pixel
Q: Can My Company Read My Email?

Q: Can My Company Read My Email?

Q: If the attorney at my office reads (Outlook) emails, where is he reading them from, an archive? Will he have access to sent email if both parties permanently delete it right away? A: The issue is a bit deeper than may initially appear. Assuming this is company...

read more
Q: Which OS Will make My Laptop Last Longer

Q: Which OS Will make My Laptop Last Longer

Q: WHICH OS WILL MAKE MY LAPTOP LAST LONGER? A: I hope you will forgive that I am side-stepping your question, as I think it is the wrong question. Computers are tools. The purpose of a tool is to extend or expand your reach, power, speed, capabilities, so that you...

read more
Q: How to collaborate securely using iPhone or Android

Q: How to collaborate securely using iPhone or Android

Q: HOW TO COLLABORATE SECURELY USING IPHONE OR ANDROID The easy answer is to use Google Drive with Google Docs (doc, sheet, etc.) Google maintains encryption in transit and at rest, and multiple users can work on the same document at the same time. Original...

read more
Credit Karma To Launch Free ID Monitoring

Credit Karma To Launch Free ID Monitoring

CREDIT KARMA TO LAUNCH FREE ID MONITORING Reuters announced on 20170915 (https://www.reuters.com/article/us-equifax-cyber-creditkarma/credit-karma-to-launch-free-id-monitoring-following-equifax-hack-idUSKCN1BQ2CJ) that in light of the Equifax fiasco, they are...

read more
One More Reason Why You MUST Have Android Anti-Virus

One More Reason Why You MUST Have Android Anti-Virus

ONE MORE REASON WHY YOU MUST HAVE ANDROID ANTI-VIRUS As reported by Check Point 20170914 <https://blog.checkpoint.com/2017/09/14/expensivewall-dangerous-packed-malware-google-play-will-hit-wallet/>, they have recently discovered at least 50 apps on Google Play...

read more
Block Web Trackers With Ghostery

Block Web Trackers With Ghostery

BLOCK WEB TRACKERS WITH GHOSTERY One of the more malevolent issues with cyber security and privacy is web tracking. There are thousands of businesses whose only job is to monitor everything that you do on the web. With this massive dossier on almost everyone who...

read more
TPP Is All About Making Your STEM Course Its Best

TPP Is All About Making Your STEM Course Its Best

TPP Is All About Making Your STEM Course Its Best Cybersecurity is everyone's business. And nobody is going to be able to ensure your data, identity, and credit security more than you. This is why the Practical Paranoia Security Essentials (PPSE) courses and workbooks...

read more
Q: How can I know everything about computer security?

Q: How can I know everything about computer security?

Q: How can I know everything about computer security? A: The first step to wisdom is recognizing one doesn’t know much of anything. In the case of Technology, new information is generated geometrically faster than a human can absorb it - even if that is their...

read more
Q: Can the retails shops or any store retrieve our email ID’s with the help of credit card details (I never gave my email address but they send me invoices/receipts to my email address)?

Q: Can the retails shops or any store retrieve our email ID’s with the help of credit card details (I never gave my email address but they send me invoices/receipts to my email address)?

Q: Can the retails shops or any store retrieve our email ID's with the help of credit card details (I never gave my email address but they send me invoices/receipts to my email address)? A: Of course! Not that the stores themselves can directly make the connection...

read more