Monitor Anything with Manything

Manything Screencap

[Note: This app is currently only available for iOS devices.] This awesome free app can turn your iOS device into a monitoring camera! I love some of these apps that are being developed to use old iPhones, iPads and iPods to extend functionality. Manything an be used for multiple things—the most obvious being used as a security camera. It features live streaming, motion activated alerts and free cloud video recording. You can even monitor and watch on the go. ... Continue Reading

The Computer Virus Catalog

The Computer Virus Catalog - Top

This illustrated guide to the worst viruses in computer history, the Computer Virus Catalog, is curious and creative. Did you know that the “Cookie Monster” virus was first computer virus in history? (That didn't take long!) “Created in the late '60s, Cookie Monster is the world's first computer virus. After infection, Cookie Monster freezes all system activity and demands cookies. Don't sweat it. You simply unlock your computer again by typing the word 'cookie'” If only all computer viruses ... Continue Reading

They Don’t Know Your Password [Video]

old password screen dos retro

In this introduction video to password hashing, you'll learn how YouTube, Facebook, Twitter, Google and other online account services don't know what your password is. In fact, if you dig around in a WordPress database, you will see that it is impossible to decipher any username's password. It all has to do with password hashing. Here's Tom Scott to explain: ... Continue Reading

Can You Trust the Web for Online Donations? [Infographic]

trust me card

Mobile online giving is important, but can we trust the Internet for online donations? The infographic below highlights the Internet's recent security and privacy failures and states that “75% of people already have or will have their data compromised in their lifetime.” That's a pretty scary statistic (however accurate it is) if you rely on the web to keep your data safe; but in the end, keeping your data safe has far more to do with you and me than it does companies and applications that ... Continue Reading

The Growing Problem of Cyber Crime [Infographic]

Cyber crime sillotte

I think cyber crime is one of those things that you never thing is going to happen to you — especially if you're a geek — but these statistics tell us otherwise. In fact, mobile devices are the most at risk connected device with only 50% of users using basic security precautions. Social media is a huge target, too: ... Continue Reading

2014: The Year of Encryption [Infographic]

The Year of Encryption

With the news surrounding NSA whistleblower Edward Snowden, this past year our techie eyes have been opened to the realities of who can read our data. Do you use Dropbox or any other cloud services? Is your data secure? That's what everyone is wondering now that the LOL cats are out of the bag. Is your churches data secure? ... Continue Reading

Who Is Protecting Your Data in 2014? [Infographic]

They are looking for your data

I suppose the distinction should be made that this list is not about who is keeping your data private, but who is protecting your data from government requests. While Google scores all six starts, we all know they “read your mail” so-to-speak. For good or bad, that's what happens. This report from the Electronic Frontier Foundation rates everyone from Adobe to Yahoo! and rates the following categories on a pass/fail scale: ... Continue Reading

Passwords: Size Matters

the password is

I know you hardcore techno geeks need two hands and your left foot (unless you're left handed) to enter your super-duper cryptic password that you update every 17 days. As for everyone else, they think they're super cryptic if they add “@” to their p@ssword. But you don't have to have a super crazy, impossible password to make your accounts safe. Case in point, here's a password that takes over 35 quadrillion years to break: ... Continue Reading

Sharing Passwords Safely Across Your Church Tech Team


Before diving deep, the only people that should hold the keys to your church accounts should be a core team. That core team should probably be less than 5 people that are trusted and should probably have signed some type of employee handbook or contract about portraying the church’s image online. How is your church or your church’s communication team sharing passwords right now? Are you sharing one password across the board? Sorry guys, having “John3:16” as your password isn’t as secure as you ... Continue Reading

1 in 10 Children Are Victims of Identity Theft [Infographic]

Child online identity theft

I've never thought that children would be at risk for online identity theft, but it turns out, they are actually at higher risk! Children are targeted up to 35 times more. With 10% of kids becoming online identity theft victims, you will want to make sure you follow these six simple steps towards safeguarding your children's online identity: ... Continue Reading