, , , ,

5 Reputation Management Techniques for Protecting your Online Privacy

Reputation management is the process of monitoring and controlling how you are perceived online. Damage to your reputation can be self-inflicted, such as when you post a public Facebook status about how much you hate your boss. It can also…
, , ,

Products and Services that Protect Children Online

Recent cyberbullying-related suicides led to several powerful online discussions about effective ways to protect children and teens. (see one introduction below) We discussed ways to teach children to be respectful, responsible and compassionate…
, , , , ,

How to Protect your Child on Social Networks

Protecting our children’s privacy on social networks is an ongoing challenge that begins at a young age and continues after they leave home for college or work. Let’s face it, many kids know more about social networks and technology than…
, , , ,

Was I a Victim of an Online Predator?

One would think that someone who writes and talks about Cyber Privacy and Cyber Safety would be immune to online predators, right? Nope. Wrong! Online predators extend beyond the stereotypical dangerous ones who want to steal private information…
, , , , , ,

Social Media Privacy and Security Tips – Part II

Social Media enriches our lives and connects us instantly and inexpensively with the world, but it simultaneously makes it challenging to maintain privacy. Virtues of Social Media include the ability to express ourselves and to share information…
,

Cyber Security: 2 more Important Ways to Stay Cybersafe – Part II

In Part I of this article, attention was drawn to the importance of avoiding phishing schemes and of keeping all software updated including virus protection and system updates to your computers and other devices. Today, let's discuss two seemingly…
, , ,

Cyber Security: 2 ways to Protect yourself, your Family and your Community – Part I

I recently completed two Cyber Security classes provided by TEEX, a Training and Education Division of the U.S. Department of Homeland Security.  I wanted to learn how local communities prepare for and respond to cyber threats and I hoped the…
, , , ,

How to Prevent Child Identity Theft

Child identity theft is on the rise. The greatest increase has been seen in children under 5 years old but the reality is that child identity thieves are targeting children of all ages. This is because the personal information of young children…
, , , ,

Cyber Security for Home Networks – 5 Important Steps

When it comes to cyber security at home, it’s important to establish a game plan for all household technology users that is realistic and manageable. An updated and thorough game plan can greatly reduce and even prevent identity theft and…
, , , ,

How to Keep Track of Passwords and Usernames

With my rapidly growing list of over 165 passwords and usernames and an increase in mass password breaches, I decided today is the day to seek out a better and a safer way to create and to keep track of my passwords, usernames and other…
Online Dating Safety Tips
, , , , ,

Internet Dating & Relationships: On-line and Off-line Safety Tips

A gorgeous friend signed up on a specialty internet dating site by creating three diverse faux-profiles that ranged from innocent-and-demure to exciting-and-sexually suggestive.  She was careful to avoid authentic information and real photos…
, , , , ,

Guidelines to Protect Children from Online Sexual Predators

While there are obvious virtues to using cell phones and the internet, technology is simultaneously making children vulnerable and exposing them to exploitation and danger. Cyber bullying, gaming, webcams, social networking, sexting, inappropriate…