MUO

Data Security

Page 13

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Bronze hard drive disk with dark background 1
Computer Storage: A Brief History of Storing Your Personal Data

Computer storage has come a long way, and has a fascinating history.

By 
privacy account password 1
Can You Trust Have I Been Pwned?

HIBP tells you if your data has been leaked anywhere... but can you really trust it with your username, password, and more?

By 
Book With a Zip Lock 1
How to Password Protect a ZIP File in Windows

Want to keep your files safe from prying eyes? Here's how to do it.

By 
Employees Chatting Near Computers 1
What Data Might Your Employees Steal and Why?

Here are the common types of data that employees steal, why those thefts might take place, and what you can do about it.

By 
A woman studying something on a computer --- Unsplash 1
What Is An ISO 27001 Audit and Does My Company Need One?

This rigorous collection of standards allows auditors to evaluate a company's security. Here's everything you need to know.

By 
Mobile tablet showing medical vital signs 1
Your Medical Records Are Confidential, but Are They Private?

Your confidential medical information is protected by law, but that hasn't stopped businesses sharing it.

By 
Women Using Word on Laptop And Browsing On Her Phone 1
PDF
How to Create a Password-Protected PDF From a Word Document

Want to ensure that your documents can't be accessed by anyone without your permission? Here's how you can secure it.

By 
cybersecurity course feature 1
The Top 4 Cybersecurity Trends to Watch Out for in 2021 and Beyond

Here are the cyberattacks you need to keep an eye on in 2021, and how you can avoid falling victim to them.

By 
Spider web, hand and prying eyes 1
What Is Dark Web Monitoring and Do You Need It?

Many services including password managers offer dark web monitoring. So how does it work? And is it worth using?

By 
Illustration of data entering folders 1
Data in Transit vs Data At Rest: Where Is Your Data Safest?

Learn the difference between data in transit, in use, and at rest, and which has the greatest vulnerabilities.

By 
eu tiktok logo feature 1
EU Gives TikTok One Month to Respond to Consumer Rights Breaches

The issues center on advertising and data protection.

By 
whitelist 1
What Is Whitelisting and How Do You Use It?

Sick of spam and unwanted contact? You need to start whitelisting.

By 
Image depicting forbidden access to domain. 1
What is Domain Fronting?

If you want an alternative to using a VPN for online security, domain fronting is one technique you may think about trying. Here's what it is.

By 
The Horizon scandal in the UK is finally drawing to a close. 1
How Can Companies Like Horizon Prevent Destructive Breaches of Trust?

Lives have been ruined by Horizon's flawed computer system, but what lessons can be learnt from this injustice?

By 
what is gdpr feature 1
What Is GDPR and Why Do I See Popups?

GDPR enforces strong data protection, but comes with an awful lot of popups.

By 
A close-up image of WhatsApp and Facebook notifications on an iPhone 1
Germany Orders Facebook to Stop Collecting Data on WhatsApp Users

A German regulator orders Facebook to stop collecting data on WhatsApp users after making them accept its new privacy policy.

By 
Someone hacking emails 1
85 Percent of Microsoft 365 Organizations Suffer Email Leaks, Says Research

Microsoft's static security rules are leaving business' emails ripe for the taking.

By 
ProtonCalendar Icon and App Over Snowy Mountain Backdrop 1
How to Set Up ProtonCalendar for Maximum Productivity

ProtonCalendar uses end-to-end encryption and is designed to keep your data safe. Here's how to get started using it.

By 
computer 1
Use This Handy Site to Find Out if You've Been Affected by a Data Breach

Here's how to find out if your email address or phone number has been leaked, and what to do about it.

By 
Laptop and ceramic vases 1
How to Change App Permissions in Windows 10

Apps often want more permissions than they require. Here's how you rein them in.

By 
11 12 13 14 15
Page 13 / 15