How To’s

We Keep you Connected

How To’s

How To

Welcome to How To’s – A blog that provide readers with daily computer tutorials, technology news, software reviews, and personal computing tips.

A collection of Tech Tip features, which answer questions about technology, devices and apps in our lives.

 

  1. Inside a ransomware incident: How a single mistake left a door open for attackers Inside a ransomware incident: How a single mistake left a door open for attackers - There are many things you can do to protect yourself against cyberattacks - but if you still don't do the basics, then it's easy pickings for cyber criminals. A security vulnerability that was left unpatched for three years allowed a notorious cyber-criminal gang to breach a network and plant ransomware. The BlackCat ransomware attack against… Continue Reading
  2. Don't want your phone hacked? Just do this one thing Don’t want your phone hacked? Just do this one thing - If you follow one phone security best practice, make it this one. Every so often I have to dive back into the waters of mobile security and offer up a hard truth for users to swallow. Most often those truths are pretty easy to accept, such as never installing a piece of software unless it's… Continue Reading
  3. How to update all of your Apple devices How to update all of your Apple devices - iPhones, iPads, Apple Watch, Macs… even your Apple TV and iPod Touch.   Here's a quick, simple, and no-nonsense way to update your Apple devices. It is recommended to be on a stable Wi-Fi connection to update, and note that some updates are not available over a cellular connection. Also, make sure that devices are… Continue Reading
  4. Google ChromeOS Flex stable release breathes new life to enterprise laptops Google ChromeOS Flex stable release breathes new life to enterprise laptops - Want to bring your old PC or Mac back to life? You can revive it from the dead with Google ChromeOS Flex. I have a dusty, old Dell computer. It used to run Windows 7. I could have "upgraded" it to Windows 8.x, but that was never an "upgrade" in my book. Today, though, I… Continue Reading
  5. I'm drowning in spam! How do I make it stop? I’m drowning in spam! How do I make it stop? - Welcome to the latest installment of Ask ZDNet, where we answer the questions that make Dear Abby's eyes glaze over. In the mailbag this week: What's the best way to cut down on junk mail? If you've got a question about any of the topics ZDNet covers, one of our team of editors and contributors… Continue Reading
  6. FBI and NSA say: Stop doing these 10 things that let the hackers in FBI and NSA say: Stop doing these 10 things that let the hackers in - Enable multi-factor authentication, patch your software, and deploy a VPN, but configure them securely, the US government and allies warn. Cyber attackers regularly exploit unpatched software vulnerabilities, but they "routinely" target security misconfigurations for initial access, so the US Cybersecurity and Infrastructure Security Agency (CISA) and its peers have created a to-do list for defenders… Continue Reading
  7. The high price of free Wi-Fi: Here's why you never connect to an insecure network The high price of free Wi-Fi: Here’s why you never connect to an insecure network - If you work on the go, the last thing you should do is connect to an insecure wireless network. Jack Wallen explains. Let me set the scene for you: You're on the go and you need to stop and get a coffee. You enter the coffee shop and the aroma is the first thing to… Continue Reading
  8. Password Security in 2021 — A Complete Guide Password Security in 2021 — A Complete Guide - 92% of UK businesses experienced a cyberattack in the last 12 months (Keeper 2021 UK Cybersecurity Census) In this age of hacking and cyber-terrorism, your company's data is a target. And it doesn't take much for a hacker to break into a network and wreak havoc. The stakes are high. What do you need to… Continue Reading
  9. Preparing for Ransomware: Are Backups Enough? In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Preparing for Ransomware: Are Backups Enough? - In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Backups are a critical component of any enterprise cybersecurity posture, but they are not an airtight strategy. Like any other digital machine, backup systems are vulnerable to data… Continue Reading
  10. Password Security Best Practices in 2020 - Concerned about protecting your financial transactions and private data stored online? A strong password policy is your front line of defense against security threats, scammers and hackers. Implementing the best password security practices is as important at work as it is at home. You need to understand the severity that easy-to-guess passwords bring. Also no,… Continue Reading

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE