New Search

If you are not happy with the results below please do another search

18 search results for: tracking

1

How to easily see who is tracking you

As we surf the Web, our browsing habits and personal data are tracked by third parties, often without our knowledge or our permission. As consumers, we want it all.  We want products and services that meet our needs and solve our problems, but we also want our privacy.  Collusion is a tool that allows us […]

3

Why You Must Manage Your Own Privacy

Consumer Privacy was a hot topic at the world’s largest technology conference, CES, that was held Jan. 7-10 in Las Vegas. Big companies and promising startups showed off their latest inventions to the tech world and while 8K TVs, smart devices and driverless cars were celebrated, the biggest and brightest in technology made Consumer Privacy […]

4

Why You Need a VPN (Virtual Private Network)

Data privacy is a huge concern in today’s digital world. For the average Internet user, it may seem like a necessary evil to share your browsing data with sites like Google and Facebook, but in reality, it is not! Unless you enjoy a complete lack of privacy, why not prevent others from knowing what you […]

5

How to Minimize Your Damage from Inevitable Identity Theft

“It won’t happen to me!” is what many of us think and hope when we hear about other victims of crime. But when it comes to cyber crimes, it’s become a case of when rather than if. “The number of U.S. data breaches tracked in 2015 totaled 781, according to a recent report released by the Identity Theft […]

6

What do you do when you or someone you know has been hacked or spoofed?

I’d like to tell you that I’ve never clicked on a link I shouldn’t have clicked on, but that would be a lie. Do you realize that even a close friend can accidentally give you a virus with an innocent suggestion to download a screensaver, sign a petition, watch a video or read a joke? I’m likely more cautious than many, […]

7

Anthem Breach: 7 Tips to Protect Yourself Amidst Attacks

Whether directly impacted or not, there are things we must all learn from the Anthem breach. The sensitive information that was accessed has provided criminals with the ability to create new lines of credit and to steal the identities of victims indefinitely but there are important steps we can all take to protect ourselves before it is […]

8

Keeping personal information off the Internet

Before I’m hired to remove personal information from the Internet, clients understandably want to know if it will stay off permanently. The reality is that multiple factors can cause personal information to come back. The purpose of this article is to share important behaviors and habits that will reduce the spread of personal information as well as reduce the chance […]

9

What You Need To Know About Spam Emails

Spam is an annoying online problem that can be found in emails, social media posts, group discussions, help forums and article comments. This article pertains to email spam only. Email spam ranges from pleas for financial assistance to seemingly harmless commercial emails to emails that trick recipients into installing malware or viruses on their devices. […]

10

Taking Control of Privacy

There is no doubt there are aspects of privacy that are out of our control, but as discussed in the last post called Privacy we Cannot Control, there are solid options for reducing the impact of privacy invasion. Today’s post reminds us there are many ways to take control of our privacy – it’s not time […]

11

What Social Media Apps and Sites are Popular with Kids these days?

Social media has many positive attributes but there’s no denying potential dangers such as reputation damage and exposure to predators, identity thieves and cyber bullies. New social media sites crop up regularly and it’s challenging keeping up with them, let alone worrying about what children are doing on them. Below are some popular sites that kids […]

12

Private Browsing – How to Surf Incognito

Incognito web browsing is private Internet surfing and it differs from non-private surfing because history of an incognito session does not get saved to the hard drive. When surfing incognito, cache or cookies are not left behind to provide footprints of where the user has been. Fortunately, most popular web browsers offer incognito surfing and it’s […]