Online Security Part 12 – General Scams

If the wide variety of threats from malware, weak passwords, public Wifi, and mobile security weren’t enough, there are now scammers taking advantage of people by offering personalized service. For example, while ransomware was discussed in Part 2, some crooks distribute malware that includes a “tech support” number to call. Other criminals call users proactively, …

Online Security Part 10 – Is a Strong, Unique Password Enough?

Once you start down the rabbit hole of online security, it can seem endless. For example, as previously explained, strong passwords require a password manager to store them and then the password manager requires an even stronger password to keep those strong passwords secure. No less than three parts of this series of articles have …