Catch-all term for malicious software like viruses, spyware, and ransomware. Only download from trusted sources.

Malware disguised as legitimate software. Named after the famed Trojan Horse.

Malware disguised as legitimate software. Named after the famed Trojan Horse.

An extra login step beyond a password, like a code from an app. Enable it wherever you can!

An extra login step beyond a password, like a code from an app. Enable it wherever you can!

An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.

An encrypted vault for storing and generating strong passwords. Way better than using the same password everywhere.

Options to control how your data is collected and used. Review them in your OS, browser, and apps.

Options to control how your data is collected and used. Review them in your OS, browser, and apps.

A Virtual Private Network. Encrypts your internet traffic and masks your IP address for better privacy.