Decoding Password Security: Six Key Password Tips for 2021

Password Security, depicted by this featured image where a Post-It note lays atop a laptop keyboard with the inscription "My Password". Underneath it reads "123456"

Ever have that nagging thought – How secure are my passwords? 🙄🤔

Well guess what? Today we’ll show you how simple it is to create strong passwords. You’ll also learn how to store them safely until you need them!

y using these six important tips, your data will be much less enticing for hackers, and you will become a password pro!

So, is your password secure? Let’s go find out!

4 Easy Steps To Safer Browsing

"4 Easy Steps to Safer Browsing" -- the cover photo depicting a view of the earth at night from space, with its surface illuminated by manmade light and its cities aglow like the nodes of a neural network.

This article takes a fresh approach to traditional glob of print you have come to expect from a blog. Today, you will learn four keys to Internet safety from a web story–an appealingly interactive format recently popularized by Google. Check it out!

Computer Security

Learn the difference between active and passive security and discover ways to protect your computer in any environment. Whether you travel constantly with a laptop in your backpack or relax in your den with a gaming desktop, I will explain the details in simple terms so you can worry less.

Modem & Router Setup

Modem & router hardware setup, as depicted by an RJ45 plug on the end of a length of Cat5e Ethernet cable.

The process of configuring a wireless network for your home or office likely confuses most of us. With this guide in hand, however, you can simplify the task and ensure that your network is both functional and secure.

From The Wall Out

From the Wall Out--The sleek, black body of the Nighthawk R7000 dual-band router is dwarfed by its 3 angled antennae towering in the rear. It represents the key component in a wireless network. Like all hardware on the network, the router poses a significant security risk if not configured correctly.

This article is the first in a featured series detailing how to improve network security — from the wall out. Learn how this applies from the point where the Internet enters your home or office to the moment you access it via a connected device.