Articles in Category: Security

one corgi handing a sealed envelope containing obviously secret information to another corgi

How Can I Send a Document to Someone Securely?

Sending private documents by email feels risky because it is. What’s the safest way to get sensitive information to the right person without it falling into the wrong hands?

a Corgi sitting at a desktop computer which has a human hand reaching out of its screen reaching for the keyboard.

What Can a Technician With Remote Access Do?

You thought it was tech support, but it was a scam. You gave a stranger full access to your computer. How worried should you be?

A hand tapping a contactless credit card on a modern payment terminal, with a glowing green checkmark appearing on the screen, set against a bright, clean retail background.

How to Protect Your Credit Card Information

Your credit card info can be stolen in stores or online. From tap-to-pay to virtual card numbers, I’ll walk you through the best ways to keep your credit card safe.

A Dead Phone

I Lost My Two-Factor Authentication Device. How Do I Recover?

Losing your phone can lock you out of your accounts if it’s your second factor for authentication. Here’s how I recovered while traveling, the backup options that saved me, and the steps you can take now so you’re never stuck without access.

A laptop, tablet, and smartphone arranged in a sunny, colorful flat-lay, each displaying a small golden key icon, showing passkeys working across multiple devices.

What If My Passkey Doesn’t Work or I Lose the Device It’s On?

Passkeys are supposed to make signing in easier and safer, but what happens when it stops working or your device is gone? I’ll show you what to do if your passkey fails or is lost and a technique that makes passkeys work everywhere.

an individual examining an email message with a magnifying glass

How Do I Find Who Hacked My Email Account?

Someone hacked your email and you want answers. Who did it? Where are they? Can you track them down? Here’s what you should do.

A dramatic stopwatch frozen at zero, with streams of glowing red computer code racing through the clock face. Dark background with electric blue and red lighting creates urgency and tension.

What’s a Zero-Day Attack? A Diagram of the Vulnerability Timeline

Yes, your computer can get hacked even when it’s fully updated. Zero-day attacks exploit vulnerabilities that your antivirus software doesn’t yet know exist. I’ll explain how these attacks work and what you can do to protect yourself.

a locked and secure bank vault

Why Password Managers Are [Still] Safer than the Alternatives

If you’re not using a password manager, you’re likely compromising your security more than necessary. Here’s why using one is safer.

Google & YouTube

Can I Have Different Passwords for YouTube and Gmail?

A Google account includes Gmail, YouTube, and much more. If you want to keep those services separate, you’ll need separate Google accounts.

A used car salesman with a speech bubble containing the words "Trust me!"

Don’t Fall for It: Social Engineering and How Scammers Hack Your Brain

Think you’re too smart to fall for a scam? Think again. Scammers aren’t targeting your intelligence; they’re targeting your humanity. I’ll share the sneaky mind tricks they use every day and help you spot the red flags before it’s too late.

a laptop on a desk, "sleeping"

Can You Get Hacked When Your Computer Is Sleeping?

Worried your sleeping computer might get hacked? The short answer is no, but there’s a catch. I’ll explain what that is and why you’re still probably safer than you think with basic security in place.

a computer screen showing a chat window with the title "Stalker Calling"

What Do I Do If I’m Being Harassed, Bullied, or Stalked Online?

Online harassment can happen to anyone, but what can you actually do about it? I’ll break down whether it’s illegal, how to identify who’s behind it, ways to make it stop, and the critical mistakes to avoid so you can protect yourself and your loved ones.

a computer screen with a ransomware warning

How Do I Decrypt Files Encrypted by Ransomware?

Prevention and preparation are the best solutions to ransomware.

a computer display with a hacker inside it

Has My Computer Been Hacked?

It’s easy to jump to the conclusion your computer has been hacked, but it’s usually not the case. Regardless, preventing a hack is easier than recovering from one.

a mobile phone displaying a message "Password Reset Request: Is This You?" with Yes No buttons beneath

Unexpected Authenticator Alerts: Annoying, Scary, or Harmless?

Random authenticator requests can be unsettling. Are you being hacked, or is something else going on? I’ll discuss why these alerts might happen, what they really mean, and what to do.

A split scene showing a personal laptop and phone on one side and business files on the other, connected by a dotted line, with warning icons fading into shields.

The Top Five Small Business Security Risks

Running a small business, especially from home, puts your data at risk in ways you might not expect. I’ll discuss what I see as the five biggest security threats facing small teams.

A formidable fortress stands under a clear sky, its design a blend of medieval strength and modern mystery. The large, wooden door at the fortress's entrance is secured with a robust lock, symbolizing protection and secrecy. Above this door, a sign boldly proclaims "Passwords," hinting at the digital fortification concepts within. Emblazoned on the door is a shield, an emblem of defense and security. Beside the main entrance, a small, quaint ticket kiosk offers a juxtaposition to the fortress's grandeur. This kiosk sports a sign that reads "2FA," and another says "PASS", suggesting a modern, technological gateway requirement akin to two-factor authentication. The entire scene merges the aesthetic of ancient castles with contemporary cybersecurity themes, illustrating a unique intersection of the past and present security measures.

Is it Safe to Put Two-Factor Codes in My Password Vault?

Storing 2FA codes in your password vault might slightly reduce security, but the risk is minimal compared to the convenience.

A realistic hand holding a smartphone displaying a map, with recognizable landmarks in the background..

An Unexpected Way Videos Can Expose Your Location

Something many people do every day may expose their location in ways they aren’t aware of.

An adorable kitten sitting at a computer desk, carefully examining the URL displayed in a web browser on the computer screen.

How Can I Tell If a Web Address Is Safe?

URLs are simple in concept, but can be constructed in ways that might fool you. I’ll look at some examples and discuss what’s important.

An individual sitting in front of a PC computer screen displaying the message 'Recovery Failed.' In the background, a hacker is peeking around a door, creating a sense of tension and vulnerability.

Don’t Be Scammed When Recovering an Account

Don’t let your panic open the door to scammers.

Help! Someone Is Inside My Computer, Controlling It!

When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Most of those people are wrong.

Searching for phone number

Privacy and Searching for Phone Numbers Online

You have an email address and you want the associated phone number. It’s unlikely you’ll find it, but there are a few things to try.

Three Reasons You Can’t Get Your Account Back

I hear from people who have lost their accounts permanently way too often. Here’s how to avoid being one of them.

Do I Really Need a Recovery Email?

Alternate email addresses can allow you to regain access to your account if it’s hacked or you forget your password.

A warm, colorful door with two locks and corresponding keys—one labeled “Password,” the other “2FA”—both needed to open it.

Do Complex Passwords Still Matter If You Use 2FA Everywhere?

Do you think your passwords don’t matter because you use 2FA everywhere? I’ll break down why weak passwords still put you at risk, how attackers work around 2FA, and the steps that keep your accounts safe.

A hand reaching out of a computer screen to pick up a wallet lying next to the computer's keyboard.

Scammers’ Three Common Lies

Scammers’ favorite tricks include old lies told in new ways. I’ll show you how these scams work, how to spot them before it’s too late, and the simple steps you can take to protect yourself, your money, and even your identity.

Padlocked disk

Does Whole-disk Encryption Impact Computer Performance?

Does whole-disk encryption slow your computer? You might be surprised. The bigger risk is losing access to your data if you’re not careful with your encryption keys and backups.

Virus Detected sign

Why Don’t Anti-Malware Tools Work Better?

Ever wonder why your antivirus program didn’t catch that virus? It’s not broken. Security is a race, and the bad guys are usually ahead. Learn why security tools can’t stop everything, what that means for you, and the most important step you can take to stay safe.

Password ... ?

I’ve Lost My Password Vault. What Do I Do?

Lost your password vault? You’re not locked out forever. It’s just an inconvenience. With some patience and the right steps, you can reset your accounts, rebuild your vault, and protect yourself from future mishap.

Password

How Do Websites Store Passwords Securely?

Not all websites protect your password the same way. Some do it well, others badly, and a few dangerously poorly. I’ll walk through the good, the bad, and the ugly of password storage, and share one simple step you can take to keep your accounts safe.

Downloading

Can the Owner of an Open WiFi Hotspot See What Files I’m Downloading?

Internet cafe owners can monitor the activity on open WiFi hotspots. Whether or not they take the time to do it is another story!

VPN

Are VPNs Safe for Online Banking?

Think a VPN makes online banking safer? Banking is already protected by strong encryption, but a VPN adds a twist. I’ll explain what’s really protected, what isn’t, and where the real risks lie when you bank on the go.

A computer keeps running securely while the user sleeps.

Can My Computer or Signed-In Account Be Hacked from the Internet?

Worried that staying signed in leaves you open to hackers? I’ll explain why your router, firewall, and smart habits protect you, what the real risks to your accounts are, and the simple steps you can take to stay safe online.

A laptop glowing with a big red exclamation mark on the screen, while a worried person hovers nearby, coffee cup in hand.

I Opened Something I Shouldn’t Have — Now What?

Accidentally run or opened something suspicious? We’ve all done it. I’ll walk you through the options from scans to resets, and consider what to learn from the experience.

Hard disk chained and locked.

How Do I Encrypt a Disk?

Worried about your data if your computer goes missing? Whole-disk encryption can keep prying eyes out. I’ll show you simple, practical ways to encrypt your entire drive so your information stays safe even if your computer doesn’t.

One key, multiple devices.

Is Syncing Passkeys Across Devices Safe?

Passkeys promise more security and less hassle, but is syncing them across devices safe? Learn how password managers handle passkeys and what happens if a device is stolen.

Locked Folder concept

How Do I Encrypt a Folder?

Want to keep your folders private? This article shows three ways to encrypt everything inside a folder. Each method has pros and cons, so you’ll learn which one best protects your files while balancing ease of use.

Computer screen showing a concept of a document with a padlocl.

How Do I Encrypt a File?

Want to send a file safely by email? I’ll show you how to use the simple .zip format with a strong passphrase so your private documents stay protected across Windows, Mac, or Linux platforms.

A glowing Gmail inbox filled with colorful emails fading into a digital dust cloud. A worried person sits at their desk, reaching out as the emails slip away.

7 Reasons You Could Lose Your Google Account Forever

Losing access to Gmail can mean losing years of email, contacts, and memories. Learn the most common pitfalls, from outdated recovery info to ignored warnings, and how to avoid them so you never risk losing your account.

A large, cartoon-style magnifying glass hovers over a stack of digital files in a Windows folder, with a OneDrive cloud in the corner

On Trusting and Not Trusting Microsoft

Worried Microsoft is peeking at your files in OneDrive? The truth is more complicated and perhaps surprising. I’ll look at what scanning really means, why avoiding OneDrive may not be enough, and how trust in Microsoft’s products comes down to risk, reality, and choice.

A video chat in progress.

Can Your Video Chat Be Intercepted and Recorded?

Your video chats are usually private and encrypted, but nothing is foolproof. The real risk isn’t hackers; it’s the person on the other end, who can record everything. Learn why interception is rare, where the real danger lies, and the one rule to follow if you’re unsure.

Goodbye!

How Do I Remove Myself From a Computer?

Leaving a job and worried about what’s on your work computer? From browser history to email accounts, traces of you remain. Learn what you can (and can’t) erase, and the smartest way to protect your privacy before you walk out the door.

A cockroach surviving an explosion.

Can Malware Survive If I Reset My PC?

Worried a reset won’t wipe out malware? While it’s technically possible for some infections to survive, it’s extremely rare. Learn where malware can hide, which reset options are safest, and the extra steps you can take to ensure a truly clean and secure Windows reinstall.

Windows Security

What Security Software Do You Recommend? (2025 Q3 update)

My updated guide cuts through the hype with four no-nonsense steps to keep your PC safe. Learn what works, what to avoid, and how to stay secure without overspending or overcomplicating.

two smartphones each displaying a two-factor app and code, with a floating arrow pointing from one smartphone to the other

How to Safely Change Two-factor Authentication

Changing two-factor authentication apps isn’t hard, but doing it incorrectly can lock you out of your accounts. Here’s a safe step-by-step approach to make the switch smoothly, protect your access, and keep your accounts secure.

Bitlocker Logo

How to Save or Recover Your BitLocker Recovery Key

BitLocker could be running on your PC without your knowledge. Without the recovery key, you risk losing everything. I’ll show you three ways to check, find, and save your key.

Typing on a Laptop

Are There Hidden Files that Save Every Keystroke I’ve Ever Typed?

Worried your computer is secretly saving everything you type? It’s not. While there are hidden files and places keystrokes can live temporarily, there’s no master file of your entire typing history (unless malware is involved). Learn what’s real, what’s myth, and how to truly erase your data.

somone on a crowded street having their mobile phone stolen from their pocket by a pickpocket

Prepare to Lose Your Phone

Your phone holds the keys to your digital life. If it’s lost or stolen, things can get messy fast. I’ll show you simple steps like locking, tracking, and backing up that protect your data and give you peace of mind before the worst happens.

Chalkboard on which is written "Password: password123"

Is It OK to Reuse Passwords on “Unimportant” Sites?

Reusing passwords on sites you don’t care about might feel harmless, but it still can open the door to bigger problems. I’ll look at why even “unimportant” accounts matter more than you think, the risks of cutting corners, and simple ways to stay safe.

Two factor code being displayed on a mobile device.

Two-Factor Might Be Hackable. USE IT ANYWAY!

Another scare about two-factor authentication being hackable? DO NOT let that stop you from using it.