K. Richard Labbe
  • Home
  • Scams
  • Digital Security
  • Personal Security
  • Be Ready
Sign in Subscribe
Are You Oversharing Online?
Digital Security

Are You Oversharing Online?

Mindful sharing isn't about abandoning your online presence—it's about sharing purposefully.
05 Apr 2025 4 min read
How and Why to Freeze Your Credit
Digital Security

How and Why to Freeze Your Credit

"Identity theft doesn't announce itself—it strikes unexpectedly. Freezing your credit is perhaps the most effective "set it and forget it" defense available."
01 Apr 2025 3 min read
Is It Safe to Use Public Phone Chargers? No.
Digital Security Featured

Is It Safe to Use Public Phone Chargers? No.

Why a Free USB Charging Port Might Cost You More Than You Think
29 Mar 2025 2 min read
Why Screen Locks Matter (It’s Not Just About You)
Digital Security

Why Screen Locks Matter (It’s Not Just About You)

How Locking Your Phone Can Be an Act of Love and Respect
28 Mar 2025 2 min read
Should You Plug in a USB You Found? (Why It’s Not a Good Idea)
Digital Security

Should You Plug in a USB You Found? (Why It’s Not a Good Idea)

Even with Good Intentions, This Small Mistake Can Cause Big Problems
25 Mar 2025 2 min read
Don’t Just Toss It: Why Shredding Still Matters
Digital Security Featured

Don’t Just Toss It: Why Shredding Still Matters

Yes, Even in the Digital Age, Paper Still Puts Your Identity at Risk
24 Mar 2025 2 min read
Don't Take the Bait: Spotting and Stopping Phishing Attacks
Digital Security

Don't Take the Bait: Spotting and Stopping Phishing Attacks

"Phishing is a digital con game, and the bait is usually an email, text, or fake website that looks oh-so-legit."
12 Mar 2025 4 min read
Double-Lock Your Digital Life: Understanding Two-Factor Authentication
Digital Security

Double-Lock Your Digital Life: Understanding Two-Factor Authentication

"The digital world won't be getting any safer anytime soon. Taking this small step now can prevent major headaches later."
10 Mar 2025 3 min read
Rainbow Tables: Why Hackers Love Simple Passwords
Digital Security

Rainbow Tables: Why Hackers Love Simple Passwords

Ever wonder why websites insist on those pesky password requirements? Behind the scenes, they're protecting you from clever hacking techniques like "rainbow tables" that can crack simple passwords in seconds.
08 Mar 2025 2 min read
Beware the Grandparent Scam
Scam Watch

Beware the Grandparent Scam

Scams are everywhere, but one particularly cruel trick—the Grandparent Scam—targets our elderly loved ones, exploiting their love and trust.
07 Mar 2025 2 min read
Churches and the Gift Card Scam
Scam Watch

Churches and the Gift Card Scam

Today, we’re tackling a sneaky scam hitting faith communities hard: fraudsters pretending to be your pastor, priest, or rabbi, asking for gift cards.
01 Mar 2025 3 min read
Protect Your Privacy Online with DeleteMe
Digital Security

Protect Your Privacy Online with DeleteMe

With privacy threats evolving daily, DeleteMe is a tool that aligns perfectly with the IT mindset of staying proactive and informed.
26 Feb 2025 4 min read
10 Purchases to Safeguard Your Identity and Information
Digital Security

10 Purchases to Safeguard Your Identity and Information

With a few smart purchases, you can shield your identity, secure your devices, and sleep a little easier at night. Here are my top 10 picks—each one’s a game-changer worth exploring.
25 Feb 2025 7 min read
What’s a VPN? A Friendly Guide to Online Privacy
Digital Security

What’s a VPN? A Friendly Guide to Online Privacy

A VPN gives you control over who sees your online activity, especially as cyber threats grow sneakier.
23 Feb 2025 5 min read
Is Your Password a Sitting Duck?
Digital Security

Is Your Password a Sitting Duck?

Strong passwords don’t have to be a headache. With a few tricks and tools, you can lock down your digital life.
21 Feb 2025 5 min read
The #1 Cybersecurity Risk? It’s YOU.
Digital Security

The #1 Cybersecurity Risk? It’s YOU.

When most people think about hackers, they picture someone in a hoodie, sitting in a dark room, furiously typing away to break into secure systems. But here’s the truth: Most hackers don’t “break in.” They log in. How? Because people unknowingly hand over their own security information. Cybercriminals
14 Feb 2025 4 min read
← Newer Posts Page 3 of 3
K. Richard Labbe © 2025
  • Welcome
  • Sign up
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Newsletter
  • Safe Picks
Powered by Ghost