About Shannon Flynn
Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.
Is HIPAA Privacy a Federal Law?
Learn what the HIPAA Privacy Rule actually covers and how state regulations can impact it.
How Does an NDA Protect Your Data?
What's the definition of an NDA? What's the difference between an NDA and a confidentiality agreement? Here's what you need to know.
Bluejacking: How Bluetooth Can Be Used to Hack Your Devices
Cybercriminals can target you through Bluetooth-enabled devices, from your earphones to fitness trackers, and even your Tesla. Here's how.
What Are Anonymized Resumes and Blind CVs? How to Create Them
An anonymous resume/blind CV can help remove bias from the hiring process. Find out what they are and how to create one.
Why You Need to Delete Your Period App
Does your period-tracking app keep your data private? And if not, what are the most secure period-tracking services you should try?
Port Scanning Strategies and How to Close Vulnerable Ports
Learn to close all the vulnerable ports before hackers use port scanning to find network entry points.
Why You Should Keep Your Health Records Safe
With all these health and telemedicine apps available today, it's of utmost importance to protect your health records.
Why Students Are at Risk of Data Breaches (and How to Protect Them)
Educational institutions hold a lot of important data about students, and so they're a big, yet underestimated, target for hackers.
What Is Digital Asset Security? What Are the Risks Associated With It?
Your digital assets are just as important as your physical assets. But are they as secure as you want them to be?
Is Your Health Information Safe on Mental Health Apps?
Did you know that doctor-patient confidentiality doesn't apply to mental health app data? Learn how safe your health information is.
How to Protect Your Resume Information From Scammers
Your resume (or CV) holds a lot of sensitive data about you; so don't be so quick to hand it all over. You could be giving it to scammers.
How NFTs Will Work on Instagram
NFTs are rolling out to Instagram. But how exactly will they be implemented on the platform?
What Is the Facebook Protect System and How Do You Activate It?
If you want to keep your Facebook account secure, you might be able to try out Facebook Protect. Here's what it is and how to use it.
Why EU's Interoperability Requirement Threatens Encryption Security
EU's interoperability requirement for messaging apps could potentially weaken the end-to-end encryption you enjoy on top platforms.
What Is Water Cybersecurity?
Water has become the next target for cyberattacks. No, really. Here's everything you need to know about water cybersecurity.
Does Public Service Automation Infringe on Your Privacy?
Many governments already employ artificial intelligence and are investigating further uses. So is AI a threat to your privacy and security?
How Tech Can Help Your Car’s Fuel Economy
Whether gas prices are high or not, saving some extra fuel is always welcome.
Mentor vs. Sponsor: What to Know About Each
Find out what the differences between a mentor and a sponsor are, and how to decide which you need.
What Is Code Verify for WhatsApp and How Do You Use It?
WhatsApp's Code Verify extension aims to provide an extra layer of protection to your end-to-end encrypted chats on the desktop. Learn how it works.