Sunday, May 17 2026

Category: Best Practices

Has AI Changed Your Proposal’s Audience?

[This piece originally appeared in our sister blog, Strategic Grantsmanship, on August 21, 2023.] The first rule of writing? “Write to your audience!” For scientific and medical grant proposals, that audience comprises our human scientist and stakeholder peers. Or does it?

Secure sensitive data with encryption

How to Protect Sensitive Files: A Guide to Passwords & Encryption

Do you work with sensitive client data? Have you signed an NDA requiring you to secure clients’ information? Here’s how to properly secure your computer and safeguard the intellectual property entrusted to you.

Using Firefox Containers to Maximize Privacy

Using one set of devices for work and personal business is a common practice among freelancers, consultants, entrepreneurs, and solopreneurs, and it puts your privacy at high risk. Here’s an easy way to safeguard your privacy.

7 Easy Steps for Working Securely from Home

Your home setup is likely far less secure than you think. Here are 7 easy steps for working securely from home.

Your Consultants & Employees Are Broadcasting Your Company Secrets Every Day

Are your contractors, consultants, and employees adequately protecting your sensitive information and intellectual property when they work from home?

How You Are (Unknowingly) Perpetuating Online Tracking with Links

If safeguarding your privacy is important to you, you are aware of tracking and avoid it whenever possible. After all, where you go on the internet, what you read, what you buy, is nobody’s business but your own. But it’s likely you have other interests as well, and you also share links about your interests

Protecting Your Home Office from Your Smart Home

Update 01 November 2020 The Threat Intelligence Report 2020 (released last week—a brief summary can be found here) reported that IoT infections on wireless networks (including home networks) is up 100% over last year. Shockingly, these devices that blend into your daily life are not just leaky boats, they are targets for ransomware. Unless you

Don't catastrophize!

Don’t Catastrophize!

The rise of cybercrime—and the realization that bad actors increasingly target small businesses—can lead freelancers and solopreneurs to feel overwhelmed and vulnerable. Some bury their head in the sand and try to ignore the threat, while others let anxiety take over. They consider worst-case scenarios to be probable instead of possible, which can be the

Upgrading Your Phone? 4 Things You Should Do First

Getting a new phone for the holidays? Before your dispose of it, give it to one of your kids, or trade it in for credit toward a new phone, the FTC suggests you do these 4 things first: Back up your data. Remove SIM and SD cards Erase your personal information. Verify that your personal

How to Securely Wipe Your Computer
1 2