1. Unlock your iPhone Apple designed NFC to prevent the unintentional scanning or reading of an NFC tag. Hence, NFC will not work unless your iPhone is unlocked. Try unlocking your screen before scanning an NFC tag. 2. Remove your iPhone case The case of an iPhone can sometimes act as a disruptive barrier betweenContinue reading “Fixing NFC iPhone Issues”
Category Archives: Uncategorized
Safe online shopping
What does Google know about you?
Delete those old social media posts and mitigate online reputation risks
When asked by a student how he could become President someday, President Obama said, “I want everybody here to be careful about what you post on Facebook, because in the YouTube age whatever you do, it will be pulled up again later somewhere in your life. That’s number one”. Views one had when they were 15Continue reading “Delete those old social media posts and mitigate online reputation risks”
Cyber security tips | Remove your personal information from Google
The three most popular social media sites in the world are Google, Facebook, and Twitter. People, businesses and politicians use these platforms on a daily basis. By changing your profile privacy settings on those sites, you make it difficult for search engines to find your personal information, and hence even more difficult for cybercriminals toContinue reading “Cyber security tips | Remove your personal information from Google”
Cyber security | Anatomy of an Unbreakable Password
The importance of strong passwords cannot be overstated. There are many ways to keep your passwords safe. Making exponentially difficult passwords Here are three rules to make it exponentially more difficult for cybercriminals to crack your passwords. First, the longer a password, the more difficult it is to crack. Aim for a password which isContinue reading “Cyber security | Anatomy of an Unbreakable Password”
Cyber security tips | Avoid using Public Wi-fi
In an ever growing ubiqitous digital world, we are attuned to connecting our devices to both public and private wi-fi networks. However, due to this familiarity, we tend to overlook the security of these connections. You should never use a public wi-fi network unless you are using a Virtual Private Network, also known as aContinue reading “Cyber security tips | Avoid using Public Wi-fi”
Cyber security tips | Personally Identifiable Information (PII)
Personally Identifiable Information (PII) is defined as information that can be used to confirm a person’s identity, including, name, address, phone number, date of birth, social security number, IP address, location details, and other physical or digital identifying data. Cybercriminals use PII to identify or locate individuals or to compromise online accounts. In a worldContinue reading “Cyber security tips | Personally Identifiable Information (PII)”
Cyber security | Multi-factor authentication
What is two factor or multi-factor authentication? Multi-factor authentication (MFA) uses multiple factors to confirm a person’s identity who requests access to applications, websites or other resources. Multi-factor authentication is a service that adds extra levels of protection. Without multi-factor authentication, a person would ordinarily input a username and password. However, with this authentication method,Continue reading “Cyber security | Multi-factor authentication”
Cyber Security | Phishing
What is phishing? Phishing attacks occur when a cybercriminal sends a fake message that appears to come from a trusted source. Email is the most used method of communication for this motive. The purpose is to steal sensitive information such as credit cards, login information or infect a victim’s computer with malware. Phishing is aContinue reading “Cyber Security | Phishing”