CATEGORIES

Carry on Ronald Reagan's tradition of support for personal freedom and conservative values by signing up for your own Reagan.com email address. Our secure private email service will keep your information and personal communications safe.

GET A REAGAN.COM EMAIL TODAY

December 06, 2019 | EMAIL AND TECHNOLOGY
How to Spot Signs of a Phishing Email

 Phishing emails are among the simplest, yet most effective ways cybercriminals gain access to victims’ personal information. Using things like email addresses, logos, color schemes, and signatures th

READ MORE
November 25, 2019 | EMAIL AND TECHNOLOGY
5 Safety Tips for Using a Public Computer or WiFi

In today’s fast-paced, on-the-go world, many of us have had the occasion to use a public computer. Whether our internet-powered personal device is running out of battery, or we have to do work or pers

READ MORE
September 25, 2019 | EMAIL AND TECHNOLOGY
New Social Scoring System: How Will It Affect You?

Is Silicon Valley censoring conservatives? That certainly appears to be the case, as the trend toward banning Americans—from social media use to ride- or house-sharing services—is gaining more and mor

READ MORE
July 16, 2019 | EMAIL AND TECHNOLOGY
Online Retail Hacks More Prevalent Than Ever

Protect Yourself From Online Retail HacksIn recent years, online shopping has exploded — so, too, have online retail hacks. Previously, cyber criminals would tend to target merchants themselves, steal

READ MORE
June 04, 2019 | EMAIL AND TECHNOLOGY
The US Government’s Online Security History

US Government Online Security History | Reagan.com BlogThe worlds of cybersecurity and data privacy are rapidly developing, meaning laws regulating them are continuing to evolve. While there’s conside

READ MORE
May 28, 2019 | EMAIL AND TECHNOLOGY
Turning Off The Location For Android Devices

How To Turn Off Android Location TrackingAs our digital devices increasingly power all aspects of our life — from our work to our personal communications and everything in between — there’s rarely a m

READ MORE
Cyber hand simulation coming out of laptop screen May 07, 2019 | EMAIL AND TECHNOLOGY
5 Reasons Not To Use Work Email For Personal Use | Reagan.com

With the interconnected, on-the-go nature of today’s workforce, the lines between work and home life are increasingly blurred. That tendency may blend into our email — though, unless you’re using a pr

READ MORE
Person looking at computer screen with words “you have been hacked!” April 23, 2019 | EMAIL AND TECHNOLOGY
How Hackers Use Your Information in Identity Theft | Reagan.com

Nearly 17 million Americans have one thing in common: They’ve all been victims of identity theft.When hackers access personal data, they can use it in countless ways. Backed by identifying information

READ MORE
cybersecurity block text March 27, 2019 | EMAIL AND TECHNOLOGY
How A Government Shutdown Effects Cybersecurity | Reagan.com

Of all the long-lasting impacts of the recent government shutdown, cybersecurity may be the most concerning — especially as the vulnerabilities exposed during this situation are sure to emerge again,

READ MORE
Hand graphic coming out of computer screen December 26, 2018 | EMAIL AND TECHNOLOGY
Facebook Gave Access to User’s Data

It’s no secret that social media giants like Facebook have a history of improperly handling users’ data — but the extent to which the company has put its members’ Internet privacy at risk is just star

READ MORE