, , , , ,

Generation Like – The Value and the Cost

I was uncomfortable as I came to the end of a PBS documentary called, The Like Generation. As I reflected on the footage, I became aware of the roller coaster of emotions I experienced as I watched the Frontline video. What started out…
, , , , , , , , ,

Taking Control of Privacy

There is no doubt there are aspects of privacy that are out of our control, but as discussed in the last post called Privacy we Cannot Control, there are solid options for reducing the impact of privacy invasion. Today's post reminds…
, , , , , ,

Privacy: How to Deal with What We Cannot Control!

There are moments when I feel helpless and hopeless as I watch privacy diminishing rapidly before my own eyes. Not a day goes by without one type of privacy breach or another and frequent news reports and articles make it feel like cyber attacks…
Target Breach
, ,

How to Protect Yourself amidst Recent Data and Credit or Debit Card Breaches

I found myself shopping at Target four times between Black Friday and December 15th when I wanted to buy diapers, spillproof cups, clothes and toys for my adorable 2 year nephew who was staying with me for 10 days. Then I learned that cyber…
Seniors as scam victims
, , , , ,

Seniors and Facebook Identity Theft: How to Avoid Being a Target

Seniors have long been targets of scams of one kind or another. And with the rapidly growing number of senior citizens embracing social media, especially Facebook, the opportunity for identity theft has also grown.Why are Seniors More…
Remove yourself from Instantcheckmate
, , , ,

How to Opt Out of Instantcheckmate

It’s no secret that private information appears all over the Internet but the malice behind a solicitation email I received bothered me enough to want to get the word out to as many people as possible about ways to remove such information. Exploration…
, , ,

Talking to Your Texting Teen

"She texts all night long!" "She won't put that stupid phone down for one second!" "She cares more about that phone than her own family!" "I can't talk to her anymore -- I can only TEXT HER!" Have you or someone you know uttered these…
, ,

Craig’s List Scam – If it seems too good to be true, it is!

If it seems too good to be true, it is too good to be true - especially when it comes to selling on Craig's List.It started when someone expressed interest in a painting I'd listed on Craig’s List that previously had no activity. I noticed…
, , ,

Is Your Child’s Self-Esteem a Social Media Problem?

Social media has an enormous impact on all children, socially as well as emotionally. However, for children who struggle with self-esteem issues social media can be troublesome – and even dangerous. Kids, of any age, that do not believe…
,

How to Legally Use Images from a Google Search

There are many reasons to search for images on the Internet and multiple sites to find images where image creators and providers allow reuse of their images. Using images without verifying associated licenses is risky. This is a step-by-step…
, , ,

How to Deal with Negative Reviews

Business review sites such as Yelp can be a source of major frustration for business owners. Issues include exaggerated negative reviews from disgruntled employees, negative reviews by competitors, paid or unpaid fake reviews from people that…
, ,

24 Sites for Royalty-Free Images (Free and Paid)

In my last article, How to Legally Use Images and Graphics Created by Others, I discussed the dangers of using the work of others without permission or attribution. In this article you will find an extensive list of resources for Creative Commons,…
,

How To Legally Use Images and Graphics Created By Others

After locating Google images to illustrate a presentation on appropriate use and attribution of images belonging to others, I ran a malware scan on my computer.  The scan identified 469 malicious items that weren't there before the search.…
, ,

Seniors Beware! What is Vishing? (And 3 Ways to Avoid It)

Switching from Windows XP to Windows 8 meant something as simple as shutting down his computer became a challenge for my seventy-something year old dad.  When he coincidentally got a call from "Technical Support" as he was struggling with…
, ,

4 Simple Home and Work Cyber Safety Tips

Upon arrival at the Riverside County Sheriff's Department for cyber security training by a division of Homeland Security, I asked for a password to access wireless internet but my request was denied. I was surprised by the lack of Internet…