NON-TECHNICAL ARTICLES


During tax season taxpayers have an invisible target on their back.  Criminals are constantly seeking ways to hit this moving
Writing down your email password “Unbreakable-in-year04” on paper and taping it to the underside of your keyboard is not a
As more people log onto the Internet and make holiday purchases no one is thinking they will become a victim
Stack of old, broken and obsolete laptop computer
The price of computers are dropping every year due to advancements in technology. This has enabled more households to upgrade
Secure smartphone
Cybercriminals are swiftly turning to targeting mobile devices as the number of mobile device users continues to rapidly increase.  This
Illustration with word cloud on cyberbullying.
    What is cyberbullying? Cyberbullying: Bullying that takes place over any electronic device we use. Its intent is to
Malware, or “malicious software,” is a catch all term for software code designed to access or damage a computer, computer
A phishing email may appear as a legitimate message, requesting you to confirm personal information for some stated reason.  Or
1.    Use good password management Having too many passwords to manage can become taxing on your mental capacity. Which