Can Your Anonymous Data Be Re-identified?
You supply data and are told it is being anonymized or de-identified for privacy. How effective is de-identification?
Enable automatic updates
Auto-updates have bricked phones and shut down productive work sessions, so people turn them off. Why this logic is wrong for solos & small businesses.
The Case for Password Managers
Keeping passwords digitally stored in one place seems anathema. Here’s why you should do just that.
What Is “Juice Jacking” & How to Avoid It
Last Updated on October 27, 2025 You like to travel light–no bulky wall wart for you–and besides, why search for an out-of-the-way wall outlet in public spaces when charging kiosks seem to proliferate in almost every public space. Even hotel rooms are sporting more charging docks than outlets. The challenge is that the same cable
The Growing Employer-Employee Cybersecurity Gap: What It Is and How to Bridge It
Employers face a growing disconnect with employees in terms of overall cybersecurity, creating a dangerous gap. Here’s how large that gap has grown.
