Protect Your Data
Protect Your Family
Protect Your Business
Do you like riding roller coasters? The first time I went on a roller coaster ride, I couldn’t keep my eyes open the whole time! Somehow, it seemed better not to know when las bajadas (the drops) were coming. I was afraid the WHOLE time and, of course, I screamed a lot. After the ride was over, I rode it again and again. The adrenaline of the unknown was an extraordinary experience and a way to conquer my fears. Sometimes conquering fears can be challenging, but once you jump in, it gets easier! It can be this way with your cyber world – as you go up that first roller coaster hill, your stomach churns and you feel like you’re about […]Read More
When I was less than one month old, my mom left me with my grandparents, who already had eleven kids to take care of and were living in extreme poverty. My mom moved far away to find a job in order to support me financially. When I was about four or five, I moved back in with my mom, and started a new life with a stepfather in the picture. The next 15 years were filled with abuse, loneliness, and deprivation. I am grateful for the moments of love, courage, empowerment, joy, and teamwork that I experience, and I was eventually able to take action towards my dreams. Even though now I live a life filled with security, peace, success, and fulfillment, helping […]Read More
Have you ever seen a movie where a criminal hijacks a car? Sometimes they will threaten the person driving it to give up the car to them, or hotwire it when no one is looking and then speed away! I always make sure to lock my car and park in safe areas so that I can prevent that from happening. Today we’re not going to talk about car hijacking, we’re going to discuss browser hijacking! Browser hijacking is when unwanted or unauthorized software is installed in your Internet browser, and then it is altered so others can use it to navigate online. Browser hijacking is typically used for advertising fraud but it could also be used to steal your information! It […]Read More
When I was younger, I loved the story of la Caperucita Roja. I was always so scared that the wolf had pretended to be the granny and that Little Red Riding Hood almost got eaten up! It’s time for another cyber retelling of a classic story, so I hope you’ll enjoy this story about impersonators. Once upon a time, there lived a little girl. Whenever she went out, the little girl wore a red riding cloak, so everyone in her town called her Little Red Riding Hood. She always carried a little basket with her phone, and brought headphones with her to listen to music. Little Red Riding Hood lived with her mother near a nice forest, and they would video chat […]Read More
Do you know what Malvertising is? The word Malvertising is a combination of Malware and Advertising. Cybermonsters will try to infect ads on websites to spread malware to your computer or mobile devices. Malvertising could appear as abrupt alerts, tickling offers, banners, or pop-up ads. Adware viruses come from malvertising strategies. Cybermonsters buy ad space on trustworthy websites to gain your confidence, and get you to click, but these ads could redirect you to malicious websites, or automatically install the malware on your device. These adware viruses contain unwanted software that will throw ads onto your computer or web browser randomly. They may appear in the form of pop-ups or new tabs that open automatically. It’s kind of like a pest […]Read More
It’s that time of the year when many of us are turning our thoughts to one word: Gratitude! At least, that’s what I’ve been thinking about these days as we near the end of 2020. This year has been filled with ups and downs, but within all of it, there have been things I am thankful for and that I would not exchange for anything. Since my purpose with Way2Protect is to connect cyber safety with daily living, I would like to connect GRATITUDE to cyber wellness by talking about what I’m grateful for when it comes to technology. Living in gratitude is something that I didn’t fully understand until I committed to a daily practice. Of course, I believe strongly in the […]Read More
The Internet as you know it and use it in your daily life, is only about 4% of the Internet that actually exists. Did you know that the Internet is divided into three layers? The surface web The deep web The dark web These can all be used for good purposes; however, Cybermonsters love to use all layers of the web for malicious activities and with evil intent. The Cybermonsters Before we discuss how Cybermonsters use the deep web and the dark web, let’s review who they are: “CyCri-M0” is motivated by financial gain “HaKi-M0” follows a particular cause “InSi-M0” is an insider in your life, family, or business, and “NaSu-M0” are huge Cybermonsters with unlimited resources. These purposes are achieved […]Read More
Are you Cyber Safe?
Try our Cyber Assessment Tool to find out!