Skip to content

The Learning Center

Types of AI Models

Guide to Types of AI Models and How They Work

When you think of AI (Artificial Intelligence) models, you may automatically think of generative AI like OpenAI’s ChatGPT (a Generative Pre-training Transformer) and Dall-E-2 (the tech startup’s Ai image generator).  However, AI models have been used in technology and other fields since the 1950s. In some capacity, you’ve probably unwittingly used a form of AI…

[Read More]
Andrew Costis talks about adversary emulation and why businesses should do it.

Adversary Emulation for Business Cybersecurity

Security risks are constantly changing. Projects start and end, employees leave and are hired, new tools replace old tools, and configurations get adjusted. Many companies run penetration testing (pen testing) scenarios on a regular basis. But with today’s fast-paced changes, even frequent pen testing may not be able to keep up with all the new…

[Read More]
Lockdown Mode for Apple Devices

Apple Lockdown Mode: Should You Activate This Security Feature?

With the releases of macOS Ventura and iOS 16 in 2022, Apple rolled out a new feature called lockdown mode.  It’s an excellent additional layer of protection, however balancing security with usability is something Apple users are going to have to evaluate. Some people may find it works well while others are frustrated with the…

[Read More]
Amitabh Sinha talks about how to protect against ransomware in your company.

Protect Against Ransomware by Planning for Ransomware

Ransomware is a huge cybersecurity threat, and it’s only growing. It’s especially a risk for businesses, but it targets individuals too. One of the biggest dangers of ransomware is that it may end up in your organization not because of anything you did, but because a third-party software you use or a company in your…

[Read More]
Private Internet Access

PIA: Private Internet ACCESS

The Private Internet ACCESS VPN will deliver the security, performance, and online access most users want. Behind the scenes, PIA works hard to protect its infrastructure from outsiders, which protects your online experience. 

[Read More]
What is spyware? It may be watching you right now...

Everything You Need to Know about Spyware, the Malware that Stalks Your Online Activity

Spyware may sound like something James Bond or another secret agent might use in the latest spy thriller movie. But it’s very real, and it’s way more common than most people think. Part of spyware’s method is to be hard to detect, so you may not even realize your device is infected – especially if…

[Read More]
Carey Parker talks about how to protect your privacy online and why you should care in the first place.

Easy, Non-Technical Ways to Protect Your Privacy Online (And Why You Need To)

We all use technology at some point in our lives. Sometimes that technology is as simple as a web browser, search engine, or messaging app. But we often aren’t aware of what that technology is doing behind the scenes or what kind of data it’s collecting about us. It’s important to know how to protect…

[Read More]
ExpressVPN

ExpressVPN Insights: Enhancing Online Security and Privacy

ExpressVPN has long had the reputation of being one of the best, fastest, and most secure VPNs available.  Three unique things you need to know about ExpressVPN: Quick overview: There is much to love about ExpressVPN, and there is probably one thing not to like: the comparatively higher monthly cost at any subscription level. The…

[Read More]
Gmail Confidential Mode is a step towards email privacy, but it's not a perfect solution.

Gmail Confidential Mode: Useful but Imperfect for Email Privacy

Email is a tool that most of us use every day – sometimes all day. And while most people use common features like forwarding, downloading attachments, and moving emails to folders regularly, there are a lot of other features that many email users don’t know about. If you use Google’s email services Gmail, Confidential Mode…

[Read More]
Aaron Foss talks about how to stop the spam calls and protect yourself.

Stopping Spam Calls is Surprisingly Complicated (but There Are Still Things You Can Do)

Everybody knows the experience of looking at your ringing phone to see a caller ID that reads “scam likely,” or answering a call and finding a recorded voice on the other line. Robocalls are everywhere these days, and it seems like they’re only getting more frequent. If you’ve ever looked for an answer to the…

[Read More]
Spot AI-Generated Emails

Can You Spot AI-Generated Emails? Why It’s Important & How to Do It

Even though there is a lot of talk about the rapid advancements in AI technology, most people have not yet tried out these Large Language Models (LLMs) for themselves.  In 2023, after the public introduction of ChatGPT, there was a huge surge in the number of people who had used the site. Even so, the…

[Read More]
Kris Burkhardt discusses how to plan ahead for better digital security.

Improve Your Digital Security by Planning Ahead

Almost every business relies on some kind of software, whether it’s for scheduling, payments, customer information, or something else. And for individuals, we do our banking, shopping, socializing, and even work and school through and with software tools. But that can put us at risk. To improve our digital security, we need to know where…

[Read More]
Funeral home scams are the despicable new scam preying on grieving families.

This Shameful Scam Targets People Grieving Lost Loved Ones

Losing a loved one is a terrible experience in any situation. There’s often legal paperwork to take care of, a will to execute, an estate to settle, and a funeral to arrange. And that’s all on top of all the grief and pain of the loss. It’s a painful, exhausting time in your life. The…

[Read More]
Surfshark VPN Review

SurfShark

For most internet users, SurfShark VPN delivers the best levels of security, privacy, and internet access. It passes all the security testing and protects you whenever and wherever you are online with Surfshark protection running.

[Read More]
Knowing how to spot a fake website will help keep you safe from scammers' tricks.

How to Spot a Fake Website: 7 Ways to Tell if a Site is Malicious

With modern technology and services, it’s pretty easy to make a website. That’s great for those of us who need or want to create one. But that also means scammers can make websites really easily, too. And since so much of our lives – work, school, banking, shopping, and more – is done online, if…

[Read More]
Gift card scams trick you at the store, no conversation with a scammer required.

A New Variation of Gift Card Scams Tricks You At the Store

Scammers love gift cards. They’re instant, practically untraceable, and have no protections against fraudulent transactions. And it’s a lot easier to walk someone through going to a store and getting a gift card than it is to walk them through buying and sending cryptocurrency or creating a Venmo account. So it makes sense that one…

[Read More]
Exploring 5G, the advantages and security challenges

Exploring 5G: Advantages and Security Challenges

You rarely encounter an ad for a phone provider that doesn’t list 5G connectivity as an option. Most of today’s phones–even many budget-friendly options–come with 5G capabilities. Not everyone chooses to activate their 5G service, but it’s something that almost everyone shopping for a new phone will encounter.  So what is the story with 5G?…

[Read More]
Steve Lazarus talks about digital parenting and child safety.

Digital Parenting Advice to Protect Kids Online

Technology is everywhere in our world. When many schools require it for class and homework, even young children can’t escape it. But what is a parent to do? Parental control software companies claim they’re the answer, but are they right? Are there other things parents can do? Or are the dangers just being overstated? If…

[Read More]
Know how to hide your photos on your mobile phone

How to Hide Photos on Your Phone: iPhone & Android Tips

It’s smart to think about the security of the photos you store on your phone, whether that’s just on your device or on the cloud. Even if your phone is password protected and you have Multi-Factor Authentication on the app that stores your photos, it’s a great idea to spend some time thinking about how…

[Read More]
What to do when you have been doxxed

What to Do If You’ve Been Doxxed: Recovery & Protection Steps

Doxxing (named for documents, or “dox”) is a term for the public release of someone’s private information. Imagine this: Someone decides to take your private stuff – could be anything from your home address to your embarrassing holiday beach photos – and scatter it all over the internet.  That’s doxxing. It’s like someone rifling through…

[Read More]
Is It Possible to Unsend an Email?

Is It Possible to Unsend an Email?

Sending an email at the wrong time or to the wrong party (or both) can be a painful scenario.  We’ve all been there. You might have a less-than-professional message meant for your best friend, whose name is unfortunately right next to your boss’s in your address list. Or perhaps a humorous note meant for another…

[Read More]
Troubleshoot issues with your iPhone

How to Free up Space When Your iPhone Slows Down

iPhone users everywhere understand how vital phone connection and functionality can prove. For many of us, our iPhones provide the keys to our lives — our calendars, to-do lists, Internet connection, email access, photos, contacts, and more live inside of our pocket-sized smart devices, and we would be lost without them. When your iPhone slows…

[Read More]
Sim-swapping theft

Smartphone Safety: Stop Thieves From SIM-Swapping (Taking Over Your Number)

Suppose someone were to steal your phone number and you were unaware of it (which is usually the case). You’d be frightened thinking about the damage they could do, especially if you hadn’t taken any steps to minimize the potential danger.

[Read More]
Steve Lenderman talks about synthetic identity fraud and what it means for fraud fighting.

The Real Victim of Synthetic Identity Fraud is All of Us

Most of us have heard of identity theft. A criminal gets your information and uses it to access your accounts, your credit, and your money. It can be devastating to an individual. But because we know about this crime, there are processes in place to deal with it. It’s hard to recover, but not impossible.…

[Read More]