Categories
Amazon DIY Family Safety Google Guides Products Security Sponsored

Chromebook Tip

1. Do you have a touchscreen Chromebook? What if you want to turn off the touchscreen occasionally and use just the keyboard and the touchpad? You can do this with a keyboard shortcut. Turn on/off the touch screen using this keyboard shortcut: SEARCH + SHIFT + T. 2. Are you a mouse person or a […]

Categories
DIY Family Safety Guides Internet Passwords Privacy Products Security Social Media Sponsored Websites

Your mother’s maiden name

The secret is out, your mother’s on social media. it used to be the secret word or answer to a security question when you called your credit card company. Now your mother shares everything online and might not know any better. As much as you yourself might have good cyber habits, those closest to you […]

Categories
Family Safety Guides Internet Mobile Devices Passwords Privacy Security Sponsored Websites

Your new 99 character password

If you were required to have a 99 character, complex password, would it bother you? Password managers provide a unique benefit of providing a different password for each account and not requiring you to remember it. LastPass is the #1 rated password manager.

Categories
Amazon Business DIY Internet Products Security Sponsored Websites

Amazon accounts for business

I’m always amazed at how many businesses run their purchasing using a personal email account with company credit cards and just share the same credentials. This usually leads to someone having to call and email around to see who bought what and for which department. Amazon actually created Business Accounts to stop this madness. Now […]

Categories
Amazon Apple Business Data Breaches DIY E-mail Family Safety Google Government Guides Internet Microsoft Mobile Devices Passwords Privacy Products Security Social Media Software SPAM & Scams Sponsored Websites

Cyber ABCs: A for Accounts

Here’s the first of 26 posts in support of Cyber Security. Every user, service, and hacker, needs an account to access systems, resources, and data. Given what we store on our personal and work devices, you would think that we would do a better job at protecting these keys to the “kingdom”. BUT, we know […]