Skip to content

Team Spencer

Keystroke Logging: How to Keep Yourself Safe from a Keylogger

There’s seemingly no end to the way cybercriminals can attack you and your personal data. One type of attack that’s been used for decades and is still prevalent is keylogging. Imagine if everything you typed on your keyboard or tapped on your mobile device’s keyboard was recorded and stored somewhere and someone can read all…

[Read More]

10 of the Most Popular, Badly Behaved Apps and Why You Should Never Install Them

We learn at a young age that what’s popular isn’t always right.  In a technological world with millions of featured apps, it’s tough to know what’s safe to download. Are all popular apps well-behaved? Should we base our decision to download an app on the number of total downloads and high ratings?  The truth is, some…

[Read More]

What is Stalkerware? How to Protect Yourself from Getting Pawned by Online Prowlers

Netflix’s You has changed the face of stalkers. In it, former Gossip Girl star Penn Badgely plays Joe Goldberg, a lovable rom-com hero who just happens to also be a deranged serial-killing stalker. There are more Joe Goldbergs out there than you might think and they are taking advantage of technological advancements to take their…

[Read More]

Getting Hacked 101: Has Your Device   Been Hacked or Is Your Account Compromised?

It’s common to fear getting hacked but you may not exactly know how it will happen or what to do when it does. The whole ordeal can be insanely stressful and that anxiety can quickly escalate as you try to get your device or account back in working order. To effectively solve the issue, you…

[Read More]

What is Shadowbanning & How to Avoid It

Social media has become all about algorithms.  Whether you’re chasing followers, likes, swipes, or fame you can end up under the thumb of the algorithm. The issue is: what if the algorithm decides not to share your posts? What if people can’t find your profile, see your photos or read your posts? When something like…

[Read More]

Cyber Insurance: What Is It and Do You Need It?

Cyberattacks on individuals and companies have evolved to such an extent that good cybersecurity has become a fundamental part of daily life. Even as experts develop ways to thwart cybercriminals, hackers keep getting around their defenses. That means that all the sensitive information about you or your company is at risk of being stolen, sold,…

[Read More]

The Definitive List to Reporting Fake Social Media Accounts

In our influencer-informed culture, everyone wants more followers, friends, or contacts for their social networks.  After all, you may be networking, building a brand, or promoting your business. You might get an unexpected follow or a random friend request which is great for any budding entrepreneur, influencer, or content creator. And yet, these requests can…

[Read More]

How to set up a VPN on Xbox

A VPN can be a staple in your online security. It masks your IP address to keep your internet identity safe.  Protecting your IP address helps keep your network secure and can keep your online activities private. Can you use a VPN on all of your devices? Just about! You may want to use your…

[Read More]