Information security guide for new employees
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
89 articles
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Dave and Jeff discuss the latest with the Colonial Pipeline ransomware as well as the latest trends in ransomware overall on this week’s Kaspersky podcast.
Gut-wrenching stories of in-game cheating told by actual participants.
Evade spammers, take control of your notifications, and protect your Discord account from hijacking.
We explain why secret chats in Telegram are a must, and how to configure security and privacy.
Use these Origin settings to protect your EA account from hijacking, data theft, and spam.
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
Your online finances need proper protection. Learn how to secure your PayPal account.
A particular type of malware seeks user credentials, including accounts for gaming services such as Origin, Battle.net, and Uplay.
Learn how to protect your Twitch account, block spammers and haters, and make chat easy and secure.
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
We tell you which security and privacy settings will hold Twitter hackers and spammers at bay.
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
How to protect your Instagram account and personal photos from prying eyes.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity