Security Guide

Google

It’s pretty apparent that Google has the search engine side of the internet on lock, but did you know that they’ve expanded to almost every internet service?

Read More »
Security Guide

Facebook

Everybody uses Facebook, right? Read on to find out why that isn’t an excuse to use it, and why Facebook has engineered their “service” to keep you hooked.

Read More »
Security Guide

Passwords

Having the same password (or variates of the same) for everything is more convenient, as you don’t have to remember something new for every website you use. Read on to find out how to create a secure and memorable password.

Read More »
Security Guide

Search Engines

Need to know the definition of something? Look it up. Looking for the best Italian restaurant in Manhattan? Look it up. You get the picture.

Read More »
Security Guide

Internet Browsers

If you have a Windows computer, your default internet browser is Microsoft Edge. (RIP to Internet Explorer…) If you own a Mac, your default is Safari. Regardless of which camp you’re in, you’ve probably used that browser once: to download Google Chrome.

Read More »
Security Guide

Internet Tracking

Whether you know it or not, you’re being followed on the internet. Most people have a general knowledge of this, but don’t know the full extent. When you go online, you’re leaving behind more than just your internet security.

Read More »
Security Guide

Email

In this section, we’re going to learn about good alternatives to Gmail, Yahoo!, Hotmail (really?), and other data-leaching email providers. Not sure why to quit using Gmail? Check the Google section of the guide for more info.

Read More »
Security Guide

The Need for a VPN

Imagine this: You’re in a coffee shop and they have free (unsecured) WiFi. You can browse without needing a password, but so can everyone else. With the right tools, anyone could intercept your data. An easy (and cheap) way to prevent this, is the use of a VPN.

Read More »
Security Guide

Intro

This free security guide is the culmination of 2 years of intensive research into the security risks of the modern digital life.

All the advice in this guide has been personally tested and verified to be accurate.

Read More »