Audit Your Trusted Device Lists for Greater Security

One of the ways companies protect critical account information is by remembering the devices you use to log in as “trusted devices” or “authorized devices.” Those logins will usually have been protected by two-factor authentication or another mechanism that guarantees...

In Your Face App Guarantees That You Notice Appointment Alerts

It’s easy to get caught up in what you’re doing and miss an alert for a Zoom meeting or a reminder to leave for an appointment. The Mac app In Your Face ensures that will never happen again by taking over the entire screen for notifications and requiring that you...

Want to Password-Protect a PDF? Follow These Best Practices

We periodically field questions about password-protecting a PDF to prevent the wrong people from reading it. Lawyers want to ensure that drafts of legal documents don’t fall into the wrong hands, financial advisers want to keep confidential financial information...

What Should You Do about an Authentication Code You DIDN’T Request?

We strongly encourage using two-factor authentication (2FA) or two-step verification (2SV) with online accounts whenever possible. The details vary slightly, but with either one, after you enter your password, you must enter an authentication code to complete the...

Legitimately Worried That You’re Being Targeted Online? Try Lockdown Mode

Most people fall into one of two extremes when it comes to device security. Many believe they’re not interesting enough to be targeted by online attackers and thus don’t take sensible precautions, like making sure every website account is protected with a strong,...
Skip to content