by Mike Foster | Oct 21, 2023 | AI, Best Practices, Privacy, Technology
Chatbots such as ChatGPT®, Bing®, Bard®, Perplexity®, Claude®, and more are becoming increasingly popular, but their use raises several privacy concerns. Key things You Need to Know: Data collection: Search engines, many websites, apps, and chatbots might...
by Mike Foster | Aug 25, 2023 | AI, Best Practices, Cyber Security, Cybersecurity, IT Best Practices, Technology
AI’s Growing Role in Controlling Devices: As AI starts entering more workplaces, it is crucial to recognize that AI will become more interconnected with hardware devices in your organization. You might want AI to control room lighting and air conditioning to...
by Mike Foster | Jul 27, 2023 | Best Practices, Credit Freeze, Family Cyber Safety, Identity Theft
Experts agree that one of the best things you can do to protect yourself from fraudsters is to place a credit freeze on your credit reports. Credit monitoring is important too, and it catches problems after the fact. Credit freezes help prevent fraud from happening....
by Mike Foster | Jul 22, 2023 | Airport Safety, Apple, Best Practices, Cybersecurity, Email Security, Family Cyber Safety, Mobile Security
It’s a sunny day, and you’re seated outside a popular cafe, thrilled to have a break to meet a friend. You pull out your phone, type in your passcode, and start writing them a message. Suddenly, a hand shoots out of nowhere, grabbing your phone before you...
by Mike Foster | Jul 22, 2023 | Airport Safety, Apple, Best Practices, Cybersecurity, Email Security, Family Cyber Safety, Mobile Security
Passkey technology can be highly dependent on a user’s smartphone. If an attacker gains access to a smartphone and knows the passcode, then the attacker can potentially have easy access to all the passkeys stored in the smartphone. For example, if an iPhone thief...