New Search

If you are not happy with the results below please do another search

39 search results for: passwords

25

6 Social Media Privacy and Safety Tips

I am a huge fan of Social Media but I dislike it when privacy or safety are compromised by private photos and information being shared accidentally or maliciously. My own tales include identity theft, credit card fraud and being reprimanded by relatives for posting and tagging vacation photos. I thought they’d enjoy seeing our photos […]

26

How to Secure your Smartphone and Increase Your Mobile Security

As smartphones increase in popularity, threats to privacy grow too.  We enjoy the convenience of using our phones for online banking, shopping, email, social media, web browsing, storage of personal information and keeping track of our schedules however these conveniences make us vulnerable if our devices are accessed by others.  Losing or having our phones […]

27

Internet Dating – 5 Ways to Stay Safe Online

When it comes to online dating, it’s obvious, but I’m going to say it anyway. People lie! Some do it to protect themselves or to appear more desirable and others seek dishonest financial gain. Predators and stalkers can pose as people of all ages and Law Enforcement may create fake profiles to capture criminals or to protect […]

28

Cyber Security: 2 more Important Ways to Stay Cybersafe – Part II

In Part I of this article, attention was drawn to the importance of avoiding phishing schemes and of keeping all software updated including virus protection and system updates to your computers and other devices. Today, let’s discuss two seemingly obvious inappropriate things that many of us do anyway because we don’t think anything will come […]

29

How to Avoid Identity Theft – Prevention is so much Better than Cure

When it comes to Identity Theft, I unfortunately write from a position of experience.  The good news is that in spite of having to cancel my personal credit card after someone enjoyed a $5,000 shopping spree in New York with a counterfeit duplicate while I was in Los Angeles, my identity is still intact.  The […]

30

Security and Privacy Tips for Twitter Users

The main purpose of Twitter is to help users share information with the world.  That means this information is intended to be public and it can even be shared with people who do not use Twitter.  The type of information that is shared includes the messages you Tweet, the time of day you Tweeted, lists […]

31

How to Avoid Cell Phone Identity Theft

Smartphones including iPhones and Androids are growing in popularity, and as a result, cell phones are becoming a rapidly increasing target of identity theft.  These phones have an ability to store vast amounts of personal information and with all of the new apps out there, you can do almost anything on your phone that you […]

32

How to Prevent Child Identity Theft

Child identity theft is on the rise. The greatest increase has been seen in children under 5 years old but the reality is that child identity thieves are targeting children of all ages. This is because the personal information of young children is usually legitimate and less likely to be tainted. Additionally, using a young child’s identity […]

33

Cyber Security for Home Networks – 5 Important Steps

When it comes to cyber security at home, it’s important to establish a game plan for all household technology users that is realistic and manageable. An updated and thorough game plan can greatly reduce and even prevent identity theft and infection from computer viruses and malware. Everyone  must understand the plan, what risks you want to […]

34

Chase Phishing Scam Close Call

I usually get phishing emails from Bank of America, but today I got an alert from Chase that almost had me fooled.  Following my own advice from a previous article, How to Avoid Phishing Scams , I logged onto Chase on-line by typing in the URL address instead of clicking on the embedded email link.  If […]

35

Internet Dating & Relationships: On-line and Off-line Safety Tips

A gorgeous friend signed up on a specialty internet dating site by creating three diverse faux-profiles that ranged from innocent-and-demure to exciting-and-sexually suggestive.  She was careful to avoid authentic information and real photos as she wanted to keep her true identity private.  Before long, she went on a hot date with a tall, dark and […]

36

Electronic Trails and Footprints – Privacy Pros and Cons

After buying a dishwasher from a local appliance store, I purchased an anniversary gag gift from the Hustler store for friends that love a good prank.   However, it was my friends who ended up with the last laugh after an employee at the appliance store stole the credit card numbers of many customers, including mine.  […]