Blog

IDrive Review: Are Your Devices Protected?

IDrive Review: Are Your Devices Protected?

If your computer died right now, would you have a backup of all the data you need? How about the rest of your family? Are their computers all backed up? Let’s look at why they…

Protecting Your Children Online Book Review

Protecting Your Children Online Book Review

I’d like to share with you some advice from the book Protecting Your Children Online: What You Need to Know About Online Threats to Your Children by Kimberly Ann McCabe. Note: this page contains affiliate…

How To Choose Parental Control and Internet Filtering Software

How To Choose Parental Control and Internet Filtering Software

If you’re a parent or guardian of minors, you’re aware of the many digital dangers your kids face. Maybe you’ve heard other parents mention that they use parental controls or Internet filters to control what…

YouTube Privacy Guide 2020

YouTube Privacy Guide 2020

YouTube is the world’s second-largest search engine. How many videos have you searched for this week? How would you feel if someone used your device, or hacked your account, and saw the list of videos…

The Smart Girl’s Guide to Privacy Book Review

The Smart Girl’s Guide to Privacy Book Review

I’d like to share with you online privacy advice from the book The Smart Girl’s Guide to Privacy: Practical Tips for Staying Safe Online by Violet Blue. Table Of ContentsThe Smart Girl’s Guide to Privacy…

Digital Privacy and Identity Management (Interview with Katherine Noall of Sphere Identity)

Digital Privacy and Identity Management (Interview with Katherine Noall of Sphere Identity)

Today, we will be discussing things about digital privacy and identity management. I had the privilege of interviewing Katherine Noall, CEO of Sphere Identity, a company that offers a digital identity system. Noall has been…

Avoiding Online Property Scams Completely (Interview with Fireball Approves)

Avoiding Online Property Scams Completely (Interview with Fireball Approves)

I had the privilege of interviewing Steven Paulsen of Fireball Approves, an identity verification service for scam prevention. Below you’ll find the video of the interview, and Paulsen’s answers to my questions about avoiding online…

When Do You Need a VPN (Virtual Private Network)?

When Do You Need a VPN (Virtual Private Network)?

If you’re interested in digital security and privacy, you’ve probably heard about VPNs. Yet many people I talk to are confused about what a VPN is, whether they should use one, and which one to…

The Power of Privacy: Documentary Summary

The Power of Privacy: Documentary Summary

The Power of Privacy is a half-hour documentary by The Guardian, which shines the spotlight on a few modern threats to privacy. It briefly covers the history of privacy, showing how we got to the…

Secure Messaging In 2020: Everything You Need To Know

Secure Messaging In 2020: Everything You Need To Know

Have you ever needed to send someone a confidential message? Financial files to a tax pro? Your garage door code to a friend? A draft of your estate plan to your lawyer? An embarrassing question…

Security In The Digital World Book Review

Security In The Digital World Book Review

I’d like to share with you digital security advice from the book Security in the Digital World: For the home user, parent, consumer, and home office by Graham Day. Table Of ContentsSecurity In The Digital…

How To Use Blind Carbon Copy (BCC) To Protect Privacy In Email

How To Use Blind Carbon Copy (BCC) To Protect Privacy In Email

Today, we’re going to discuss why you need to use Blind Carbon Copy or BCC when you send your emails. Have you ever received a mass email sent to dozens of addresses, with your email…

Venmo Security And Privacy Guide 2020

Venmo Security And Privacy Guide 2020

Venmo is a very popular digital payment app, used by about 27 million people. It’s used for peer-to-peer payments (sending money to friends and family), as well as paying merchants. Most people don’t realize that…

Best Lessons From 6 TED Talks On Privacy And Cybersecurity

Best Lessons From 6 TED Talks On Privacy And Cybersecurity

Have you ever watched a TED Talk, either online or at a TED event? TED Talks are fairly short presentations or speeches on a variety of topics, which are meant to motivate you to take…

PayPal Security Guide 2020

PayPal Security Guide 2020

PayPal is an extremely popular form of digital payment, widely accepted by many websites and apps. In fact, over 254 million people use PayPal! If someone takes control of your PayPal account, they not only…

Lessons from BSides Greenville 2019 Security Conference

Lessons from BSides Greenville 2019 Security Conference

I attended BSides Greenville 2019 on March 30. BSides conferences are information security conferences held around the world. Although the conferences are for professionals in cybersecurity or other areas of IT (or people working towards…

Apple Safari Security And Privacy Guide 2020

Apple Safari Security And Privacy Guide 2020

Apple’s hardware and software protects user privacy more than Google’s. That applies to Apple’s browser, Safari, compared to Google’s Chrome. However, that doesn’t mean that you should simply accept the default Safari settings on your…

15 Social Media Safety, Security, And Privacy Tips

15 Social Media Safety, Security, And Privacy Tips

Have you used a social media site or app today? Facebook, Instagram, Twitter, Pinterest, Snapchat, LinkedIn, etc.? How many times? How many sites or apps have you used? You don’t need me to tell you…

Google Drive Privacy Guide 2020

Google Drive Privacy Guide 2020

Do you use Google Drive? If you use Google Docs, Google Sheets, Google Slides, Google Forms, or Google Drawings, the answer is yes. Nearly 1 billion people use Google Drive. Think of how much of…

Load More