How To

100 articles

‘It's easy to stay safe online’ with these 4 steps (plus 1)

Here are the four key steps with easy action items, plus a bonus task to help you protect yourself from identity theft this year.

September 22, 2023·4 min read
Antivirus protection: What to look for

Here are some things to consider when deciding on a security suite and the best antivirus protection for your needs.

September 01, 2023·3 min read
COVID-19 and new device security: 9 tips to help stay cybersafe

If you just purchased a new device in the COVID-19 era, there are steps you can take to help set up and maintain its security. | NortonLifeLock

September 01, 2023·2 min read
September 01, 2023·6 min read
What to do if you're a victim of malware

Trojan horses, bots, adware, ransomware, macro viruses, rogueware, spyware, worms and phishing attacks target Internet users every day. The more we use the Internet, the more vulnerable we are to threats. There are many security measures that Internet users can put in place to minimize putting themselves at risk from malicious attacks.

August 31, 2023·4 min read
How to get rid of a computer virus

There can be thousands of new viruses and malware attacks each year, and they can affect devices and operating systems in many different ways, but virus warning signs tend to be similar across the board. Here's how to tell if your computer may have been infected.

August 31, 2023·4 min read
What is the dark web and how do you access it?

What is the dark web?

 

The dark web is a part of the internet consisting of hidden sites that aren’t indexed by conventional search engines.

July 19, 2023·3 min read
Cybersecurity basics for beginners: 2023 guide

Protect yourself online by familiarizing yourself with these cybersecurity basics, like types of cyberattacks and cybersecurity best practices to follow.

July 18, 2023·2 min read
How to remove a hacker from my phone + tips to prevent hacking

To remove a hacker from your phone, you should review app permissions, remove unfamiliar apps, update the operating system, clear cache, or do a factory reset.

July 11, 2023·2 min read
How to remove personal information from the internet: 9 methods for 2023

With some time and a little effort, you can remove your information from the internet yourself or you can pay certain companies to remove some of your data for you.

June 28, 2023·3 min
June 13, 2023·4 min read
How to clear cookies + cache in every browser

Discover how to clear cookies from Chrome, Firefox, Safari, and other browsers to browse online more securely.

June 13, 2023·4 min read
How to remove malware from a Mac or PC: A 2023 guide

In general, the first steps to remove malware for a Mac or PC are to disconnect from the internet and enter safe mode.

March 16, 2023·3 min read
How to file taxes online safely + tips

Learn how to file taxes online safely by following these steps. The goal is to keep your personal and financial information private when filing your taxes.

February 06, 2023·3 min read
How to find hidden cameras: 10 detection methods

Be it a hotel or vacation rental, you may wonder about hidden cameras. Follow this guide to learn how to find hidden cameras and help protect your privacy.

December 20, 2022·2 min read
Data backups 101: A complete guide for 2023

Are you tired of dealing with spotty Wi-Fi, researching "how to extend Wi-Fi range" for answers? To combat this, follow these steps to boost your Wi-Fi signal.

November 08, 2022·3 min read
How to extend Wi-Fi range: 12 ways to boost your signal

Are you tired of dealing with spotty Wi-Fi, researching "how to extend Wi-Fi range" for answers? To combat this, follow these steps to boost your Wi-Fi signal.

November 03, 2022·2 min read
How to set parental controls on every device: An absolutely ultimate guide

The internet allows children to access almost anything. To help keep your child safe, learn how to set parental controls on all popular devices and platforms.

September 29, 2022·3 min read
How to make your computer faster: 12 ways to improve computer performance

Do you feel like your computer is getting slower by the day? If so, follow these tips to learn how to make your computer faster and improve its performance.

September 18, 2022·3 min read
Top sites to download free ebooks

Here’s a list of free ebook sites from the well-known and popular to the sometimes obscure and fringe. Find something to engage and inspire, dream and escape, or edify and learn.

August 31, 2022·3 min read
10 cryptocurrency scams to avoid in 2023

Explore the most common cryptocurrency scams of 2023 along with tips to avoid cryptocurrency fraud.

August 02, 2022·3 min read
VPN tests: How to tell if a VPN is working

A virtual private network (VPN) helps encrypt your online activity, disguising your browsing. But what happens when a VPN fails you? That’s where a VPN test comes in.

July 01, 2022·2 min read
What are cookies?

The purpose of the computer cookie is to help the website keep track of your visits and activity. Cookie settings can help protect your privacy online.

May 13, 2022·4 min read
How to get free Wi-Fi: The digital nomad's guide to cybersecurity

As digital nomads are on the rise, knowing how to get free Wi-Fi — and knowing how to get Wi-Fi anywhere — is crucial. Consider the following methods and cybersecurity tips.

May 11, 2022·2 min read
Ways to avoid identity theft + ID theft statistics for 2023

This comprehensive identity theft protection guide overviews ways to avoid identity theft, types of identity theft, as well as identity theft statistics.

April 21, 2022·2 min read
How to protect personal information online: A simplified guide

Consider this your go-to guide on how to protect personal information online, including tools and best practices that can help protect your privacy and security.

March 14, 2022·2 min read
Spring clean your phone for a better digital life

Spring cleaning is not just for your home. Deep clean your phone and give it the tidying up it deserves.

February 14, 2022·3 min read
What is an SSL certificate? A definition + FAQs answered

What is an SSL certificate, and why does it matter? An SSL certificate authenticates a website’s identity and enables an encrypted connection. Learn more about this security feature and how it helps prevent cybercriminals from stealing your data.

December 08, 2021·2 min read
How to encrypt email (Gmail, Outlook, iOS, Android)

Email encryption safeguards your personal emails and data to prevent unwanted access. Consider this your go-to guide on how to encrypt email across your accounts.

November 19, 2021·4 min read
How to set up a guest Wi-Fi network: Guest networks explained

An overview of what is a data backup, plus pointers to consider when choosing your data backup solution and when creating your backup strategy.

October 28, 2021·2 min read
How to know if a website is safe: 10 steps to verify secure sites

Review the ultimate guide on how to know if a website is safe this holiday season and beyond with tips and 10 steps for how to check if a website is secure.

October 27, 2021·4 min read
How to securely store passwords – tips for managing and storing passwords

Learn how and why it’s important to securely store your passwords. Find out the pros and cons of password managers, plus unsecure storage methods to avoid.

August 13, 2021·3 min read
How to hack-proof your dorm room: 10 tips

Back-to-school time is a fertile period for scam artists to target college students. Take these steps to help hack-proof your dorm room.

August 04, 2021·4 min read
Q&A: Is it safer to do banking on my computer or phone?

Whether it's safer to bank by computer or phone depends on a variety of factors, but these tips can help whenever you bank online.

July 15, 2021·2 min read
Q&A: I left my data on the infotainment system of a rental car. Problem?

When you use Bluetooth to connect your phone to a rental car infotainment system, the system could get ahold of your call logs, contacts list, phone number, and more. Learn what to do.

July 15, 2021·4 min read
Bloatware: Why it's a concern plus how to remove it

Buy a new device and it’s running slow? Bloatware could be your problem. Consider these following types, how to remove them, and the cyber threats they’re associated with.

June 10, 2021·2 min read
Digital generations: The technology gap between seniors, parents, and kids

An overview of the term digital generations and the digital natives and digital immigrants who fall under it, plus tips for each generation to stay cyber-wise.

May 26, 2021·3 min read
25 vital computer maintenance tips and checklist to protect your device

Computer maintenance means keeping your computer in good condition through regular cleanings, hard drive updates, and virus prevention. Find out how.

May 24, 2021·3 min read
How to request to remove info from people search sites – Whitepages, MyLife, Spokeo, and more

Learn how to request to remove your personal information from more than a dozen people search sites with this step-by-step guide.

April 07, 2021·4 min read
Survey: Majority of Americans put their confidential data on a piece of paper, not the cloud

The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace.

April 05, 2021·2 min read
A guide for how to spot fake news

Fake news can be hard to spot for adults and children. Here’s a guide to help decipher what’s real and what’s fiction on the internet.

March 23, 2021·3 min read
Are you a digital hoarder? 12 signs plus tips to declutter your data

An overview of what digital hoarding is, plus data hoarding habits to consider and tips to clean up our digital clutter.

March 05, 2021·4 min read
What is cryptocurrency and how does it work? What you need to know

An introduction to cryptocurrency. Learn what it is, how it works, and how it could affect the future.

March 04, 2021·4 min read
5 reasons why general software updates and patches are important

Why are software updates so important? Software updates are important to your digital safety and cyber security. There are a lot of reasons why it's important to update software regularly.

January 22, 2021·2 min read
Good cyber hygiene habits to help stay safe online

Cyber hygiene involves using products and tools that fit your needs, performing hygienic tasks correctly, and starting a routine.

January 22, 2021·3 min read
How to secure your iPad and keep it that way

How to maximize security and privacy while you enjoy convenience and entertainment with your iPad, wherever you happen to be.

January 14, 2021·3 min read
11 security steps to take after unboxing your new devices

Before your new tech gadget becomes part of your day-to-day life, here’s what you need to know about helping to assure privacy and security.

January 14, 2021·4 min read
Do you have a false sense of security online? Take this quiz to find out

A large number of people aren't taking the appropriate steps to protect themselves when they're online. Find out if you’re one of them.

January 06, 2021·3 min read
How to stay safer online: Your 2023 online privacy and device security checklist

Take these 10 steps to help protect your online privacy and device security in 2023.

December 03, 2020·3 min read
How to teach digital citizenship, plus printable posters and games

Consider this your comprehensive guide to digital citizenship. Discover what it means to be a digital citizen, how to teach it — and printable games to help.

November 19, 2020·4 min read
Your must-know guide to new tech set up and device security

Getting one of those top tech gifts over the holidays in 2020? Learn new device security best practices and set up pointers.

November 19, 2020·4 min read
How to safely donate your old laptop, smartphone and other tech gadgets

Donating your old smartphone, laptop, or tablet is a way to help a person or organization in need. Learn how to do it safely.

November 19, 2020·3 min read
What is two-factor authentication (2FA) and how does it work?

Two-factor authentication (2FA) is a way to add an extra layer of security to your personal information that is stored online. We explain how it works.

October 15, 2020·2 min read
How to increase download speed: 15 tips and tricks

You may be able to increase your download speed if yours is slow. Learn some simple and more complex ways to do it.

October 06, 2020·4 min read
11 ways to help protect yourself against cybercrime

Cybercrime is any crime that takes place online or primarily online. Cybercriminals often commit crimes by targeting computer networks or devices. Other cybercrimes include things like “revenge porn,” cyber-stalking, bullying, and child sexual exploitation.

August 14, 2020·2 min read
How to encrypt a flash drive

It’s smart to know how to encrypt a flash drive, because flash drives — and your data on them — could be easily lost or stolen.

July 12, 2020·2 min read
How to keep your cell phone clean in the COVID-19 era: Hardware and software

Learn how to clean the outside and inside of your cell phone for your own health and for the safety of your data and devices.

May 09, 2020·3 min read
How to wipe a computer hard drive in 5 steps

Your personal information will be retrievable on a computer’s hard drive unless you take steps to wipe the hard drive clean. Learn how from Norton.

February 17, 2020·2 min read
What is an SSL certificate?

An SSL certificate is a digital certificate that authenticates the identity of a website. They’re often used on pages that require users to submit personal or credit card information. Learn the different types of SSL certificates and the benefits and disadvantages of each.

December 17, 2019·4 min read
How to remove GPS and other metadata locations from photos

Many digital photographers don’t realize that their photos might carry metadata about locations, time and date, or the device that took the photo. Removing it before posting photos online is crucial to protecting your identity and privacy.

August 27, 2019·4 min read
What is spyware? And how to remove it

Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.

August 09, 2019·2 min read
How to clean your computer: Software and hardware

Clean computing is the practice of maintaining a clean machine, including hardware and software. The average computer is 5-1/2 years old, according to one estimate. Clean hardware can help your computer run more smoothly and extend your computer’s lifespan. Regular cleaning protects your investment and your data.

June 12, 2019·2 min read
10 cybersecurity best practices that every employee should know

If you work for a small or midsize company, it's smart to learn about cybersecurity best practices. A single employee could make a mistake by sharing sensitive company information on their smartphone or clicking on a corrupt link. Cybercriminals can create email addresses and websites that look legitimate. Scammers can fake caller ID information.

April 09, 2019·2 min read
Cyberstalking: Help protect yourself against cyberstalking

Cyberstalking is defined as online stalking. It involves the repeated use of the internet or other electronic means to harass, intimidate or frighten a person or group. Cyberstalkers may use email, instant messages, phone calls, and other communication modes to stalk you.

April 02, 2019·4 min read
Router security: How to setup Wi-Fi router securely

Unsecured wi-fi routers can be a liability when it comes to hackers and squatters. Some new routers come with default passwords, but you should change these during setup. Most modern routers allow users to disable WPS. For the online safety of your network and devices, it’s smart to never disable a firewall.

February 06, 2019·4 min read
2FA: Why to use it — and what are the best options?

2FA is a security measure that requires two forms of identification to access an account, adding an extra layer of security to protect your sensitive information.

August 08, 2018·2 mins
Safe online shopping tips for the holiday season

While online shopping has made our lives easier, it also exposes new weaknesses with the information we use to make those very purchases.

August 08, 2018·3 min read
How to set parental controls on every device: An absolutely ultimate guide

The internet allows children to access almost anything. To help keep your child safe, learn how to set parental controls on all popular devices and platforms.

August 08, 2018·3 min read
How to freeze your credit report after identity theft

A credit freeze allows you to restrict access to your credit report. It can help if you’ve been a victim of identity theft.

August 08, 2018·2 min read
How do firewalls prevent computer viruses?

Firewalls function as a critical line of defense against cybercriminals. Know what they protect and how they work.

August 08, 2018·4 min read
How to create a hack-proof password

Think of passwords as the keys to your digital life. Learn seven tips on how to create hack-proof passwords that will keep hackers away from your private information.

August 08, 2018·2 min read
August 08, 2018·2 min read
How to safely use public Wi-Fi hotspots while holiday shopping

If you’re on free public Wi-Fi while out holiday shopping, be sure to add a little ho-ho-ho to that Wi-Fi hotspot with these security tips.

August 08, 2018·4 min read
10 critical steps to help protect yourself online

Learn how to stay safer online with tips on updates, backups, public Wi-Fi, protecting personal information, and more.

August 08, 2018·4 min read
How to keep your personal information safe on social media

Social media runs a significant portion of people’s social lives. We use it to connect with far-flung friends and family, send quick messages to co-workers, and announce major (and minor) events in our lives. Many businesses use social media sites to collaborate or share information—for instance, you might discuss a project with co-workers via a Facebook messaging session or plan a conference on a LinkedIn forum.

August 08, 2018·3 min read
How a password manager can help secure your passwords

Password managers help you generate, protect, and keep track of strong passwords for your online accounts.

August 08, 2018·2 min read
8 elements to help you become a great digital citizen

8 Elements to Help You Become a Great Digital Citizen

August 08, 2018·3 min read
5 tips to protect yourself from online travel booking scams

Thanks to the Internet, booking travel online is simple. But as your ideas of a spring break or summer vacation take shape, remember to be cautious when making reservations online. The number of...

August 08, 2018·3 min read
From the break room to the boardroom: Creating a culture of cybersecurity in the workplace

Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies,...

August 08, 2018·2 min read
How to talk to your kids about cyberbullying

Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children...

August 08, 2018·3 min read
How to secure your information in the cloud

More people and businesses now use the cloud in some form, sometimes without even realizing they are doing so. Know how to secure your information on the cloud.

August 08, 2018·4 min read
Voter registration tips: Here’s help for voting early or by mail during the pandemic

If you’re hesitant to go to your polling place on Election Day due to the pandemic, you have options for voting.

August 08, 2018·2 min read
What to do with old computers

Take these steps to ensure your old technology has been properly wiped and recycled.

August 07, 2018·3 min read
Securing your game console and gaming account

Todays gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are...

August 07, 2018·3 min read
Remote computer access: What is it and what are the risks?

Learn how remote computer access works, the possible security risks, and how you can access other computers and networks remotely.

August 07, 2018·4 min read
The evolution of Norton™ 360: A brief timeline of cyber safety

The evolution of Norton 360 : A brief timeline of cyber security

August 07, 2018·2 min read
How to stay safe when file sharing online

File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications...

August 07, 2018·2 min read
6 tips to avoid getting a virus on your devices from the internet

How do you avoid getting a virus on your devices from the internet? Here’s our tips to help keep you protected.

August 07, 2018·3 min read
Help secure your accounts with these strong password tips

The importance of using secure, unique passwords is growing as you entrust increasing amounts of personal information to organizations and businesses that can fall victim to data breaches and password leaks. You can take the precaution of making sure you craft strong passwords for your online accounts.

August 07, 2018·4 min read
How to spot a fake Android app

If you're an Android user and you receive an unexpected SMS or a strange notification from what appears to be a familiar source, beware; criminals may be trying to rip you off. Find out how scammers try to trick you into installing a fake app.

August 07, 2018·3 min read
How to choose a secure password

Passwords are the digital keys to our networks of friends, our work colleagues, and even our banking and payment services. We want to keep our passwords private to protect our personal lives, and that includes our financial information. A good password is all that may stand between you and a cybercriminal.

January 18, 2018·4 min read

Want more?

Follow us for all the latest news, tips and updates.