Skip to content

Online Safety

Online Thieves HATE When You Use Two-Factor Authentication

Two-Factor Authentication is a Simple Step for Extra Online Account Security

It’s a fancy-sounding term few of us know, but two-factor authentication is a security feature we should all know and use. There is an online security feature knows as 2FA (for two-factor authentication) that all banks, credit cards and stores offer to their customers. Some of us don’t know it; others know about it but…

[Read More]
Cybersecurity Experts to Follow on Twitter

Top Cybersecurity Experts to follow on Twitter

Need to know the latest on viruses, malware, privacy, data breaches, IoT, threat intelligence, etc in 280 characters or less? WhatIsMyIPAddress.com is here to help! Twittersphere is full of security experts, researchers, and hobbyists who are more than eager to share their thoughts, news, and researches on information security, industry best practices and latest threats.…

[Read More]
7 Travel Safety Tips for Protecting Your Data and Identity on the Road

Travel Safety Tips for Protecting Your Phone, Laptops, and Identity

Let’s face it — traveling isn’t what it used to be. It’s not just about packing a suitcase full of clothes and a new book or magazines. Today, most of us can’t leave our homes without a laptop, tablet, camera and a smartphone or two. That’s why these travel safety tips are so important, especially…

[Read More]
Common Internet Scams

Scam Ahead! Proceed with Caution.

There’s a new twist on an old adage “let the buyer beware” for the computer age. It’s now “let the Internet browser beware.” That’s because the most likely threat to our online activity doesn’t come from a hacker (some trying to break into a computer network); it comes from a scam artist trying to trick…

[Read More]
These 4 Things Make Your Network Security 4X Stronger

4 Things To Make Your Network Security Stronger

Be the champion and wrangle a promotion out of it. Companies are in the business of making money through selling products and services. But the way companies operate today primarily revolves around having a strong online presence and having networks and servers to run day-to-day operations. Even some of the biggest companies with massive IT…

[Read More]
How to Avoid Being Hacked. Five Tips to Try Today

5 Tips to Avoid Being Hacked

#5 is simply awesome. There’s a war going on every day in cyberspace. It’s a war that puts companies and agencies trying to serve their customers against the cyber-thieves (hackers, spies, etc.) trying to get at their data. But online attacks can also come from close by: From some online thieves prowling unsecured wireless networks…

[Read More]
What to do about a stolen laptop

What to Do if You’re the Victim of a Stolen Laptop or Stolen Phone

If you find yourself reading this article for any reason other than having had your laptop stolen, do yourself a huge favor and read this article about preventative steps for keeping your laptop (and the data on it) safe from theft. It’s always good to take steps that can help you avoid stress and anxiety.…

[Read More]
5 Signs Your Computer Was Hacked!

5 Signs Your Computer Was Hacked!

Personal computer hacks have become so common that almost everyone has to deal with it at least once in their lives. And it’s not just simple pranks that amateur hackers used to pull in the early days of mainstream computer adoption. Today, cyberattacks are sophisticated, well-orchestrated, and capable of posing severe threats to the personal…

[Read More]