions in order to trick and defraud you. Here’s some common scams and some tips to recognize their schemes before you get scammed: ...
Virtual Private Network (VPN) Overview
This guide explains the ins and outs of a VPN, and how to set one up What Is a VPN? As the name implies, a virtual private network offers improved security when using the Internet. It is an encrypted connection between two endpoints. VPNs once h...
Brave Browser Settings iOS/Mac OS/Windows
Recommended Settings for Your Brave Browser Please use the following guidance to install and configure the Brave Browser on both your iOS and macOS/Windows devices. ➔ Check that the browser is up-to-date If using iPhone or iPad, navigate to ...
How to Securely Wipe Devices
Below are instructions to securely wipe your device SSD in the event of selling the device, trading it in, passing it on to a new user, or throwing it away. This process will prevent unauthorized access to data that was on your phone once it is out ...
ChromeBook Security Hardening Guide
No matter how hard you try to secure your ChromeBook- the most important thing is to secure your Google account. Your Google account is the gate to your Chromebook, so you want to make sure you have the proper security measures set in place. Yo...
Apple Watch Security and Privacy Recommendations
What is the Purpose for Privacy and Security Hardening? Limit the information that is shared with device manufacturers and third party apps. Configuring Recommended Security & Privacy Settings ➔ Begin by navigating to the Settings app on your ...
Zoom Conference Security
Secure Your Zoom Meetings Please note, there is no true end-to-end encryption for this platform so urge caution with what is said or sent in chat rooms during meetings. ➔ Password Protect Meetings Add passwords to all meetings. Previousl...
Mail Fraud, Mail Theft and USPS Informed Delivery
This document serves as a guide to explain how mail fraud works, and what you can do to report it, as well as explains how to utilize USPS's Informed Delivery service. MAIL FRAUD What is mail fraud? Mail fraud is where scammers attempt to gain...
How to Check the Extensions on Your Browser
Occasionally you may find an extension on your browser that you did not download, or you may decide you want to uninstall an extension you no longer use. This guide will show you how to find the extensions installed on your browser. Google Chrome ...