Tips for securely managing online accounts

In a previous post I gave examples of how I was given access to other people’s personal information because they used the wrong email address on their accounts. (Read the full story here.) Every piece of personal information in an online account is a piece of information at risk of being shared through mistakes or malicious … Continue reading Tips for securely managing online accounts

List 22: Parenting tips I wish I knew earlier

Although I have almost four years of experience in parenting I often feel that I have no idea what I'm doing, but I'm learning. In honor of my sister-in-law who could have a baby at any minute and my numerous friends who are pregnant or have recently given birth or adopted, here are a few … Continue reading List 22: Parenting tips I wish I knew earlier

Facebook Privacy: You should worry more about people than policies

Facebook users have until December 10th to vote on proposed changes to that site's Data Use Policy and Statement of Rights and Responsibilities. You can vote here. Although I think its great that people that are being given the option to voice opinions from a company that has been harshly criticized for making sudden changes … Continue reading Facebook Privacy: You should worry more about people than policies

Combatting Twitter Spam and Facebook Leaks

Although my list of 40 information security tips may seem long, there were many things that had to be left out, so to close out my security-themed week here are some additional tips for Twitter and Facebook. In my original list I addressed not clicking on links in suspicious email. The same goes for direct … Continue reading Combatting Twitter Spam and Facebook Leaks

List 5: Information Security Basics

If you haven't heard about how Mat Honan's digital life was erased by hackers in less than an hour, you should read his story here. It's chilling. He lost data saved on the Internet (that venerable cloud) and on his iPhone, iPad and MacBook, including irreplaceable pictures of the first year of his daughter's life. He … Continue reading List 5: Information Security Basics