Sticky Password Blog

RSS Feed


Sticky Password for Android

Today, we’ll look at getting started with Sticky Password on your Android tablet or smartphone. Download and Install the Sticky Password app via Google Play and tap the Sticky Password icon.   The First Run Wizard will start. Tap Let’s get started. The first step is to connect to your StickyAccount. Your StickyAccount is your […]

Sticky Password for Your iPhone and iPad

Today, we’ll look at getting started with Sticky Password on your iPhone or iPad. Download and Install the Sticky Password app via the App Store and tap the Sticky Password icon. The First Run Wizard will start. tap Let’s get started. The first step is to connect to your StickyAccount. Your StickyAccount is your administrative […]

Top 4 Places You Might Get Hacked [infographic]

Today’s always connected culture has significantly increased the potential for hackers to breach one of your online accounts. It’s just as likely that you access your online accounts through your home computer, as it is that you’ll do it on one of your mobile devices like your smartphone and tablet. In order to outsmart the […]

Out with the old, in with the new

December – the season of giving and getting. At some point, when you’re getting all that new stuff, you have to decide what to do with the old stuff. We remember when we moved house a couple of years ago and came across 3 computers collecting dust in the attic. ‘What should we do with […]

The Year of the Fingerprint?

In its 10 Hot Consumer Trends 2014, Ericsson tells us that 52% of the 5,000 smartphone users polled ‘want to use their fingerprints instead of passwords.’ Firstly, is Ericsson tipping its hand on what it has in store for us with their 2014 line-up? We suspect that they might not be enthusiastic to disclose poll […]

The Words on Passwords [infographic]

Smartphones and mobile devices are the waves upon which we ride into the future, and until we do something about our abysmal security habits now, our cybersecurity waters look pretty murky. According to a study conducted by Janrain, a productivity management provider, one of the major setbacks associated with user security is remembering all of […]