MakeUseOf

Elliot Nesbo-Staff Writer for Security

Elliot Nesbo

Staff Writer for Security

  • 161
    articles

About Elliot Nesbo

Elliot has been a freelance tech writer for four years. He primarily writes about fintech and cybersecurity. He is highly knowledgeable about I.T. and online threats. His work includes articles about how to protect networks and personal computers against hackers.

Latest Articles

solar panel power
What Is a Tesla Powerwall and How Much Do They Cost?

If you're looking to reduce your energy costs, Tesla's Powerwall is an excellent option.

auctioneer's hammer gavel
Is DealDash a Scam or Can You Get Legit Bargains?

You might have seen DealDash's too-good-to-be-true ads. But is it a scam? If not, how does DealDash actually make money? Let's find out.

cogs interacting against a purple screen
What Is Data Exfiltration? How Can You Stop It Happening to You?

It doesn't matter if your system carries lots of data or a small amount of it: you need to protect it from many threats, including hacks and phishing.

open padlock with key beside it
Passwords vs. Passkeys: What Are the Differences?

We all use passwords for online accounts, but could they soon become a thing of the past? If so, what are passkeys, their natural successor?

an illustration that looks like an arc reactor
Intrusion Detection Systems vs. Intrusion Prevention Systems: Which Is Best for You?

There are differences between an IDS and an IPS, so which is better for you? And how do they work?

login details stolen by phishing hook on laptop
What Is a Phishing Simulation?

Many people fall for social engineering tactics like phishing emails. How can you protect against them? A simulation could be perfect for you.

honey comb bees computer systems
What Are Honeytokens? How to Spot Cybercriminals Stealing Data

How can you detect hackers accessing your systems? Honeytokens could be the answer. Here's what you need to know.

electricity energy illustration
What Is Qi2 Wireless Charging and How Is It Better Than Qi?

Qi wireless charging has allowed us to charge Android phones wirelessly. We're now getting Qi2, but what makes it different?

security shield illustration
What Is Security Automation and How Can You Implement It?

Here’s everything you need to know about security automation.

spy protection illustration
What Is Industrial Espionage and How Can You Protect Your Private Data?

No business wants its private information falling into the hands of a competitor. How could that potentially happen and how can you stop it?

looking online via different devices
What Are Enterprise Browsers and How Do They Increase Your Security?

Though still considered new, enterprise browsers offer increased security for businesses. Here's everything you need to know.

cybersecurity on laptop screen with passwords
This Password Hack Means Your Employer Needs to Patch Microsoft Outlook Today

Even typical email security won't protect you from this clever vulnerability in Outlook. Fortunately, you're not helpless.

laptop acer information
How Many Watts Does a Laptop Use and How Much Does It Cost to Run?

Just how much power is your laptop drawing per day, and how much is it costing you?

OneNote logo inside Sony Android Phone
How Hackers Are Using OneNote Files to Spread Malware

Do you download OneNote files as attachments? Most people trust such files. But they could download malware onto your device.

online shopping payment
Is Mercari Legit? How to Tell if a Mercari Seller Is Genuine

Mercari is a popular choice to buy second-hand items, but is it safe? We look at if Mercari's legit and how to tell if sellers are genuine.

cybersecurity padlocked data
What Is Security as a Service?

Security as a Service is a model that means you don't require your own security experts; that's one of many reasons to consider SECaaS providers.

computer office illustration
8 Reasons You Need a Full Desk Pad

Desk pads are more than just glorified mouse pads. Here's why you need one for your computer table.

encryption security privacy
Physical Drive Encryption vs. Software Drive Encryption: What's the Difference?

How should you protect your personal information?

a padlock in front of binary on a notepad
What Is a Security Operations Center?

Worried about your business falling prey to a cyberattacker? You might need a SOC. So what does a SOC do?

bike lane information
What Is Micromobility? 5 Ways It's Changing Transport

Micromobility provides an attractive alternative to driving a car and has many benefits for you and the world.

1 2 3 4 5
Page 1 / 9