Man In The Middle Attacks
Man-in-the-middle (MITM) attacks happen when a bad actor intercepts traffic between two computers, like a laptop and a remote server. The person will be able ...
Are Refurbished Devices Good?
Let's be honest; there sometimes is a negative association with the term with refurbished. You may see certified refurbished devices, refurbished devices, or even open ...
Blocking Emails in Apple’s Mail App
Keeping getting annoying emails to your iPhone or iPad that your spam settings don’t catch? iOS 13 has a new Block Sender feature that automatically ...
What Are Internet Trolls?
Ever get in an argument on social media? Internet trolls are people who lurk on various social media platforms looking to upset others for their ...
Apps To Help Secure Your Phone
We heavily depend on our phones in our everyday lives. While the Android and iOS platforms are continually improving, some users want extra protection on ...
Online Security Tips
In today's post, we want to cover some security basics that our clients ignore or don't know about. Following these steps will help keep you ...