Paul Mah

Paul Mah has a lifelong affinity for checking out all sorts of tech gadgets, enterprise gear, and everything in between. A tech blogger who was formerly an IT professional, he is especially interested in how technology can be practically leveraged to help businesses do more.

How to protect yourself in an age of insecurity

Top 5 VPN services for personal privacy and security

Top 5 VPN services for personal privacy and security

If you regularly travel or work remotely, you need to use a VPN or you're putting yourself — and your data — at risk. Here's a look at the options and price plans for some of the top VPNs.

Coworking tips to increase your productivity and privacy

Coworking tips to increase your productivity and privacy

More and more people today work in open offices or coworking spaces. Such environments present unique challenges and opportunities, and the following tips can help ensure personal privacy and also maximize productivity.

How to protect yourself from common hotel security threats

How to protect yourself from common hotel security threats

Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data...

How to prepare for (and prevent) ransomware attacks

How to prepare for (and prevent) ransomware attacks

The only sure way to protect yourself or your company from 'ransomware' is with foolproof file backups. These three backup options can all help recover from ransomware attacks.

5 practices of the paranoid PC user

5 practices of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up.

How to set up a portable, non-cloud-based password manager

How to set up a portable, non-cloud-based password manager

Setting up a non-cloud based password manager in which the password database can be accessed from more than one device is easier than it sounds.

8 ways to fend off spyware, malware and ransomware

8 ways to fend off spyware, malware and ransomware

Recent increases in cyberattacks and identity theft make it seem like the whole Internet is turning into the Dark Web. But while no system is unhackable, there are some painless precautions you can follow that might help keep you step...

10 things to do before you lose your laptop

10 things to do before you lose your laptop

Your laptop computer lets you to stay in touch and be productive regardless of where you are. But if you aren’t careful that portability can be your downfall.

4 small business security lessons from real-life hacks

4 small business security lessons from real-life hacks

Recent cases of social engineering, DDoS attacks and domain-name theft have made headlines. Some stories had happy endings, but others didn't. Here are four tips for preventing these types of hacks from ruining your business.

How to Build Multiple Layers of Security for Your Small Business

Most of us have heard about the concept of building a defense in depth in order to protect computer resources from black hat hackers. The idea revolves around the use of multiple defenses to thwart, or at least limit, the damage...

Load More