, , ,

Using Parent Power to Protect Kids Online

When it comes to Internet safety and privacy, conversations between parents and children can help kids make wise decisions. Discussion ideas were provided in 7 Conversation Topics to Keep Kids Safe Online but discussions are not the only options…
, , , , , , , , , ,

7 Conversation Topics To Keep Kids Safe Online

I panicked as I read an article about new social media apps because I was familiar with only one of them! How can I protect my children if I can't keep track of the apps they use online? Once I calmed down, the answer was clear:  I do not need…
,

Which is More Important, Safety or Privacy?

The United States mines data to protect its citizens.  As much as I value my privacy, I'm willing to compromise some privacy in exchange for safety although I recognize this provides opportunity for abuse. See video by by AlJazeera below.What…
, , , , , , , , , , ,

What Social Media Apps and Sites are Popular with Kids these days?

Social media has many positive attributes but there’s no denying potential dangers such as reputation damage and exposure to predators, identity thieves and cyber bullies. New social media sites crop up regularly and it’s challenging keeping…
, , , ,

Private Browsing – How to Surf Incognito

Incognito web browsing is private Internet surfing and it differs from non-private surfing because history of an incognito session does not get saved to the hard drive. When surfing incognito, cache or cookies are not left behind to provide…
, ,

The State of Privacy in 2013

An insightful infographic by HostGator depicts the state of privacy in 2013.The infographic draws attention to the similarity of current privacy to the totalitarian state of privacy described in George Orwell's classic, 1984, which…
, , , ,

5 Reputation Management Techniques for Protecting your Online Privacy

Reputation management is the process of monitoring and controlling how you are perceived online. Damage to your reputation can be self-inflicted, such as when you post a public Facebook status about how much you hate your boss. It can also…
, , ,

Products and Services that Protect Children Online

Recent cyberbullying-related suicides led to several powerful online discussions about effective ways to protect children and teens. (see one introduction below) We discussed ways to teach children to be respectful, responsible and compassionate…
, , , , ,

How to Protect your Child on Social Networks

Protecting our children’s privacy on social networks is an ongoing challenge that begins at a young age and continues after they leave home for college or work. Let’s face it, many kids know more about social networks and technology than…
, , , ,

Was I a Victim of an Online Predator?

One would think that someone who writes and talks about Cyber Privacy and Cyber Safety would be immune to online predators, right? Nope. Wrong! Online predators extend beyond the stereotypical dangerous ones who want to steal private information…
, , , ,

Do you know when apps are posting or tweeting as if they’re you?

A friend asked me if I could explain how a Facebook post in his name appeared in his wife’s news feed when he had no recollection of typing it. My guess was that he likely gave an app permission to post on his behalf and either forgot about…
, , ,

I just became a Phishing Fool

A few days ago I warned readers about phishing scams and today, I became a victim. How utterly embarrassing! Take a quick look at this email. If you're a regular Facebook user, would you question it as a legitimate Facebook notification?At…
, ,

Phishing for Bank of America Fools

Phishing emails are usually easy to spot but that does not mean an intelligent (or busy) individual is safe from becoming a victim of a phishing scam. (Forgive me for using "fool" in the title - it fit nicely with the "f" pronunciation of…
, , ,

How to easily see who is tracking you

As we surf the Web, our browsing habits and personal data are tracked by third parties, often without our knowledge or our permission. As consumers, we want it all.  We want products and services that meet our needs and solve our problems,…
, ,

How to Protect your Smartphone from Mobile Attacks

With increasing popularity of tablets and more than 1 billion smartphone users in the world, access and storage of sensitive data and information via mobile devices has increased dramatically.  Simultaneously,  mobile attacks including device…