Make Me Cyber Safe

When Tax Season Texts Turn Into Smishing Attacks

Introduction Tax season is stressful enough on its own. Now, some California residents face an extra headache: A wave of smartphone scams (also known as ...

Switzerland’s Surveillance Shift and What It Means for You

Introduction When people think of Switzerland, they often imagine highlights like chocolate, watches and data privacy. In fact, technology companies have ...

When “Opt Out” Doesn’t Mean Out: What Google’s $425M Lesson Means for You

Introduction In September 2025, a California jury ordered Google to pay more than $425M for collecting personal data from nearly 100M mobile users and 174M devices…even after those ...

Cybersecurity Is a Team Sport: The Role of Everyone from Interns to Executives

Introduction Do you how to spot suspicious behavior in your day-to-day work? Although we all rely on technology daily, many people still think that ...

What GLBA Means for You at Work

Introduction If you’re handling customer or financial data, even casually or just occasionally, you’re actually working under a law called the Gramm-Leach-Bliley Act (GLBA). Enacted in 1999, GLBA ...

Singapore Mandates Age Verification and Online Accountability

Introduction Singapore is becoming one of the first countries to mandate age verification at the app store level. They are also contemplating similar identification on ...

The Invisible, Human Cost of a Breach

Introduction When people think about a data breach, the first thing that usually comes to mind is how much money it costs. Companies pay fines, ...

Why Cybersecurity Matters to You

Introduction When most people hear the word cybersecurity, they might think that only IT staff has to worry about breaches, or only your boss has concerns ...

Digital Ethics: What It Means for You at Work

Introduction Every day, you make decisions that involve technology. Sometimes you do so without even realizing it. Sending a quick email with an attachment, pasting ...

Why Hackers Think You’re an Easy Target

Introduction When people imagine hackers, they often think of hoodie-wearing geniuses typing code at lightning speed. In reality, most attackers don’t need elite skills to break in. They just ...

Contact

Managed IT SolutionsManaged IT Solutions Logo $$$