Computers, Complexity, and Coping

Posted by Brad Deflin on March 05, 2021

These are frustrating times, with much to be frustrated about. Politicians failing us at every turn, rampant fraud in government services and...

Bursting Big Tech's Bubble

Posted by Brad Deflin on February 03, 2021

Last month's blog on "Information Weaponization and Warfare" received more attention than any since we began in 2014. I couldn't be more thrilled...

Information Weaponization and Warfare

Posted by Brad Deflin on January 13, 2021

It's taken me longer than usual to write this blog - the first of 2021. The last few weeks' events have been so unsettling and surreal that...

Preventing Email Phishing and Spoofing

Posted by Total Digital Security on November 17, 2020

Prevent Loss from Phishing and Spoofing Emails Anyone using email should be aware of phishing and spoofing emails. In many cases, these fraudulent...

Digital Security Basics - Three Primary Attack Surfaces for Hackers

Posted by Total Digital Security on November 11, 2020

Digital Security Basics: Where You’re Vulnerable 

The AAA Strategy for Privacy and Digital Security

Posted by Brad Deflin on August 04, 2020

The dog days of August 2020 start fittingly enough with a hurricane named Isais, which in Spanish means "God Is My Salvation." In turn, salvation...

Recent Posts

The Best Browser for Privacy and...

Here, we look at internet browsers and make a...

Read More

T-Mobile Breach - What To Do

T-Mobile said yesterday that data from 40 million former...

Read More

Goodbye, Google

This month's CyberAdvisor covers these four main...

Read More