Xtreme I.C.E. logo with a padlock and binary code, above the text: We Are A Top IT Firm In Atlanta. Providing the best in IT solutions to Metro Atlanta and the entire U.S.
  • In this edition: What you should know about using ChatGPT and other AI apps.
  • Understand the apps on your teen’s phone.
  • Your doorbell camera is joining a surveillance network: sometimes that’s good, sometimes it’s not. 

Live Cyber Poll

What is your overall comfort level with AI-enabled smart home devices?
Select one
Join in if you’d like. Everything you share is anonymous, and we don’t collect any personal information. Your privacy stays yours.

Cybersecurity News You Can Use

Ring Doorball Camera

Ring, the popular AI-powered doorbell, has rolled out a feature called Search Party that uses AI to scan outdoor Ring cameras for lost dogs. Because it’s turned on by default, your Ring may already be analyzing and sharing snapshots from your cameras with Ring’s wider search system unless you opt out.

Ring is also expanding Familiar Faces (off by default), which lets you save images of people so your camera can recognize and label who is at the door. That effectively turns your doorbell into a node in a much larger AI-driven surveillance network, raising real questions about privacy and consent for visitors and neighbors.

Your next step: Decide which settings you’re comfortable with. Before spring break, take five minutes to open the Ring app, review Search Party, Familiar Faces, and other sharing options, turn off anything you don’t want, and decide how much of your front porch you’re willing to feed into Ring’s AI and potentially to others.

Gmail calendar invites

Scammers are running “calendar spam” campaigns that stuff your Google Calendar with fake meetings and disgusting events, hoping you’ll click their links. They do this by blasting out spam invites to email addresses they’ve collected from data breaches, data brokers, and other lists.

In Google Calendar, go to Settings → Event settings → “Add invitations to my calendar” and change it to “Only if the sender is known” or “When I respond to the invitation in email” so random invites can’t auto-add. Then, open any spam events you already have, choose the three dots, report them as spam, and delete them so they disappear.

Don’t click any links or phone numbers in those invites, even if they pretend to be Google, your bank, or tech support.

New Google Tool Helps You Hide Personal Info from Search Results

Google has rolled out a new privacy tool that lets you ask the company to pull some personal information from Google Search results. The new “Results about you” dashboard scans for things like your phone number, home address, and government ID numbers, so you can request that those links be taken down. This doesn’t erase the content from the internet, but it does make it much harder for strangers, stalkers, or scammers to find that material with a quick search.

You can access this tool in the Google app by clicking on your Google account photo and selecting “Results about you”, or by visiting goo.gle/resultsaboutyou.

Update Your Passwords

Feb B Logos

Users’ passwords from these organizations have recently been found for sale on the dark web.

If you do business with any of these companies, change your account password and use two-factor authentication wherever possible.

What s on Kids Phones XSI
Close-up of a hand holding a smartphone with a blurred laptop keyboard in the background. Large text says 'Contact'. Below, headline reads 'Request An IT Consultation' and subtext says 'Xtreme Solutions is here to help you with all your IT needs in Metro Atlanta and across the country.'

One more thing...

Feb B cartoon
Ask Us About Cyber Feb B

“In a recent newsletter, you provided a calculator to determine how long it would take scammers to guess a password. Forget passwords — I want to know how secure a passkey (a four-digit PIN you use instead of a password) is for accessing your account.”

A passkey is different than a password. A passkey is a code you enter on your phone or computer. To tell the device it’s you. The code doesn’t get sent over the internet.


Even if someone wanted to guess the code, they’d need your device and would only get a few tries before it locks. That’s why passkeys with a PIN are much safer than most passwords.


To start using passkeys, go to an account’s security settings and choose “Use a passkey.” Then confirm with your phone or computer using a code, fingerprint, or face scan. After that, you’ll sign in by approving the login on your device instead of typing a password.

“I received an email from Experian stating that my credit usage had gone up and asking me to click to review it. How do I know if it is really from Experian?”

Treat credit alert emails like smoke alarms: verify them before you react. Skip the link in the email. Instead, open a new window on your web browser, and sign in to Experian.com directly. Or you can call them at 866-617-1894.

“Do I really need to buy Antivirus software? Are the free versions good enough? I typically use the free version of Avast, and it seems to perform well. There are other free antivirus options that also receive good ratings.”

You don’t necessarily have to buy antivirus software if you keep the software on your home computer and phone up to date. Free tools like Avast, Microsoft Defender, and others do a solid job at basic malware protection. Paid versions primarily add extras such as identity monitoring, ransomware recovery, and family controls, which some folks want.

Send us your cybersecurity question for possible use in a future newsletter.

Cyber Content Archive: Always Available

A conceptual digital illustration shows a large white smartphone lying flat on a white surface. Emerging vertically from the phone’s screen are several tall, white bookshelves arranged in a row. Each bookshelf is filled with colorful books and magazines, representing a vast digital library. The shelves appear three-dimensional and realistic, giving the impression that a physical library is coming to life from within the device. The phone’s details — including the home button, charging port, and side buttons — are visible, emphasizing the connection between modern technology and access to unlimited information. The image symbolizes e-libraries, digital learning, and the convenience of mobile access to knowledge.

Cyber cartoon © 2026 CartoonStock | Original content © 2026 Aware Force LLC