Security 

You MUST do Microsoft 2FA from Our network if you want to use Microsoft at home. Please see this document. 

My Yes/No Google Prompt for 2FA is slow, what can I do?

The prompt may not be slow all the time.  It is depended on many factors. Here are some suggestions and recommendations. 

See our written documentation here on how to this setup or see our video on how you may set this up.


Understanding and Enabling 2Fa on your Google Account - Using My cell for 2FA

Setup up Google with a 2FA Security Key

Setting up Your Google 2FA from a Tablet or Cell. 

Using Android device should be a very similar process. 

Google Authenicator App


How  to use the Google Authenticator App for Google and Microsoft on an IOS Device.


You should know the app recently updated and so has changed from the Silver color app to an Asterick. See below image.

Deep Dive into the Google Authenticator App 

Advance Google Smart Lock for 2FA 

How do I remotely sign out of any previously signed in Google device?

Buying a personal Chromebook and solving why when I close the lid on it and reopen it, it doesn't ask for a password.

The Power of Extensions  

Extensions knits itself into your browser.

It sees all the traffic your generating before it gets encrypted and it sees all the stuff that comes back into your browser after it is decrypted


Anything like HTTPS or TLS encryption is irrelevant to the extension. It's inside your browser and it kind of has equivalent power to your browser

Be Very very conservative about the stuff you plug into your browser to give extra functionality.

Installing Apps in Chrome

Understanding Installing and Removing Chrome Extensions. 

Google Emailed Security Alerts 

6 Signs an email is a Phish


What's in a Password?  Understanding them and creating them.

 Listen to your voice of reason

Scammers use mail, email, phone calls, texting as ways to get you to divulge information. You will be the one that struggles to verify their TRUE identity. Why not just let unknown numbers or unexpected business calls go to voicemail. 

When you answer a call and interact with the voice prompt or by pressing a number, it lets spammers know your number is real. They can then sell your number to another company or begin targeting your number more frequently.  The same is true when you respond to a text that you can't identity. Never assume because the number appears local that it really is local.