,

How to Legally Use Images from a Google Search

There are many reasons to search for images on the Internet and multiple sites to find images where image creators and providers allow reuse of their images. Using images without verifying associated licenses is risky. This is a step-by-step…
, , ,

How to Deal with Negative Reviews

Business review sites such as Yelp can be a source of major frustration for business owners. Issues include exaggerated negative reviews from disgruntled employees, negative reviews by competitors, paid or unpaid fake reviews from people that…
, ,

24 Sites for Royalty-Free Images (Free and Paid)

In my last article, How to Legally Use Images and Graphics Created by Others, I discussed the dangers of using the work of others without permission or attribution. In this article you will find an extensive list of resources for Creative Commons,…
,

How To Legally Use Images and Graphics Created By Others

After locating Google images to illustrate a presentation on appropriate use and attribution of images belonging to others, I ran a malware scan on my computer.  The scan identified 469 malicious items that weren't there before the search.…
, ,

Seniors Beware! What is Vishing? (And 3 Ways to Avoid It)

Switching from Windows XP to Windows 8 meant something as simple as shutting down his computer became a challenge for my seventy-something year old dad.  When he coincidentally got a call from "Technical Support" as he was struggling with…
, ,

4 Simple Home and Work Cyber Safety Tips

Upon arrival at the Riverside County Sheriff's Department for cyber security training by a division of Homeland Security, I asked for a password to access wireless internet but my request was denied. I was surprised by the lack of Internet…
, , ,

Using Parent Power to Protect Kids Online

When it comes to Internet safety and privacy, conversations between parents and children can help kids make wise decisions. Discussion ideas were provided in 7 Conversation Topics to Keep Kids Safe Online but discussions are not the only options…
, , , , , , , , , ,

7 Conversation Topics To Keep Kids Safe Online

I panicked as I read an article about new social media apps because I was familiar with only one of them! How can I protect my children if I can't keep track of the apps they use online? Once I calmed down, the answer was clear:  I do not need…
,

Which is More Important, Safety or Privacy?

The United States mines data to protect its citizens.  As much as I value my privacy, I'm willing to compromise some privacy in exchange for safety although I recognize this provides opportunity for abuse. See video by by AlJazeera below.What…
, , , , , , , , , , ,

What Social Media Apps and Sites are Popular with Kids these days?

Social media has many positive attributes but there’s no denying potential dangers such as reputation damage and exposure to predators, identity thieves and cyber bullies. New social media sites crop up regularly and it’s challenging keeping…
, , , ,

Private Browsing – How to Surf Incognito

Incognito web browsing is private Internet surfing and it differs from non-private surfing because history of an incognito session does not get saved to the hard drive. When surfing incognito, cache or cookies are not left behind to provide…
, ,

The State of Privacy in 2013

An insightful infographic by HostGator depicts the state of privacy in 2013.The infographic draws attention to the similarity of current privacy to the totalitarian state of privacy described in George Orwell's classic, 1984, which…