June 04, 2019 | EMAIL AND TECHNOLOGY
The US Government’s Online Security History

US Government Online Security History | Reagan.com BlogThe worlds of cybersecurity and data privacy are rapidly developing, meaning laws regulating them are continuing to evolve. While there’s conside

READ MORE
May 28, 2019 | EMAIL AND TECHNOLOGY
Turning Off The Location For Android Devices

How To Turn Off Android Location TrackingAs our digital devices increasingly power all aspects of our life — from our work to our personal communications and everything in between — there’s rarely a m

READ MORE
Cyber hand simulation coming out of laptop screen May 07, 2019 | EMAIL AND TECHNOLOGY
5 Reasons Not To Use Work Email For Personal Use | Reagan.com

With the interconnected, on-the-go nature of today’s workforce, the lines between work and home life are increasingly blurred. That tendency may blend into our email — though, unless you’re using a pr

READ MORE
Person looking at computer screen with words “you have been hacked!” April 23, 2019 | EMAIL AND TECHNOLOGY
How Hackers Use Your Information in Identity Theft | Reagan.com

Nearly 17 million Americans have one thing in common: They’ve all been victims of identity theft.When hackers access personal data, they can use it in countless ways. Backed by identifying information

READ MORE
cybersecurity block text March 27, 2019 | EMAIL AND TECHNOLOGY
How A Government Shutdown Effects Cybersecurity | Reagan.com

Of all the long-lasting impacts of the recent government shutdown, cybersecurity may be the most concerning — especially as the vulnerabilities exposed during this situation are sure to emerge again,

READ MORE
Hand graphic coming out of computer screen December 26, 2018 | EMAIL AND TECHNOLOGY
Facebook Gave Access to User’s Data

It’s no secret that social media giants like Facebook have a history of improperly handling users’ data — but the extent to which the company has put its members’ Internet privacy at risk is just star

READ MORE
Computer code labeled “cyber attack” and “data breach” December 11, 2018 | EMAIL AND TECHNOLOGY
Best Practices for Elderly Cybersecurity | Reagan.com

Cybersecurity Best Practices for the ElderlyKW: Elderly CybersecurityFrom email to IP addresses and everything in between, there are so many factors involved in protecting one’s digital footprint that

READ MORE
Laptop with chain and lock around it September 21, 2018 | EMAIL AND TECHNOLOGY
Protecting Personal Information & Email Privacy

Keeping Your Personal Information Away from Big CorporationsProtecting personal information is one of the primary concerns of many Internet users, especially as scams and data breaches continue to pla

READ MORE
Computer keyboard with the word “risk” in bright orange August 29, 2018 | EMAIL AND TECHNOLOGY
Social Media Censorship | Tech Industry Crackdown

Tech Industry Crackdown After CharlottesvilleWhile the topic of social media censorship has been in the news lately, thanks to increased public attention on the privacy practices of Facebook, another

READ MORE
Person in ski mask at a computer keyboard holding a social security card August 14, 2018 | EMAIL AND TECHNOLOGY
Elderly Cybersecurity | 4 Tips for Seniors to Stay Safe Online

4 Tips for Seniors to Stay Safe OnlineStaying safe online is important for everyone, but some of us haven’t been interacting with the internet as long as others. Elderly cybersecurity should be a cruc

READ MORE
1 2 3 Next