Summary of WordPress Security Practices
I found this article on the Imunify360 blog well worth the time.
I found this article on the Imunify360 blog well worth the time.
I always tell users to be very certain of any attachments, not only checking who they’re from, but being certain that the person in question intentionally sent them. This e-card greeting spam (Washington Post article) should remind you of another thing: Links in an e-mail don’t necessarily go where the text says they go. Be…
Equifax, while dealing with a data breach, has managed to send people to a fake site. This is one of the problems with both big business and government. They’re big, they have us by the short and curlies, and they therefore don’t have enough incentive to caution and diligent efforts. If I, as a small…
Top 3 Myths about Hackers on Facebook from thatsnonsense.com provides some good information, though in my experience trying to explain to people the difference between being hacked and having installed rogue software is usually futile. All they know is their computer is doing something they didn’t plan, and they want it to stop. It’s difficult…
Your pride in your child may represent a security, safety, and privacy issue.
Over the last few months I have begun using WordPress as a content management system (CMS) on a number of sites for my publishing venture, Energion Publications. The reason for this is simple. It’s a good idea from the marketing perspective to have a site to promote each book, but these book sites are small…
How to beat ransomware: prevent, don’t react, from MalwarebytesLabs. The one thing I would add to this article is further emphasis on backup. I can’t emphasize it enough. No matter how attentive you are, you cannot absolutely be certain that you won’t get hit by ransomware. You can be careful, but most people use their…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)