How to Protect Yourself From ‘Brushing’ Scams

We make a lot of online purchases these days, so much so that, for some of us, packages show up at our doorsteps on a daily basis. But every once in a while, a package might not be something we actually ordered. If you open your front door to such a scene, you might be curious why someone would send …

You Should Encrypt Your Important Emails

When it comes to choosing a platform for sharing sensitive information, email usually ranks pretty low on the list. Security experts tend to recommend platforms that are end-to-end encrypted by default if you want to make sure no one else can access the information being shared. However, email can be a secure messaging platform, so long as it’s set up …

What Are Security Keys?

You’ve probably seen us highlight the importance of multi-factor authentication (MFA). MFA ensures that even after the right password is entered during the login process, a secondary authentication measure is required to gain access to your account. That way, even if a bad actor learns your password, it’s useless without access to the secondary authentication method. Usually, this authentication method …