Privacy and Security Basics
Snapchat Hardening Guide
Click your profile icon at the top left corner of the app Click the settings icon In the settings page, you will see all of your personal information....
How to Create Email Filters
Navigate to [https://mail.google.com/mail/u/0/#inbox](https://mail.google.com/mail/u/0/#inbox) Click the settings icon in the top right. Click "See al...
WhatsApp Hardening Guide
On the bottom right hand corner of the app, click the settings icon Click here: Here, you can find your privacy and security settings Go back to the s...
Signal Hardening Guide
On the top left hand corner of your screen, top on your profile picture, then tap Settings Tap on the tile with your name and profile picture Here, yo...
TikTok Hardening Guide
Click your profile icon on the bottom right hand corner of the app Click this icon Click settings and privacy In your profile, click this icon Click s...
LinkedIn Hardening Guide
Navigate to [https://www.linkedin.com/feed/](https://www.linkedin.com/feed/) Click your profile icon Click Settings & Privacy Click your profile icon ...
Instagram Hardening Guide
Click your profile icon on the bottom right hand corner of the app Click here After you click on the lines on your profile page, click Accounts Center...
Facebook Hardening Guide
Click the profile icon on the bottom right hand corner of the screen Click Settings & privacy Click Settings Follow the steps above and then click Acc...
An Overview of Home Title Theft
Home Title Theft is when a malicious actor uses sensitive personal information such as: date of birth, Social Security Number, etc, to reassign someon...
Parental Controls for Popular Video Games/Discord
Online gaming allows players to connect with people all over the world. For children, this means they will likely interact with older players. It is a...
An Overview of SIM Hijacking
SIM hijacking is a cyberattack that can cause victims a lot of headaches. It became notable enough for law enforcement agencies, such as the FBI, to i...
Resources for Children and Parents for Staying Safe Online
Educational Cybersecurity Resources for Kids We have compiled a few resources to share with your children to teach them the essentials of best practic...
Best Practices for Keeping Children Safe Online
Whether you're using the internet for school, entertainment, or to keep in touch with friends and family, it's important to know how to stay safe whil...
What to Do When You Are Impacted By a Data Breach
Data breaches can cause a great deal of headaches for victims, and even though the aftermath of a breach may seem stressful, it doesn't mean all hope ...
How to Check the Extensions on Your Browser
Occasionally you may find an extension on your browser that you did not download, or you may decide you want to uninstall an extension you no longer u...
Mail Fraud, Mail Theft, and USPS Informed Delivery
This guide explains how mail fraud works and what you can do to report it, as well as how to utilize the USPS's Informed Delivery service. Mail fraud ...
Zoom Conference Security
Please note, there is no true end-to-end encryption for this platform so we urge caution with what is said or sent in chat rooms during meetings. ➔ P...
ChromeBook Security Hardening Guide
No matter how hard you try to secure your ChromeBook- the most important thing is to secure your Google account. Your Google account is the gate to yo...
Virtual Private Network (VPN) Overview
This guide explains the ins and outs of a VPN, and how to set one up As the name implies, a virtual private network offers improved security when usin...
Social Engineering Red Flags
Scams and hackers use convincing stories to frame a situation, rush you into making a decision, and heighten your emotions in order to trick and defra...
Helping Children Stay Safe Online
Whether you're using the internet for school, entertainment, or to keep in touch with friends and family, it's important to know how to stay safe whil...
Updating/Upgrading Mobile Devices or Computers
We recommend setting devices for automatic updates in order to receive the latest security patches from your device manufacturer. Sometimes those auto...
Keep Your Browser(s) Updated
Here are steps for updating or checking to see if an update is available for your browser on the most popular browser platforms. Update (or Check for ...
Securing Your Email Account
The most important and vulnerable account in your digital life is your email account. Your email can be the doorway to access numerous linked accounts...
ChatGPT Privacy and Security Considerations
ChatGPT has become an incredibly popular tool, but while it can be used for a number of purposes, there are privacy and security considerations you sh...
Enabling a Passcode On Your Mobile Device
Enabling a passcode on your mobile device helps to protect your data from unauthorized access. Here are Apple's instructions for enabling a passcode...
An Overview on Data Brokers
You may not know it, but your personallly identifiable data is likely available for free or for purchase right now. Plenty of groups, both reputable a...
Physical Two Factor Authentication Methods
Physicial devices can be used as two factor authentication methods to protect your online accounts. These are devices you would interact with to acces...
Considerations When Choosing an Email Provider
There are many thoughts that come to mind when choosing an email provider, such as security and privacy. The good news is that all modern email provid...
Security Consideration Around AirTags
Apple AirTags are a helpful tool for those who wish to keep track of their belongings. Users are prompted to follow a beeping sound to locate items ma...
Steps to Take After Receiving a Data Breach Notification Letter
Data breach notification letters are pieces of mail no one wants to receive. It can be frustrating to have your information exposed in a breach, but i...
How to Encrypt a Flash Drive on Windows and Mac
Flash drives are incredibly useful. Despite their small size, they can store and transfer large amounts of sensitive data. However, flash drives can b...
Using Remote Access Software Safely
Remote access software can be an incredibly helpful tool, but it can also be leveraged by cybercriminals for various cyberattacks. This guide will exp...
Best Practices for Remote Work Security
The landscape of work has transformed significantly due to the COVID-19 pandemic, with remote work becoming increasingly prevalent. While this shift o...
An Overview of the Internet of Things and Security
The Internet of Things (IoT) comprises devices embedded with sensors and software to connect and share data over the internet. Common IoT devices incl...
Careful Use of Public Wi-Fi
While the convenience of public Wi-Fi can be alluring, it also exposes you to numerous cyber threats. This guide will explain the dangers associated w...
How to Handle Cyberbullying
With the increasing prevalence of remote work and online interactions, cybersecurity has become a crucial concern. Cyberbullying has emerged as a sign...
Best Practices for Responding to Cyberstalking
Cyberstalking is the use of technology—like email, social media, or tracking devices—to monitor, harass, or intimidate individuals. Bad actors often e...
An Overview of Deepfakes
Deepfake technology has recently emerged as the latest tool bad actors have leveraged to conduct their cyber scams. Cybercriminals have used many diff...
An Overview of Scareware
What is Scareware? Scareware is a type of malicious software designed to trick users into believing their device is infected with viruses or experienc...
AI Models: Privacy, Security Risks, and Pros & Cons
As AI models become more integrated into daily life, understanding their privacy and security practices is critical. Each platform comes with its own ...
How to Respond to Different Types of Exposed Personal Information in a Data Breach
In the event of a data breach, different types of Personally Identifiable Information (PII) can be exposed. Knowing what steps to take based on the sp...
Understanding Data Breaches: What It Means When Your Data is Compromised
A data breach occurs when sensitive, confidential, or protected information is accessed, disclosed, or stolen without authorization. This can happen t...
An Overview of Spoofing
Cybercriminals leverage various tactics to conduct their scams, and one of the most common ones they deploy is spoofing. Spoofing is a major element i...
An Overview of Antivirus Software
This guide offers an overview of antivirus software, and why it's highly recommended you have it installed on your devices. What is Antivirus Software...
An Overview of How Sextortion Scams Work
Sextortion scams typically involve a predator coercing an individual into providing explicit images or videos under false pretenses, often threatening...
An Overview of Google Voice
Google Voice is a service by Google that sets up a digital phone number that allows you to call and receive calls over the internet, rather than throu...
An Overview of Backing Up Your Data
A data backup is copy or archive of all the information stored on your device. This can include anything from contacts and photos, to important financ...
Explaining The Difference Between The Deep Web and Dark Web
The websites you normally visit only make up a small portion of the overall internet. The vast majority of the internet is hidden in what we call the ...
Why and When You Should Update Your Devices
Device manufacturers constantly release updates for their products. The contents of the updates may vary, as some include new device functionalities a...
An Overview of Passkeys
An emerging authentication method could mark the end of the password era, ushering in a much more secure way to log into your accounts. They are calle...
How to Make Sure Your Apps Are Updated
You want to make sure your mobile applications are continuously updates. This guide will show you how to download these updates, whether manually or a...
Check Fraud: What It Is and How To Protect Yourself
While threat actors are constantly looking for ways to compromise payment cards online, your checkbook is still in their crosshairs. This guide will e...
Summer Cyber Scams To Avoid
Summer is the season synonymous with travel. Bags will be packed, and countless people will travel all over the world to destinations both new and fam...
Job Scams: How They Work
Bad actors will create fake job listings in an attempt to steal personal information and money from their targets. These listings may appear to be leg...
Credential Stuffing Attacks: An Overview
This guide will explain how credential stuffing attacks work, and how you can protect yourself and your online accounts. Credential stuffing attacks t...
Removable Media: How to Protect Your Devices
Removable media are portable data storage devices that allow users to carry their data with them and access it on different devices without the need f...
Browser Plugin Best Practices
Browser Plugins, commonly known as extensions or add-ons, are small programs that you can install to add new features that customize your browser’s fu...
How to Use Virtual Meeting Platforms Securely
Secure Virtual Meeting Platforms: Best Practices Guide This is a general overview of helpful tips to securely use virtual meeting platforms. Always us...
