119 articles

Privacy vs. security: What’s the difference?

Privacy relates to any rights you have to control your personal information. Security refers to how your personal information is protected. Some people regard privacy and security as pretty much the same thing, but they aren’t the same, and knowing how they differ may help you to protect yourself in an increasingly connected world.

September 01, 2023·2 min read
What is encryption? How it works + types of encryption

What is encryption?


Encryption converts sensitive information or data into a secret code to prevent unauthorized access. 

July 17, 2023·3 min read
What is cloud security? An overview + best practices

What is cloud security?


Cloud security refers to the safety guidelines, technology, and best practices used to protect sensitive data and applications stored in the cloud.

July 13, 2023·4 min read
What is a firewall? Firewalls explained and why you need one

What is a firewall?


A firewall is a security device that can help protect your internet network by filtering unknown traffic and blocking outsiders from gaining access to your private data.

July 12, 2023·5 min
23 cloud security risks, threats, and best practices to follow

Cloud security risks include data breaches, insufficient access management, malware infections, and more. Learn how to better protect your data in the cloud.

July 11, 2023·7 min read
This scavenger hunt for secure airport wifi will keep your family safe and entertained

When you’re on the road, make a game out of the wifi networks and vulnerabilities that are in the air all around you.

June 30, 2023·3 min
139 password statistics to help you stay safe in 2023

From email to online banking, most of us use passwords daily. Use these password statistics to help inform strong password security and keep you safe.

June 26, 2023·5 min
19 types of identity theft to know and avoid in 2023 + statistics

What is identity theft?


Identity theft is when someone steals your personally identifying information, such as your name, address, date of birth, or credit card numbers, without your knowledge or consent to commit fraud or other illegal activities.

June 20, 2023·5 min
Should you accept cookies? 5 times you definitely shouldn’t

Learn why websites want you to accept cookies, whether you have to and should accept them, and what happens if you decline.

June 13, 2023·4 min read
What is incognito mode? + How to go incognito

Incognito mode can help add privacy to your internet session. But what is incognito mode exactly? Read along to learn more about what it is and how to use it

December 20, 2022·5 min read
What is incognito mode? + How to go incognito

Incognito mode is private browsing that doesn’t leave as many tracks. It can erase temporary data that is captured by the PC or device you’re using. Deleting cookies is a great first step toward maintaining your privacy.

December 20, 2022·4 min read
How to improve your Wi-Fi signal at home

You may notice your Wi-Fi signal dropping off or grinding to a halt every now and then. Get tips on how to improve your Wi-Fi signal at home from Norton.

October 06, 2022·3 min read
Public Wi-Fi: An ultimate guide on the risks + how to stay safe

Public Wi-Fi is used every day. But is it safe? To learn more about public Wi-Fi, its risks, and how you can safely use it, read this comprehensive guide.

September 15, 2022·4 min read
Tor vs. VPN: What's the difference + which is safest?

For those wary of nosy websites or hackers, many people use Tor and VPNs for protection. To learn more about each tool, follow this Tor vs. VPN breakdown.

September 06, 2022·4 min read
How to perform a social media cleanup: A 9-step cybersecurity guide

Believe it or not, cybercriminals can learn a lot from your social media profiles. Follow this 9-step social media cleanup guide to protect your information online

September 01, 2022·4 min read
4 ways to recover deleted internet history data easily

Recovering deleted internet history can be straightforward. Here’s help recovering your deleted internet history data.

August 31, 2022·4 min read
How to unlock a blocked Facebook account

Recovering deleted internet history can be straightforward. Here’s help recovering your deleted internet history data.

August 31, 2022·3 min read
What is a pharming attack? An overview + prevention tips

Don’t let a pharming attack threaten your cybersecurity. Continue to learn the basics of pharming scams as well as tips to help keep devices protected.

August 29, 2022·4 min read
Q&A: Is It safe to sign in with Google or Facebook?

Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.

August 25, 2022·4 min read
Computer cookies: A definition + how cookies work in 2023

Understanding computer cookies is a must to properly manage your data. Continue for an in-depth guide overviewing cookies and how they affect your data.

August 02, 2022·4 min read
What is blockchain security? An overview

Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.

June 24, 2022·4 min read
What is 2FA? A simplified guide to two-factor authentication

What is 2FA? Two-factor authentication is a multi-step process used to verify an identity during a login attempt. Read on to learn more.

June 15, 2022·4 min read
Cryptocurrency security guide + 9 crypto protection tips

Follow these cryptocurrency security measures to help protect your crypto investments.

May 26, 2022·4 min read
Email security: A definition + email protection tips

Use this email security guide to learn about the importance of email protection, how to make your email more secure, and how to help yourself avoid common email security threats.

May 20, 2022·4 min read
Participating in legitimate surveys: What personal data is OK to give away?

Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing...

April 30, 2022·2 min read
TikTok and your privacy: What you need to know

TikTok privacy concerns revolve around the information it gathers about users, how that information might be used, and who might have access to it.

April 01, 2022·4 min read
What is private browsing? How to use it on any browser

Major web browsers offer private browsing or incognito modes. But what does “private” really mean? Find out here.

February 27, 2022·3 min read
What is a VPN?

A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. Learn more from Norton.

February 23, 2022·3 min read
What is a no-log VPN?

VPNs with no logs protect your privacy by not keeping logs of where you go or what you do online.

February 13, 2022·2 min read
Tips for protecting your social media privacy

Social networking sites such as Facebook, Twitter, Instagram, and Snapchat have become digital billboards for internet users. People love sharing their personal views and news about what’s going on in their lives.

February 08, 2022·4 min read
How to make Facebook private: 9 ways to boost your privacy on Facebook

Here's help in how to make Facebook private. You can boost your privacy on Facebook with some simple steps. Here are our suggestions for sharing a bit less on your Facebook timeline.

January 31, 2022·4 min read
Personal cybersecurity resolutions for 2022: A month-to-month guide

Elevate your personal cybersecurity this year with this month-to-month guide on how to adopt cybersecurity best practices over time, plus pointers for how to help prevent a cyberattack.

January 23, 2022·4 min read
What is data security? An overview + 10 data protection strategies

What is data security? Consider this your go-to guide for all things data security, including data security risks and data protection tips to look out for.

December 17, 2021·4 min read
Password security: How to create strong passwords in 5 steps

Getting cyber smart starts with cyber hygiene. Here are tips and strategies to help keep you and your family Cyber Safe.

December 08, 2021·4 min read
Q&A: Should I let a merchant email my receipt or should I be suspicious?

Getting cyber smart starts with cyber hygiene. Here are tips and strategies to help keep you and your family Cyber Safe.

September 17, 2021·3 min read
Blockchain security: How safe blockchain really is

How safe is blockchain technology? Here, we overview the term, plus blockchain security threats and best practices to avoid them.

July 26, 2021·4 min read
Internet tracking: How and why we’re followed online

Internet tracking is how websites study our behaviour when we visit them.

June 28, 2021·3 min
VPN kill switch: What is it and how does it work?

Here’s a look at what a VPN kill switch is, how it works, types of VPN kill switches, causes of VPN disconnections, and how a VPN kill switch can help protect you.

June 16, 2021·4 min read
Are health apps harmful to your privacy? 6 tips to help protect your sensitive information

Health apps can gather a lot of personal information. How to assess the privacy risk, get rid of apps you don't need, and help safeguard your data while staying healthy.

June 10, 2021·4 min read
Should you delete cookies? 6 reasons you probably should clear cookies

Deciding whether to accept or clear these cookies may depend on the kinds of cookies in question. Here are some reasons to delete, and a few to keep.

May 24, 2021·2 min read
What is doxing?

Doxing could expose your real identity when you hope to remain anonymous. Be careful what you share online.

May 21, 2021·4 min read
Third-party cookies: What are they and how do they work?

Cookies are small files that websites send to your browser. They then track and monitor the sites you visit and your browsing activity on these pages. Learn more.

April 23, 2021·4 min read
What does an IP address tell you and how it can put you at risk

What does an IP address tell you? Your geolocation mainly. Learn more about what is an IP address, how to look it up, and why you might want to protect it.

April 23, 2021·4 min read
The privacy paradox: How much privacy are we willing to give up online?

A definition of the privacy paradox, stats suggesting it became a bigger problem during the COVID-19 pandemic, and tips to protect our internet privacy on everyday platforms.

April 14, 2021·5 min read
Flowers or new device for Mother’s Day? Both can be risky

When you give mom a new device, she could become a target for cybercriminals or snoops. Here are tips to help protect against that.

April 14, 2021·2 min read
What is identity management and why does it matter? — plus 7 tips

Identity management involves protecting your personal information tied to your online activities. Here’s how to make it work for you.

April 07, 2021·2 min read
How to protect your privacy online

Online privacy is important. Take these steps to protect your financial and personal information.

March 20, 2021·2 min read
Sensitive data exposure: What is it and how it’s different from a data breach

Your personal information can be exposed in different ways. Sensitive data exposure is one way. A data breach is another.

January 26, 2021·4 min read
7 risky behaviors you should stop right now

Here are seven risky online habits to put away today, along with tips on better ones that can help you stay safer when you connect. | NortonLifeLock

January 23, 2021·4 min read
Internet privacy: A guide to online privacy

Take steps to boost your privacy online. Here’s what to do and why it’s important.

January 18, 2021·3 min read
How data brokers find and sell your personal info

Data brokers gather and sell information about you. Here’s how to gain some control over your data.

January 17, 2021·4 min read
10 benefits of a VPN you might not know about

A VPN can help you achieve more online privacy by masking your browsing activity from eavesdroppers, your ISP, and others. VPNs encrypt your connection to provide more security when you’re on public Wi-Fi networks in places like coffee shops and airports.

August 03, 2020·3 min read
How to clear cookies in Chrome, Firefox, Safari, and other browsers

This article provides current step-by-step instructions on how to clear cookies from the latest versions of five popular web browsers. If you prefer to protect your privacy when it comes to cookies, you may want to delete them. Cookies record your personally identifiable information so they can help auto-fill forms on browsers.

July 24, 2020·3 min read
What is a data breach?

Data breaches are security incidents where information is accessed, stolen, and used by a cybercriminal without authorization. Data breaches impact individuals and organizations every day. Learn how a data breach occurs and how to protect your personal information.

March 10, 2020·3 min read
VPN tunnel: What is it and how does it work?

A VPN tunnel — short for virtual private network tunnel — can provide a way to cloak some of your online activities. Learn more.

January 28, 2020·2 min read
Is the dark web illegal?

The dark web is where people can buy illegal drugs and firearms. It's also dotted with sites that specialize in illicit pornography, including child porn. Many of the sites are illegal, but there are exceptions to this rule. You can find forums, blogs, and social media sites that cover topics such as politics and sports.

October 15, 2019·4 min read
What is a security breach?

Think of a security breach as a break-in. If someone smashes a window and climbs into your home, that’s a security breach. If the intruder snatches your documents and personal information and climbs back out the window, that’s a data breach — but more on that later.

September 05, 2019·4 min read
Do loyalty cards compromise your security?

There has been a lot of recent concern around loyalty cards and privacy. Cybercriminals have found ways to illegally acquire these rewards points and use them, either for themselves or in the underground economy.

August 08, 2019·3 min read
Is private browsing really private? Short answer: No

It’s important to understand what a private browser does, and does not, do.

June 02, 2019·4 min read
Are VPNs legal or illegal?

Some VPNs encrypt your connection to the internet, disguise your IP address, and prevent others, like the government or internet service providers (ISPs), from tracking your virtual whereabouts. There are plenty of legitimate reasons to want this degree of privacy, but you should understand what’s considered legal and illegal while using a VPN.

April 23, 2019·3 min read
How secure is a VPN? What makes a safe VPN?

VPNs protect your public internet connection by encrypting your information and shielding your online activity from cybercriminals and even your own Internet Service Provider, or ISP. The most secure VPNs are likely transparent about their privacy policies, take steps to fix leaks, and won’t keep logs of your browsing history.

April 01, 2019·2 min read
What is a digital footprint? And how to help protect it from prying eyes

Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases.

October 15, 2018·4 min read
How to live more securely in a connected world: If You Connect It, Protect It

National Cybersecurity Awareness Month — also known as NCSAM — has online security advice for you in October.

October 08, 2018·4 min read
Straight talk about cyberstalking

Technology opens our lives up in ways that weren't possible even less than a decade ago.

August 08, 2018·2 min read
Online Christmas shopping: Naughty or nice?

Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others.

August 08, 2018·2 min read
The Norton with LifeLock Story

The new Norton with LifeLock helps protect your entire digital life: PCs/Macs, mobile devices, privacy, identity, family and smart home network

August 08, 2018·2 min read
VPN tests: How to check if your VPN is working properly

A VPN leak can make you IP address visible to others. Learn how to test whether your VPN has a leak.

August 08, 2018·4 min read
How ridesharing services can take your privacy for a ride

Ridesharing services require riders' information such as real-time location data and a form of payment. This could pose risks to riders' privacy.

August 08, 2018·3 min read
Penny pinching and convenience are more important to Australians than protecting their personal data online

According to Norton Australia’s Project 360 Data Report, while 93 per cent of Australians agree that online privacy is important to them, only one in four (28 per cent) uses a VPN (Virtual Private Network).

August 08, 2018·4 min read
Video chats with your doctor in the COVID-19 era: How safe is your medical info?

Video conferencing with healthcare providers can be helpful in the COVID-19 era. Learn how to help keep your medical information private.

August 08, 2018·2 min read
VPN For Windows

Help keep your browsing activity private by using a VPN on your Windows PC. Learn what a VPN is and how it helps to keep your information safe and private, especially when using public Wi-Fi.

August 08, 2018·2 min read
What are some of the laws regarding Internet and data security?

Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act arguably being the foundation for...

August 08, 2018·3 min read
Why clean computing matters

When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs.

August 08, 2018·2 min read
Why antivirus may not be enough

The threat landscape is evolving. Protecting your identity and your data should also evolve.

August 08, 2018·2 min read
Cyber safety guide: Tips to Own IT. Secure IT. Protect IT.

If you’re looking for a strategy to help you stay safe and secure online, try this: Own IT. Secure IT. Protect IT.

August 08, 2018·4 min
DDoS attacks: What are they and how can you prevent them?

DDoS attacks are on the rise, but following smart online safety guidelines can greatly reduce your risk.

August 08, 2018·3 min read
What personal information should you safeguard?

Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect...

August 08, 2018·3 min read
Is your phone easy pickings for identity thieves?

All about the low-tech and high-tech methods that identity thieves use to exploit the vulnerabilities to access the data on your cell phone.

August 08, 2018·3 min read
Cyber safety for women

An unfortunate number of women are becoming victims of cyber crimes....

August 08, 2018·3 min read
Is your DNA info safe from data breaches, and what are the privacy concerns?

Is your DNA info safe from data breaches? Probably not, but privacy concerns may be more important

August 08, 2018·3 min read
Can the elections get hacked?

The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how...

August 08, 2018·3 min read
Credit monitoring services and other anti-fraud protection

Identity theft is the most common complaint lodged with the Federal Trade Commission,...

August 08, 2018·2 min read
9 ways to help keep your personal data safe during vacation

Vacations can be an exciting, happy time for people to get away and avoid the everyday worries of home. But fun can come to a halt if your personal data is compromised while traveling.

August 08, 2018·2 min read
6 tips to maintain your privacy while searching for jobs online

Looking for employment today is dramatically different from how it was just two decades ago. Its rare to just walk into a business, fill out an application, and get hired within the same day; todays...

August 08, 2018·3 min read
COVID-19, Apple-Google project, and your privacy: What you need to know

Apple and Google are developing a system to help track and contain the spread of coronavirus. Here's how it works and the privacy issues.

August 08, 2018·4 min read
How a VPN can help you now that net neutrality is dead

With the end of net neutrality, ISPs can now block, throttle or put data in slow and fast lanes. Find out how a VPN can help you navigate these changes.

August 08, 2018·2 min read
How to let go of your old tech securely and responsibly

According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a..

August 08, 2018·3 min read
Cyber Safety gift guide 2019: 5 great device-security and online-privacy gifts

If you’re concerned about online security and privacy, here are some gift ideas that can help keep you safer.

August 08, 2018·2 min read
Does the Do Not Call Registry work?

Don’t expect the Do Not Call Registry to shield you from every unwanted call. Here’s why.

August 08, 2018·3 min read
How to hide your IP address – a look at 3 options

Here’s how to increase privacy when you go online. Find out the best ways to conceal you IP address.

August 08, 2018·2 min read
The ultimate guide to online dating

Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love.

August 07, 2018·4 min read
Is hotel Wi-Fi safe? Staying secure on public Wi-Fi

Learn how-to tips for using public Wi-Fi safely at the Wi-Fi network at your airport, cafe Wi-Fi networks, and hotel Wi-Fi networks.

August 07, 2018·3 min read
Here's the reason why people cover their webcam

Can cybercriminals spy on you through your webcam? Here’s why you should cover it up.

August 07, 2018·4 min read
Are password managers secure?

Password managers offer encrypted solutions for creating and storing strong passwords that help keep your data more secure.

August 07, 2018·3 min read
VPN for Mac

Help protect your browsing activity while using your Mac computer with a VPN. Learn how a VPN provides privacy while you browse and helps keep your information safe when using public Wi-Fi.

August 07, 2018·4 min read
Proxy vs. VPN: 4 differences you should know

A proxy server and virtual private network can both help protect your online privacy — but there are big differences. Learn more.

August 07, 2018·4 min read
Why your online privacy matters

We all have things to hide. It could be how much money we make, our medical records or bank account numbers. Here are twelve tips to help you protect your privacy online.

August 07, 2018·3 min read
Setting up a VPN on your router

Connecting to the internet through a VPN provides greater privacy and anonymity. Learn how to set up a VPN on your router at home.

August 07, 2018·4 min read
What is a privacy breach?

What is a privacy breach?

August 07, 2018·3 min read
Cloud Security: How Secure is Cloud Data?

The positives of storing data and files in the cloud are many, but you may have questions about security. Find answers here.

August 07, 2018·3 min read
How to stop robocalls: 15 tips

Robocalls number in the billions. Here are 15 tips to help stop — or at least slow down —the barrage of unwanted calls.

August 07, 2018·4 min read
25 Mac security tips and settings

Your new Mac computer or iOS update means it’s a good time to think about security and privacy. Here’s how.

August 07, 2018·4 min read
Do I need a VPN at home?

Are you tempted to invest in a VPN service provider for home internet access? You could, but learn whether it’s a wise financial move for you.

August 07, 2018·3 min read
Are free VPNs safe? 7 things to know before using free VPNs

You might be tempted to sign up for a free VPN service. But are free VPNs safe to use? Learn more.

August 07, 2018·2 min read
Does a VPN use data? Short answer? Yes

Using a VPN will count against the data limits on your smartphones or tablets. But VPNs offer many benefits.

August 07, 2018·4 min read
What does a VPN hide?

A virtual private network (VPN) can hide a user's internal protocol address (IP address) and block their location and browser history. This allows them to share and receive information on public internet networks more privately. Even if you use a private browsing mode, your IP address can still be collected. A VPN can offer increased security by helping hide your online identity and encrypt your traffic.

August 07, 2018·2 min read
What are some of the laws regarding internet and data security?

Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act (link is external) arguably being the foundation for it all. The Privacy Act passed to establish control over the collection, maintenance, use, and dissemination of personal information by agencies in the executive branch of the U.S. government.

January 18, 2018·3 min read
Is personal data really gone when it is deleted?

Ever wonder what happens when you drag old emails into the trash or delete personal records to free up space on a hard drive? You might be surprised to learn that your data may not really be gone.

January 17, 2018·4 min read

Want more?

Follow us for all the latest news, tips and updates.