, , ,

How to Create Strong Passwords and General Password Guidelines too

Strong password protection has become critical as we use the internet for just about everything, including shopping, Social…
,

Cyber Security: 2 more Important Ways to Stay Cybersafe - Part II

In Part I of this article, attention was drawn to the importance of avoiding phishing schemes and of keeping all software…
, , ,

Cyber Security: 2 ways to Protect yourself, your Family and your Community - Part I

I recently completed two Cyber Security classes provided by TEEX, a Training and Education Division of the U.S. Department…
, , , ,

How to Prevent Child Identity Theft

Child identity theft is on the rise. The greatest increase has been seen in children under 5 years old but the reality…
, , , ,

Cyber Security for Home Networks - 5 Important Steps

When it comes to cyber security at home, it’s important to establish a game plan for all household technology users that…
, , , ,

How to Keep Track of Passwords and Usernames

With my rapidly growing list of over 165 passwords and usernames and an increase in mass password breaches, I decided…
Online Dating Safety Tips
, , , , ,

Internet Dating & Relationships: On-line and Off-line Safety Tips

A gorgeous friend signed up on a specialty internet dating site by creating three diverse faux-profiles that ranged from…
, , , , ,

Guidelines to Protect Children from Online Sexual Predators

While there are obvious virtues to using cell phones and the internet, technology is simultaneously making children vulnerable…
, , ,

How to Avoid Phishing Scams

I've received several emails that appeared to be from Bank of America but poor grammar and spelling coupled with urgency…
, , , , , , ,

Internet Privacy Issues: Think twice before launching into Cyberspace

It is becoming increasingly easy to get into trouble in the Cyber World with its exponentially diminishing privacy and associated…