Tuesday, April 21 2026

Month: October 2019

De-identified data is easily re-identified.

Can Your Anonymous Data Be Re-identified?

You supply data and are told it is being anonymized or de-identified for privacy. How effective is de-identification?

Enable automatic updates

Auto-updates have bricked phones and shut down productive work sessions, so people turn them off. Why this logic is wrong for solos & small businesses.

Cybersecurity for your small business does not need to be technical!

The Case for Password Managers

Keeping passwords digitally stored in one place seems anathema. Here’s why you should do just that.

What Is “Juice Jacking” & How to Avoid It

Last Updated on October 27, 2025 You like to travel light–no bulky wall wart for you–and besides, why search for an out-of-the-way wall outlet in public spaces when charging kiosks seem to proliferate in almost every public space. Even hotel rooms are sporting more charging docks than outlets. The challenge is that the same cable

Bridge the cybersecurity disconnect with your employees to avoid a data breach

The Growing Employer-Employee Cybersecurity Gap: What It Is and How to Bridge It

Employers face a growing disconnect with employees in terms of overall cybersecurity, creating a dangerous gap. Here’s how large that gap has grown.