Attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
- Digital InheritanceWhat happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and checklists of what loved ones need to know in the event of our passing. But what about all of our digital data and online accounts? Consider creating some type of digital will, often called a "Digital Inheritance" plan. […]
Learn the Terms
Keeping up with technical terms can be a struggle.
Review our Glossary of Terms to learn more.
Testimonial
-
Dr Kokel wanted me to write to you guys and let you know how “VERY GRATEFUL” she is that your technician was on our doorstep at 6:30 this morning. (I must say I was pretty thrilled myself.) We all appreciate the exemplary customer service, and Dr. Kokel said she would give you the best recommendation if you ever need one.
You guys are all pretty great and we just wanted you to know it!!!!
THANK YOU!!!!
Dr. Kokel, DDS