Tricking people into revealing sensitive info by posing as a trusted entity. Be wary of emails asking you to log in or download attachments.

Malware disguised as legitimate software. Named after the famed Trojan Horse.

Unsolicited bulk messages, usually email. Most inboxes filter spam out automatically.

Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.

An extra login step beyond a password, like a code from an app. Enable it wherever you can!

An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.

Options to control how your data is collected and used. Review them in your OS, browser, and apps.

A Virtual Private Network. Encrypts your internet traffic and masks your IP address for better privacy.

A spare copy of important data in case the original is lost or damaged. Backup to an external drive or cloud storage.

An extra login step beyond a password, like a code from an app. Enable it wherever you can!