Most Recent Articles
Owning It: From Permission to Power — Why We Celebrate the Women’s Business Ownership Act and Keep Pushing Past Barriers Worldwide
This October marks 37 years since the Women’s Business Ownership Act, a landmark law that gave women the right to own, lead, and grow businesses on their own terms. Each year, women entrepreneurs and advocates use this month to honor that shift not jus…
How to Outsmart Today’s Sneakiest Phishing Scams
Every family deserves a scam-free life — for Cybersecurity Awareness Month and beyond.
A Family Challenge for Cybersecurity Awareness Month
Last week, we kicked off Cybersecurity Awareness Month with an important reminder of why strong, unique passw…
How to Log Someone Out of Instagram (Creators Guide)
If you’ve just searched “how to log someone out of your Instagram,” chances are you’re dealing with a messy reality: a person from your past logged in, you lost your phone, or found a suspicious login from somewhere you’ve never been. And when your Ins…
Florida X-Ray Clinic Takes a Year to Tell Patients that Hackers Stole their Medical Data
The Florida-based X-ray provider Doctors Imaging Group (DIG) has confirmed a major cyberattack that exposed sensitive personal and medical data on more than 170,000 people, nearly a year after the breach occurred.
According to a disclosure posted on t…
Germany Halts EU’s ‘Chat Control’ Push in Defense of Digital Privacy
Berlin’s firm opposition deals a decisive blow to Brussels’ plan for mass message scanning.
Germany’s stand against intrusive monitoring
Germany has formally opposed the European Union’s proposed “Chat Control” regulation, a controversial measure th…
70,000 Discord Users Had Their ID Photos Exposed – Here’s What Went Wrong
A hacker group calling itself Scattered Lapsus$ Hunters (SLH) has claimed responsibility for breaching Discord’s customer support systems. The attackers provided screenshots that allegedly showed internal support tools as proof and even threatened to r…
Overview: Configuring Mail Services In IBM MaaS360
This article is a high level overview of the common configuration components for email in IBM MaaS360. This covers both MDM and Secure Productivity Suite configs across devices and operating systems.
How Kids Try to Bypass Google Family Link on Android and How You Can Stop It (2025)
Kids often bypass Family Link parental controls on Android, but how do they do it? And what can parents do to prevent it?