Mary James
Mary is a cybersecurity writer based in Los Angeles, holding a B.S. in Liberal Arts from Clarion University and an M.F.A. in Creative Writing from Point Park University in Pittsburgh. With over seven years of experience, she focuses on educating the public on a wide range of cybersecurity topics, from VPNs to antivirus software.
Mary’s previous experience in sales and content creation at a private cybersecurity firm has enabled her to translate complex topics into easily digestible concepts. Her work has been featured in national publications such as MSN, CNBC, and PC Matic's private blog, reflecting her dedication to sharing vital cybersecurity insights and empowering the public to safeguard their private data.
When she's not writing, Mary works at her local theatre while also enjoying the trifecta of the beach, mountains, and desert.
- MSN
- CNBC
- PC Matic
- Antivirus
- VPNs
- Identity Theft
- B.S. in Liberal Arts from Clarion University
- M.F.A. in Creative Writing from Point Park University
- Mac or PC: Both
- Android or iOS: iPhone
Mary's Latest Articles
-
How To Keep Seniors Safe in the Digital Age: A Social Media Guide
We've put together an in-depth guide for both seniors and caretakers that looks at common forms of social media fraud, how to prevent them, and resources for when you get scammed.
-
Is COM Surrogate a Virus or a Legitimate Process?
Uncovering the truth about COM Surrogate: What it is, what it does, and how to protect your PC.
-
6 Simple Steps to Protect Your Phone and Webcam from Hackers
Maximize your online security: A step-by-step guide to protecting your phone and webcam from hackers.
-
Hotspot Shield Review 2024: A Secure, User-Friendly VPN
Our Hotspot Shield review explores the pros and cons of its security measures, speed, compatibility, and user-friendliness.
-
How To Disable McAfee Antivirus: A Comprehensive Guide
Learn the simple and effective way to temporarily or permanently disable McAfee antivirus on your device.
-
What Is Phishing-as-a-Service and How Can Anyone Become a Hacker?
Uncovering the definition, methods, and consequences of phishing-as-a-service, as well as how to protect yourself.