by Mike Foster | Jul 22, 2023 | Airport Safety, Apple, Best Practices, Cybersecurity, Email Security, Family Cyber Safety, Mobile Security
Passkey technology can be highly dependent on a user’s smartphone. If an attacker gains access to a smartphone and knows the passcode, then the attacker can potentially have easy access to all the passkeys stored in the smartphone. For example, if an iPhone thief...
by Mike Foster | Jul 21, 2023 | Email, Hacked Email, Uncategorized
How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam: If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what...
by Mike Foster | Jul 15, 2023 | ACH Fraud, AI, Cloud Security, Cybersecurity, Email Security, Family Security
AI helps bad actors be more effective than ever. They create deep fake videos, AI-generated phone calls, and other scams, some of which have led to devastating consequences. Use these tips to protect yourself from AI-generated scams: Realize Even Photos Can Give an AI...
by Mike Foster | May 15, 2023 | Cloud Security, Cybersecurity, Email Security, Family Security, Mobile Security, Password Security
Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now. Passkey authentication can be configured to be very secure based on four conditions: You must have your mobile device with you. (An attacker is unlikely to...