Paul Mah

Paul Mah has a lifelong affinity for checking out all sorts of tech gadgets, enterprise gear, and everything in between. A tech blogger who was formerly an IT professional, he is especially interested in how technology can be practically leveraged to help businesses do more.

How to protect yourself in an age of insecurity

9 security tools for the mobile worker

9 security tools for the mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

Top 5 VPN services for personal privacy and security

Top 5 VPN services for personal privacy and security

If you regularly travel or work remotely, you need to use a VPN or you're putting yourself — and your data — at risk. Here's a look at the options and price plans for some of the top VPNs.

Coworking tips to increase your productivity and privacy

Coworking tips to increase your productivity and privacy

More and more people today work in open offices or coworking spaces. Such environments present unique challenges and opportunities, and the following tips can help ensure personal privacy and also maximize productivity.

How to protect yourself from common hotel security threats

How to protect yourself from common hotel security threats

Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data...

How to prepare for (and prevent) ransomware attacks

How to prepare for (and prevent) ransomware attacks

The only sure way to protect yourself or your company from 'ransomware' is with foolproof file backups. These three backup options can all help recover from ransomware attacks.

5 secure habits of the paranoid PC user

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

How to set up a portable, non-cloud-based password manager

How to set up a portable, non-cloud-based password manager

Setting up a non-cloud based password manager in which the password database can be accessed from more than one device is easier than it sounds.

8 ways to fend off spyware, malware and ransomware

8 ways to fend off spyware, malware and ransomware

Recent increases in cyberattacks and identity theft make it seem like the whole Internet is turning into the Dark Web. But while no system is unhackable, there are some painless precautions you can follow that might help keep you step...

10 things to do before you lose your laptop

10 things to do before you lose your laptop

Your laptop computer lets you to stay in touch and be productive regardless of where you are. But if you aren’t careful that portability can be your downfall.

7 steps to protect your business from cybercrime

7 steps to protect your business from cybercrime

As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves...

7 social engineering scams and how to avoid them

7 social engineering scams and how to avoid them

Even the most savvy IT professionals can fall victim to social engineering attacks. Here’s how to recognize these threats and avoid falling prey to them.

Load More