, , ,

How to Deal with Negative Reviews

Business review sites such as Yelp can be a source of major frustration for business owners. Issues include exaggerated negative…
, ,

24 Sites for Royalty-Free Images (Free and Paid)

In my last article, How to Legally Use Images and Graphics Created by Others, I discussed the dangers of using the work…
,

How To Legally Use Images and Graphics Created By Others

After locating Google images to illustrate a presentation on appropriate use and attribution of images belonging to others,…
, ,

Seniors Beware! What is Vishing? (And 3 Ways to Avoid It)

Switching from Windows XP to Windows 8 meant something as simple as shutting down his computer became a challenge for my…
, ,

4 Simple Home and Work Cyber Safety Tips

Upon arrival at the Riverside County Sheriff's Department for cyber security training by a division of Homeland Security,…
, , ,

Using Parent Power to Protect Kids Online

When it comes to Internet safety and privacy, conversations between parents and children can help kids make wise decisions.…
, , , , , , , , , ,

7 Conversation Topics To Keep Kids Safe Online

I panicked as I read an article about new social media apps because I was familiar with only one of them! How can I protect…
,

Which is More Important, Safety or Privacy?

The United States mines data to protect its citizens.  As much as I value my privacy, I'm willing to compromise some privacy…
, , , , , , , , , , ,

What Social Media Apps and Sites are Popular with Kids these days?

Social media has many positive attributes but there’s no denying potential dangers such as reputation damage and exposure…
, , , ,

Private Browsing - How to Surf Incognito

Incognito web browsing is private Internet surfing and it differs from non-private surfing because history of an incognito…
, ,

The State of Privacy in 2013

An insightful infographic by HostGator depicts the state of privacy in 2013.The infographic draws attention to the…
, , , ,

5 Reputation Management Techniques for Protecting your Online Privacy

Reputation management is the process of monitoring and controlling how you are perceived online. Damage to your reputation…
, , ,

Products and Services that Protect Children Online

Recent cyberbullying-related suicides led to several powerful online discussions about effective ways to protect children…
, , , , ,

How to Protect your Child on Social Networks

Protecting our children’s privacy on social networks is an ongoing challenge that begins at a young age and continues after…
, , , ,

Was I a Victim of an Online Predator?

One would think that someone who writes and talks about Cyber Privacy and Cyber Safety would be immune to online predators,…