Two layers of defense are better than one layer of defense. This seems logic. But every now and then I end up in a discussion - mainly on Twitter - where people tell
A website is a company’s online business card. It’s a bad sight when it’s poorly designed and developed and users consequentially encounter a lot of difficulties using it. Luckily a
This is the 31st and last post in my Cyber Security Awareness Month blog series. I will do a short recap of what I covered in this series, but I also want to
Out of date or not regularly updated operating systems and applications put you at risk because they have a lot of vulnerabilities. Many of these vulnerabilities can be easily detected and exploited by
Would you tell a total stranger your password? The obvious reaction is: "Of course not!" But look at this video. Some people just straight away tell what their password is when they're asked
In today's post some quick tips to protect your portable devices, and the data they contain, from theft. I'll also tell you what you can do if your device gets stolen. Keep your
People use their smartphone, that's continuously connected to the internet, more than any other device. While it's the entry point to their entire digital life, strangely enough for most people security is not
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
In this blog I will give you some tips that can help you to do your online shopping as secure as possible. Don't let criminals get away with your hard-earned money.
Third party apps that have access to your online accounts can pose a security and privacy risk if they have excessive permissions or when they get hacked. Read here how you can control the risk.
The more online accounts you have the bigger the potential security risks. Read this blog for tips on how to delete the online accounts that you no longer need.
The more software you're running on your devices the bigger the potential security risks. Read this blog to learn more about how and why you should remove unused and unnecessary software.