Friday, April 10 2026

Category: Best Practices

De-identified data is easily re-identified.

Can Your Anonymous Data Be Re-identified?

You supply data and are told it is being anonymized or de-identified for privacy. How effective is de-identification?

Enable automatic updates

Auto-updates have bricked phones and shut down productive work sessions, so people turn them off. Why this logic is wrong for solos & small businesses.

Cybersecurity for your small business does not need to be technical!

The Case for Password Managers

Keeping passwords digitally stored in one place seems anathema. Here’s why you should do just that.

Bridge the cybersecurity disconnect with your employees to avoid a data breach

The Growing Employer-Employee Cybersecurity Gap: What It Is and How to Bridge It

Employers face a growing disconnect with employees in terms of overall cybersecurity, creating a dangerous gap. Here’s how large that gap has grown.

That Ad Blocker You Installed? #Malware.

This week, Threatpost reported Google removed two ad blocking browser extensions from the Chrome Web Store, AdBlock and uBlock. These two malicious browser extensions use names similar to legitimate ad blockers (AdBlock by getadblock, uBlock.org’s uBlock, and Raymond Hill’s uBlock Origin), but they employ the fraudulent practice of “cookie stuffing.” That is, they change the

Yesterday, I went to the gym. And, as I have many times before, I looked down at the elliptical machine’s screen and reminded myself to delete the gym app account I no longer use (because it works great for the cardio machines, but is not so great at tracking weight work). But, unlike so many

Wi-fi routers can be a hassle to install if IT isn’t your thing. And for most small business owners, focusing on what is your thing is how you build your business. Time spent tinkering your wi-fi is not the ticket to success. But it’s important to remember that offering your customers and clients security for

Many freelancers and other consultants work from home and work on a wi-fi network scaled up from their home system. Once the wi-fi modem/router is installed, they forget about it as long as it is working. Wi-fi routers need to be maintained, like any other part of your network. They run on software, and, like

Cybersecurity starts with understanding what hackers already know about you

Have You Been Pwned? Probably Yes, So Here’s What You Do

What do hackers know about you (and your small business)? Here’s how to find out what they know and protect yourself (and your business) moving forward.

1 2