, , , ,

Security and Privacy Tips for Twitter Users

The main purpose of Twitter is to help users share information with the world.  That means this information is intended to be public and it can even be shared with people who do not use Twitter.  The type of information that is shared includes…
, , ,

How to Avoid Cell Phone Identity Theft

Smartphones including iPhones and Androids are growing in popularity, and as a result, cell phones are becoming a rapidly increasing target of identity theft.  These phones have an ability to store vast amounts of personal information and…
, , , ,

How to Prevent Child Identity Theft

Child identity theft is on the rise. The greatest increase has been seen in children under 5 years old but the reality is that child identity thieves are targeting children of all ages. This is because the personal information of young children…
, , , ,

Cyber Security for Home Networks – 5 Important Steps

When it comes to cyber security at home, it’s important to establish a game plan for all household technology users that is realistic and manageable. An updated and thorough game plan can greatly reduce and even prevent identity theft and…
, , , ,

How to Keep Track of Passwords and Usernames

With my rapidly growing list of over 165 passwords and usernames and an increase in mass password breaches, I decided today is the day to seek out a better and a safer way to create and to keep track of my passwords, usernames and other…
, , ,

12 Easy Steps to Check Your Facebook Privacy Settings

Are you certain your privacy settings are doing what you think they should be doing for you?  Have you checked all your Facebook privacy settings lately? Many Facebook users are unaware that what they are reading, watching or listening to…
,

Chase’s Response to Fraudulent Email

I always forward phishing emails to the misrepresented organization (most often Bank of America) but have never gotten a response back.  The lack of acknowledgement made me wonder if anyone ever reviewed the forwarded emails or if I was just…
, ,

Chase Phishing Scam Close Call

I usually get phishing emails from Bank of America, but today I got an alert from Chase that almost had me fooled.  Following my own advice from a previous article, How to Avoid Phishing Scams , I logged onto Chase on-line by typing in…
,

Privacy Threatened by Passing of CISPA. Now what?

Yesterday, the controversial Cyber Intelligence Sharing and Protection Act (CISPA) passed by a 248-168 vote of the House of Representatives.   The bill was voted against by 28 Republicans and 140 Democrats. What is CISPA about? CISPA encourages…
Online Dating Safety Tips
, , , , ,

Internet Dating & Relationships: On-line and Off-line Safety Tips

A gorgeous friend signed up on a specialty internet dating site by creating three diverse faux-profiles that ranged from innocent-and-demure to exciting-and-sexually suggestive.  She was careful to avoid authentic information and real photos…
, ,

Electronic Trails and Footprints – Privacy Pros and Cons

After buying a dishwasher from a local appliance store, I purchased an anniversary gag gift from the Hustler store for friends that love a good prank.   However, it was my friends who ended up with the last laugh after an employee at the…
, , , ,

What Parents Must Know about Sexting

As a teenager, I drove a silver, convertible Camaro. I loved the wind in my hair as I drove during the day, and the night air was exhilarating when I cruised with the top down, the heater blasting and with no sense of danger or vulnerability…
, , , ,

What Children and Teens Should Know About Sexting

“It seemed like a good idea at the time!”   This is what my 16 year old son told me when I asked how he could possibly think it was okay to drive a few blocks with his friend in the trunk, and this is exactly what comes to my mind when…
,

Privacy issues with email

My boss was out of town and I was managing a heavy workload by multi-tasking.  One client, let's call her "Ray", was especially demanding and rude but since the customer is always right, I hid my frustration from her.  My boss at the time…
, , , , ,

Guidelines to Protect Children from Online Sexual Predators

While there are obvious virtues to using cell phones and the internet, technology is simultaneously making children vulnerable and exposing them to exploitation and danger. Cyber bullying, gaming, webcams, social networking, sexting, inappropriate…