Kim Key's profile photo

Kim Key

Georgia

Tech Writer at PCMag

BlueSky: https://t.co/pPlgX4NvhB Security and software @PCMag. Bylines @NYTimes @TechRadar @Mashable @CNN @ESPN and more.

Articles

  • 1 week ago | me.pcmag.com | Kim Key

    If you share online accounts with family members or you and your friends cut costs by sharing streaming services, you need to secure those accounts with a password that's accessible to everyone you trust. We recommend not sharing passwords with other people very often, but the right password manager can make sending credentials a lot safer with very little effort on your part.

  • 1 week ago | uk.pcmag.com | Kim Key

    How Is a Proxy Different Than a VPN? If you're unfamiliar with the technology, proxies are like first cousins to VPNs. They work by sending web traffic from your home or work computer through a proxy server on the way to its destination. This makes your traffic look like it's coming from somewhere else and hides your real IP address at the same time. The bad news? Each application requires its own proxy connection.

  • 2 weeks ago | me.pcmag.com | Kim Key

    Anyone can destroy your company’s security in just a few seconds. That’s the time it takes one harried employee to click on a phishing link sent by a scammer, infecting every device on the network with malware. It would take a hacker just as long to crack a CEO’s simple password that they’ve memorized and used for all of their online accounts. If you’re looking for a reason to create a cybersecurity strategy for your business, consider the bottom line.

  • 3 weeks ago | pcmag.com | Kim Key

    When you enter into a long-term relationship, you can expect to share a lot of accounts with your partner—utilities, streaming services, perhaps even banking. All these things require passwords. But instead of writing them down on a piece of paper, storing them on your phone, or memorizing some too-easy passwords, you should talk to your partner about using a password manager. A password manager creates long, strong, and unique passwords for all your accounts and fills them automatically.

  • 1 month ago | me.pcmag.com | Kim Key

    Mobile payment apps attract fraudsters hoping to bilk customers out of their cash. The New York Times recently published a story concerning scammers using the popular Zelle app. And banking services such as Capital One have begun sending out emails warning customers about people impersonating bank employees who demand payments over the phone, text, or email. Clearly something is going on. What do you need to know to stay safe? We'll explain.

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
3K
Tweets
10K
DMs Open
No
Kim Key
Kim Key @KimNewsome
22 Nov 24

Let’s fly the friendlier skies together friendos: https://t.co/i8YLQChxgG

Kim Key
Kim Key @KimNewsome
9 Jul 24

Fantastic writing from @michelledean. I know so many people were affected by the news from her daughter, and this essay offers an insightful way of looking at the (horrible) situation

The Cut
The Cut @TheCut

I know Alice Munro’s writing by heart. I know her failures by heart, too. In the aftermath of Andrea Skinner’s abuse revelation, Michelle Dean reflects on secrets and lies within families — and what clues were present in Munro’s writing all along. https://t.co/WhkS1DTwO7

Kim Key
Kim Key @KimNewsome
9 Jul 24

RT @chrissyfarr: Technologies that I was told would revolutionize health care in my career so far: — 2010-2012: Electronic medical records…