Privacy

135 articles

How to send an anonymous email
Learn how to send an anonymous email with a VPN, through Tor, or using one of our other proven methods.
Updated: November 12, 2024 ·7 min read
What are cookies? How they work and when to accept them
What are internet cookies? Learn about different cookie types and what they’re used for in our guide.
Updated: November 05, 2024 ·9 min read
How are votes counted—Security in modern elections
Discover how votes are counted in elections and the cybersecurity measures in place to protect the electoral process from digital threats.
Published: October 24, 2024 ·5 min read
What is a VPN tunnel and how does it work?
A VPN tunnel is the encrypted connection between your device and a server. Learn how to make your VPN tunnel more secure.
Updated: September 30, 2024 ·7 min read
What is TCP/IP and how does it work?
TCP/IP is a suite of protocols that enables communication between systems and devices across networks. Learn how it works.
Published: September 30, 2024 ·5 min read
What can someone do with your IP address?
Learn what someone can do with your IP address plus how to protect your IP from cybercriminals.
Published: September 30, 2024 ·7 min read
Is Temu safe? Checking out this popular shopping app
Is Temu legit? Some say yes, but there are some things you should know before you download the app.
Published: September 30, 2024 ·5 min read
Public Wi-Fi: A guide to the risks and how to stay safe
Public Wi-Fi is used every day. But is it safe? To learn more about public Wi-Fi, its risks, and how you can safely use it, read this comprehensive guide.
Updated: September 16, 2024 ·10 min read
VPN kill switch: What is it and how does it work?
A VPN kill switch protects in-transit data when your VPN connection unexpectedly stops working—here’s how.
Updated: August 14, 2024 ·7 min read
The ultimate VPN checklist—8 essentials your VPN should have
Not all VPNs are equal. Our checklist helps you find a VPN plan that meets all your online privacy needs and more.
Published: July 30, 2024 ·5 min
What are the best dark web search engines?
Learn about 9 of the most popular dark web search engines and find out how you can more safely and securely browse the dark web with the tips in our guide.
Published: July 26, 2024 ·9 min read
What is private browsing? How to use it on any browser
Learn what private browsing is and how to use it on popular browsers to keep your online activity hidden from others.
Updated: June 28, 2024 ·9 min read
What is cloud security? Benefits & best practices
Cloud security refers to the guidelines to protect data and applications stored in the cloud. Learn more about cloud security and best practices.
Updated: June 26, 2024 ·12 min read
How to tell if your phone is tapped and what to do if it is
Unsure how to tell if your phone is tapped? Learn how to check if your phone is tapped, tracked, or monitored.
Updated: June 25, 2024 ·13 min read
What is an IP address?
An IP address lets your device connect to the internet. Learn how to find yours and how to hide it from others who might be snooping around.
Updated: June 23, 2024 ·8 min read
What is a digital footprint? Definition & examples
Your digital footprint refers to the traces of your online activity. Learn examples of digital footprints and how to protect yours.
Updated: June 14, 2024 ·9 min read
How to Stop Robocalls in 7 Steps
Tired of getting unsolicited calls or automated voice messages? Learn how to stop robocalls and prevent them from happening in the future.
Updated: June 04, 2024 ·8 min read
Are VPNs legal? A global guide for 2024
Are VPNs legal? The answer may vary around the world. Follow this global guide to learn more about the legality of VPNs in 2024.
Updated: May 31, 2024 ·7 min read
What is MD5 hash + how does it work?
The MD5 hashing algorithm is a cryptographic protocol used to authenticate messages. Learn about MD5 hash and how it works.
Published: May 21, 2024 ·7 min read
How to delete your X (formerly Twitter) account
Need to delete your X (formerly Twitter) account? Our guide offers step-by-step instructions for both mobile and desktop users.
Published: May 15, 2024 ·5 min read
VPN protocols: 7 types and comparisons
VPN protocols govern how data is transmitted between a device and a VPN server. Learn about the types and how they work.
Published: May 13, 2024 ·8 min read
What is incognito mode and how do you use it?
Use incognito mode to make your browsing experience more private and help stop your device from storing data.
Updated: April 16, 2024 ·8 min read
What is a VPN and what does it do?
A VPN is an app or service that creates an encrypted connection to protect your online activity. Learn what VPNs are and how they work.
Updated: April 09, 2024 ·8 min read
What is identity management? A guide for users
Identity management helps keep unauthorized users out of your files, accounts, and more. Learn how.
Published: April 03, 2024 ·6 min read
What is an SSL VPN and how does it work?
SSL VPNs are a user-friendly way to enable a secure remote internet connection—decide if they’re a good fit for you.
Updated: March 26, 2024 ·9 min read
7 craziest places people have found hidden cameras
Have you ever felt like someone is watching you? Here are some of the craziest places people have found hidden cameras.
Published: March 19, 2024 ·3 min read
Think your location is private? This ‘Love is Blind’ star may have thought so too
Discover the unexpected ways your tech gadgets, like the smartwatch on 'Love is Blind,' can reveal your secrets—even when you think you've covered your tracks.
Published: February 28, 2024 ·5 min
13 benefits of a VPN you might not know about
There are many benefits of using a VPN, including hiding your private browsing history, avoiding data throttling, and dodging censorship.
Updated: February 26, 2024 ·9 min read
2FA: A simplified guide to two-factor authentication
Two-factor authentication (2FA) is a form of multi-factor authentication that requires two factors to verify and log into an account.
Updated: February 10, 2024 ·8 min read
What your favorite red-carpet look says about your cybersecurity habits
What if red-carpet threads could say something about one’s cybersecurity practices? What would your favorite look be and what would it say about your cyber habits?
Published: February 08, 2024 ·5 min read
Is ChatGPT safe? A cybersecurity guide for 2024
How safe is ChatGPT? Learn important security risks and tips for staying safer as you explore the ChatGPT app and what it can do.
Published: December 22, 2023 ·10 min
What is secure messaging? (+ 12 safe apps for 2024)
Secure messaging apps can keep your conversation data safe from hackers by encrypting files, media, and chats—learn more about the best encrypted platforms.
Published: November 08, 2023 ·12 min read
Are password managers secure?
Password managers offer encrypted solutions for creating and storing strong passwords that help keep your data more secure.
Published: October 19, 2023 ·4 min
Doxxing: What it is and how to prevent it
Doxxing is the act of maliciously publishing someone’s private information and it can have harmful effects on the target—learn how to prevent it.
Published: October 19, 2023 ·8 min
What are data brokers? Tips to keep your data safe
Follow this guide to learn more about data brokers, how they collect their data, what they collect, what they do with it, and how you can keep your data safe.
Published: October 19, 2023 ·9 min
Your email address is worth more than you think
Even if your email service is free, it’s likely someone else is making money off of it. Here’s how having a private email address can help.
Published: October 18, 2023 ·3 min
What is a VPN concentrator and how does it work
A VPN concentrator lets remote workers securely connect to their company’s network. Learn what a VPN concentrator is and its pros and cons.
Published: October 06, 2023 ·8 min
How much info is your web browser giving away about you?
Do you ever get the feeling your web browser is watching you? It is…in a way.
Published: September 21, 2023 ·4 minutes
Is TikTok safe? 3 TikTok scams to be aware of in 2024
TikTok is safe on the surface, but this popular app has its fair share of security risks. Learn how you can stay safe while using ByteDance's flagship app.
Published: September 04, 2023 ·7 min read
Privacy vs. security: What’s the difference?
Privacy relates to any rights you have to control your personal information. Security refers to how your personal information is protected. Some people regard privacy and security as pretty much the same thing, but they aren’t the same, and knowing how they differ may help you to protect yourself in an increasingly connected world.
Published: September 01, 2023 ·2 min read
What is secure DNS + How to enable it?
Learn what secure DNS is and how to enable it on popular browsers and on Windows, Mac, Android, and iOS.
Published: August 22, 2023 ·8 min
What are tracking cookies and how do they work?
Follow this guide to learn how tracking cookies work, what information they store, and how you can keep your information and browsing activity private.
Published: August 14, 2023 ·5 min read
What is a chatbot? Explanation, uses, and security tips
What is a chatbot? Simply put, chatbots are software that can imitate human conversations. Learn about chatbots and their latent security concerns.
Published: August 08, 2023 ·3 min read
What is encryption? How it works + types of encryption
Encryption converts sensitive information or data into a secret code to prevent unauthorized access. Learn how to protect your personal data with encryption.
Published: July 18, 2023 ·3 min read
What is a firewall? Firewalls explained and why you need one
Firewalls help filter and block potential hackers from accessing your data. There are many types of firewalls that use different strategies to keep data secure.
Published: July 12, 2023 ·5 min
23 cloud security risks, threats, and best practices to follow
Cloud security risks include data breaches, insufficient access management, malware infections, and more. Learn how to better protect your data in the cloud.
Published: July 11, 2023 ·7 min read
This scavenger hunt for secure airport wifi will keep your family safe and entertained
Join the fun while learning about airport wifi safety with our digital scavenger hunt.
Published: June 30, 2023 ·3 min
139 password statistics to help you stay safe in 2024
From email to online banking, most of us use passwords daily. Use these password statistics to help inform strong password security and keep you safe.
Published: June 27, 2023 ·5 min
19 types of identity theft to know and avoid in 2024 + statistics
In life, your identity is everything. Follow this guide to learn more about the types of identity theft, warning signs, and how to protect yourself in 2024.
Published: June 20, 2023 ·5 min
How to access your PC if you forgot your Windows password
Here’s help for accessing your PC if you forgot your Windows password, including how to create a password reset disk for a local account in Windows.
Published: June 14, 2023 ·2 min read
How to tell if someone hacked your router: 10 warning signs
Follow this guide to learn how to tell if someone hacked your router. We also cover how to fix a hacked router and protection tips to help keep your network safe.
Published: June 14, 2023 ·5 min read
Should you accept cookies? 5 times you definitely shouldn’t
Learn why websites want you to accept cookies, whether you have to and should accept them, and what happens if you decline.
Published: June 13, 2023 ·4 min read
What is incognito mode? + How to go incognito
Incognito mode can help add privacy to your internet session. But what is incognito mode exactly? Read along to learn more about what it is and how to use it.
Published: December 20, 2022 ·4 min read
How to improve your Wi-Fi signal at home
You may notice your Wi-Fi signal dropping off or grinding to a halt every now and then. Get tips on how to improve your Wi-Fi signal at home from Norton.
Published: October 06, 2022 ·3 min read
Tor vs. VPN: What's the difference + which is safest?
For those wary of nosy websites or hackers, many people use Tor and VPNs for protection. To learn more about each tool, follow this Tor vs. VPN breakdown.
Published: September 06, 2022 ·4 min read
4 ways to recover deleted internet history data easily
Recovering deleted internet history can be straightforward. Here’s help recovering your deleted internet history data.
Published: September 01, 2022 ·4 min read
How to unlock a blocked Facebook account
If your Facebook account is blocked, it could be because of repeated attempts to log in or your account has been hacked. Learn how to unlock your account here.
Published: September 01, 2022 ·3 min read
How to perform a social media cleanup: A 9-step cybersecurity guide
Believe it or not, cybercriminals can learn a lot from your social media profiles. Follow this 9-step social media cleanup guide to protect your information online
Published: September 01, 2022 ·4 min read
What is a pharming attack? An overview + prevention tips
Don’t let a pharming attack threaten your cybersecurity. Continue to learn the basics of pharming scams as well as tips to help keep devices protected.
Published: August 29, 2022 ·4 min read
Q&A: Is It safe to sign in with Google or Facebook?
Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.
Published: August 25, 2022 ·4 min read
What is blockchain security? An overview
Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.
Published: June 24, 2022 ·4 min read
Cryptocurrency security guide + 9 crypto protection tips
Follow these cryptocurrency security measures to help protect your crypto investments.
Published: May 26, 2022 ·4 min read
Email security: A definition + email protection tips
Use this email security guide to learn about the importance of email protection, how to make your email more secure, and how to help yourself avoid common email security threats.
Published: May 20, 2022 ·4 min read
Participating in legitimate surveys: What personal data is OK to give away?
Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing...
Published: May 01, 2022 ·2 min read
TikTok and your privacy: What you need to know
TikTok privacy concerns revolve around the information it gathers about users, how that information might be used, and who might have access to it.
Published: April 01, 2022 ·4 min read
What is a no-log VPN?
VPNs with no logs protect your privacy by not keeping logs of where you go or what you do online.
Published: February 14, 2022 ·2 min read
Tips for protecting your social media privacy
Social media sites have become digital billboards. Cybercriminals could take an interest in your personal information and what you post. Get tips on how to protect your social media privacy.
Published: February 09, 2022 ·4 min read
How to make Facebook private: 9 ways to boost your privacy on Facebook
Here's help in how to make Facebook private. You can boost your privacy on Facebook with some simple steps. Here are our suggestions for sharing a bit less on your Facebook timeline.
Published: January 31, 2022 ·4 min read
Personal cybersecurity resolutions for 2022: A month-to-month guide
Elevate your personal cybersecurity this year with this month-to-month guide on how to adopt cybersecurity best practices over time, plus pointers for how to help prevent a cyberattack.
Published: January 23, 2022 ·4 min read
What is data security? An overview + 10 data protection strategies
What is data security? Consider this your go-to guide for all things data security, including data security risks and data protection tips to look out for.
Published: December 17, 2021 ·4 min read
Password security: How to create strong passwords in 5 steps
Password security could be your saving grace against dangerous hackers. Follow this guide to level up your password safety today.
Published: December 08, 2021 ·4 min read
Q&A: Should I let a merchant email my receipt or should I be suspicious?
Email receipts have several pros, but you may worry about your privacy when handing over your email address at the checkout. Get advice here.
Published: September 17, 2021 ·3 min read
Blockchain security: How safe blockchain really is
How safe is blockchain technology? Here, we overview the term, plus blockchain security threats and best practices to avoid them.
Published: July 26, 2021 ·4 min read
Internet tracking: How and why we’re followed online
Consider this your ultimate guide to internet tracking, how, why, and where we’re tracked online, plus tips to cover your digital tracks.
Published: June 28, 2021 ·3 min
Are health apps harmful to your privacy? 6 tips to help protect your sensitive information
Health apps can gather a lot of personal information. How to assess the privacy risk, get rid of apps you don't need, and help safeguard your data while staying healthy.
Published: June 10, 2021 ·4 min read
Should you delete cookies? 6 reasons you probably should clear cookies
Deciding whether to accept or clear these cookies may depend on the kinds of cookies in question. Here are some reasons to delete, and a few to keep.
Published: May 24, 2021 ·2 min read
What is doxing?
Doxing could expose your real identity when you hope to remain anonymous. Be careful what you share online.
Published: May 21, 2021 ·4 min read
What does an IP address tell you and how it can put you at risk
What does an IP address tell you? Your geolocation mainly. Learn more about what is an IP address, how to look it up, and why you might want to protect it.
Published: April 23, 2021 ·4 min read
Third-party cookies: What are they and how do they work?
Cookies are small files that websites send to your browser. They then track and monitor the sites you visit and your browsing activity on these pages. Learn more.
Published: April 23, 2021 ·4 min read
Flowers or new device for Mother’s Day? Both can be risky
When you give mom a new device, she could become a target for cybercriminals or snoops. Here are tips to help protect against that.
Published: April 14, 2021 ·2 min read
The privacy paradox: How much privacy are we willing to give up online?
A definition of the privacy paradox, stats suggesting it became a bigger problem during the COVID-19 pandemic, and tips to protect our internet privacy on everyday platforms.
Published: April 14, 2021 ·5 min read
What is identity management and why does it matter? — plus 7 tips
Identity management involves protecting your personal information tied to your online activities. Here’s how to make it work for you.
Published: April 07, 2021 ·2 min read
How to protect your privacy online
Online privacy is important. Take these steps to protect your financial and personal information.
Published: March 21, 2021 ·2 min read
Sensitive data exposure: What is it and how it’s different from a data breach
Your personal information can be exposed in different ways. Sensitive data exposure is one way. A data breach is another.
Published: January 27, 2021 ·4 min read
7 risky behaviors you should stop right now
Here are seven risky online habits to put away today, along with tips on better ones that can help you stay safer when you connect. | NortonLifeLock
Published: January 23, 2021 ·4 min read
Internet privacy: A guide to online privacy
Take steps to boost your privacy online. Here’s what to do and why it’s important.
Published: January 18, 2021 ·3 min read
How data brokers find and sell your personal info
Data brokers gather and sell information about you. Here’s how to gain some control over your data.
Published: January 17, 2021 ·4 min read
How to clear cookies in Chrome, Firefox, Safari, and other browsers
This article provides current step-by-step instructions on how to clear cookies from the latest versions of five popular web browsers. If you prefer to protect your privacy when it comes to cookies, you may want to delete them. Cookies record your personally identifiable information so they can help auto-fill forms on browsers.
Published: July 24, 2020 ·3 min read
What is a data breach?
Data breaches are security incidents where information is accessed, stolen, and used by a cybercriminal without authorization. Data breaches impact individuals and organizations every day. Learn how a data breach occurs and how to protect your personal information.
Published: March 10, 2020 ·3 min read
Is the dark web illegal?
The dark web is where people can buy illegal drugs and firearms. It also dotted with sites that specialize in illicit pornography, including child porn. Many of the sites are illegal, but there are exceptions to this rule. You can find forums, blogs, and social media sites that cover topics such as politics and sports.
Published: October 15, 2019 ·4 min read
What is a security breach?
A security breach occurs when an intruder gains unauthorized access to an organization’s protected systems and data. Cybercriminals can also exploit software bugs or upload encryption software onto a network to initiate ransomware attacks. If a cybercriminal steals confidential information, a data breach may follow
Published: September 05, 2019 ·4 min read
Do loyalty cards compromise your security?
There has been a lot of recent concern around loyalty cards and privacy. Cybercriminals have found ways to illegally acquire these rewards points and use them, either for themselves or in the underground economy.
Published: August 08, 2019 ·3 min read
Is private browsing really private? Short answer: No
So-called private browsers are a standard feature of several web browsers. They have private-sounding names like Private Browsing, Private Tab, and Private Window, but maintaining total privacy isn't one of them. it's important to understand what a private browser does, and does not, do.
Published: June 03, 2019 ·4 min read
How secure is a VPN? What makes a safe VPN?
VPNs protect your public internet connection by encrypting your information and shielding your online activity from cybercriminals and even your own Internet Service Provider, or ISP. The most secure VPNs are likely transparent about their privacy policies, take steps to fix leaks, and won’t keep logs of your browsing history.
Published: April 01, 2019 ·2 min read
What is a digital footprint? And how to help protect it from prying eyes
Your digital footprint includes all traces of your online activity. This includes your IP address, your login details, and other personal information. Information that is posted about you also gets added to your data trail. It could show up when someone searches for your name online. Your online identity can influence different aspects of your life.
Published: October 15, 2018 ·4 min read
How to live more securely in a connected world: If You Connect It, Protect It
National Cybersecurity Awareness Month — also known as NCSAM — has online security advice for you in October.
Published: October 08, 2018 ·4 min read
Straight talk about cyberstalking
Technology opens our lives up in ways that weren't possible even less than a decade ago.
Published: August 08, 2018 ·2 min read
Is your phone easy pickings for identity thieves?
All about the low-tech and high-tech methods that identity thieves use to exploit the vulnerabilities to access the data on your cell phone.
Published: August 08, 2018 ·3 min read
Here's the reason why people cover their webcam
Can cybercriminals spy on you through your webcam? Here’s why you should cover it up.
Published: August 08, 2018 ·4 min read
Cyber safety for women
An unfortunate number of women are becoming victims of cyber crimes....
Published: August 08, 2018 ·3 min read
The Norton with LifeLock Story
The new Norton with LifeLock helps protect your entire digital life: PCs/Macs, mobile devices, privacy, identity, family and smart home network
Published: August 08, 2018 ·2 min read
VPN tests: How to check if your VPN is working properly
A VPN leak can make you IP address visible to others. Learn how to test whether your VPN has a leak.
Published: August 08, 2018 ·4 min read
Is your DNA info safe from data breaches, and what are the privacy concerns?
Is your DNA info safe from data breaches? Probably not, but privacy concerns may be more important
Published: August 08, 2018 ·3 min read
Can the elections get hacked?
The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how...
Published: August 08, 2018 ·3 min read
Credit monitoring services and other anti-fraud protection
Identity theft is the most common complaint lodged with the Federal Trade Commission,...
Published: August 08, 2018 ·2 min read
How ridesharing services can take your privacy for a ride
Ridesharing services require riders' information such as real-time location data and a form of payment. This could pose risks to riders' privacy.
Published: August 08, 2018 ·3 min read
Penny pinching and convenience are more important to Australians than protecting their personal data online
According to Norton Australia’s Project 360 Data Report, while 93 per cent of Australians agree that online privacy is important to them, only one in four (28 per cent) uses a VPN (Virtual Private Network).
Published: August 08, 2018 ·4 min read
Video chats with your doctor in the COVID-19 era: How safe is your medical info?
Video conferencing with healthcare providers can be helpful in the COVID-19 era. Learn how to help keep your medical information private.
Published: August 08, 2018 ·2 min read
9 ways to help keep your personal data safe during vacation
Vacations can be an exciting, happy time for people to get away and avoid the everyday worries of home. But fun can come to a halt if your personal data is compromised while traveling.
Published: August 08, 2018 ·2 min read
6 tips to maintain your privacy while searching for jobs online
Looking for employment today is dramatically different from how it was just two decades ago. Its rare to just walk into a business, fill out an application, and get hired within the same day; todays...
Published: August 08, 2018 ·3 min read
25 Mac security tips and settings
Your new Mac computer or iOS update means it’s a good time to think about security and privacy. Here’s how.
Published: August 08, 2018 ·4 min read
Do I need a VPN at home?
Are you tempted to invest in a VPN service provider for home internet access? You could, but learn whether it’s a wise financial move for you.
Published: August 08, 2018 ·3 min read
How a VPN can help you now that net neutrality is dead
With the end of net neutrality, ISPs can now block, throttle or put data in slow and fast lanes. Find out how a VPN can help you navigate these changes.
Published: August 08, 2018 ·2 min read
How to let go of your old tech securely and responsibly
According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a..
Published: August 08, 2018 ·3 min read
What are some of the laws regarding Internet and data security?
Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act arguably being the foundation for...
Published: August 08, 2018 ·3 min read
Are free VPNs safe? 7 things to know before using free VPNs
You might be tempted to sign up for a free VPN service. But are free VPNs safe to use? Learn more.
Published: August 08, 2018 ·2 min read
Why clean computing matters
When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs.
Published: August 08, 2018 ·2 min read
Cyber Safety gift guide 2019: 5 great device-security and online-privacy gifts
If you’re concerned about online security and privacy, here are some gift ideas that can help keep you safer.
Published: August 08, 2018 ·2 min read
Does the Do Not Call Registry work?
Don’t expect the Do Not Call Registry to shield you from every unwanted call. Here’s why.
Published: August 08, 2018 ·3 min read
Does a VPN use data? Short answer? Yes
Using a VPN will count against the data limits on your smartphones or tablets. But VPNs offer many benefits.
Published: August 08, 2018 ·4 min read
Why antivirus may not be enough
The threat landscape is evolving. Protecting your identity and your data should also evolve.
Published: August 08, 2018 ·2 min read
DDoS attacks: What are they and how can you prevent them?
DDoS attacks are on the rise, but following smart online safety guidelines can greatly reduce your risk.
Published: August 08, 2018 ·3 min read
How to hide your IP address – a look at 3 options
Here’s how to increase privacy when you go online. Find out the best ways to conceal you IP address.
Published: August 08, 2018 ·2 min read
What personal information should you safeguard?
Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect...
Published: August 08, 2018 ·3 min read
Is hotel Wi-Fi safe? Staying secure on public Wi-Fi
Learn how-to tips for using public Wi-Fi safely at the Wi-Fi network at your airport, cafe Wi-Fi networks, and hotel Wi-Fi networks.
Published: August 07, 2018 ·3 min read
Cloud Security: How Secure is Cloud Data?
The positives of storing data and files in the cloud are many, but you may have questions about security. Find answers here.
Published: August 07, 2018 ·3 min read
Proxy vs. VPN: 4 differences you should know
A proxy server and virtual private network can both help protect your online privacy — but there are big differences. Learn more.
Published: August 07, 2018 ·4 min read
Why your online privacy matters
We all have things to hide. It could be how much money we make, our medical records or bank account numbers. Here are twelve tips to help you protect your privacy online.
Published: August 07, 2018 ·3 min read
Setting up a VPN on your router
Connecting to the internet through a VPN provides greater privacy and anonymity. Learn how to set up a VPN on your router at home.
Published: August 07, 2018 ·4 min read
Cyber safety guide: Tips to Own IT. Secure IT. Protect IT.
Learn how your actions can impact online privacy and device security. Here’s help during National Cyber Safety Awareness Month and beyond.
Published: August 07, 2018 ·4 min
What does a VPN hide?
A virtual private network (VPN) can hide a user's internal protocol address (IP address) and block their location and browser history. This allows them to share and receive information on public internet networks more privately. Even if you use a private browsing mode, your IP address can still be collected. A VPN can offer increased security by helping hide your online identity and encrypt your traffic.
Published: August 07, 2018 ·2 min read
What is a privacy breach?
What is a privacy breach?
Published: August 07, 2018 ·3 min read
The ultimate guide to online dating
Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love.
Published: August 07, 2018 ·4 min read
What are some of the laws regarding internet and data security?
Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act (link is external) arguably being the foundation for it all. The Privacy Act passed to establish control over the collection, maintenance, use, and dissemination of personal information by agencies in the executive branch of the U.S. government.
Published: January 18, 2018 ·3 min read
Is personal data really gone when it is deleted?
Ever wonder what happens when you drag old emails into the trash or delete personal records to free up space on a hard drive? You might be surprised to learn that your data may not really be gone.
Published: January 17, 2018 ·4 min read

Want more?

Follow us for all the latest news, tips and updates.