It’s easy to buy into the notion that once you wander outside the borders of social media, the internet is an untamed wilderness of anonymity. After all, you don’t use your real name when posting on Reddit or YouTube, do you? The record of your movements through even the tawdriest corners of the web is wiped out of existence as long as you clear your browser history, isn’t it?
You’ve probably heard by now that, in December of 2017, the FCC voted to repeal the net neutrality laws put in place in 2015. What does that mean to you? Net neutrality classified the internet as a utility that could be regulated, and the primary regulation prevented Internet Service Providers (ISPs) in the US from giving preference to certain websites and services while hindering or blocking others. Basically, it required ISPs to treat all internet data equally.
Most children today have already been online by the time they go to their first school; numerous online games and apps encourage them to play while learning. But how can we, as parents, teach our children to be vigilant on the internet? Where do parent…
As the gargantuan crowd gathers in South Korea for the XXIII Winter Olympic games, the whole world will be watching. Of course, just like any large, multi-national event, there will be security concerns and challenges. According to US government offici…
As we enter 2018, I encourage everyone to include a simple resolution on their list: make sure you are well-informed about the technology you use, and avoid getting swept up in false narratives and exaggerated claims about its dangers. Let me be clear: there are genuine threats, but they don’t come from the technology itself. As I always say, technology is agnostic. The dangers come from the bad actors that are willing to use any tool at their disposal, including those in cyberspace, to do harm. Our real target should be combating these forces, not demonizing this or that latest technological development. Education about the realities of our digital world is the best antidote against misplaced fears. And, conveniently, it is also the best way to inoculate ourselves against the security issues that technology does indeed pose.
Data Privacy Day will be celebrated across the globe on Sunday. This is a great time to emphasize the role our channel partners and business customers play in ensuring that employees can work safely, securely and privately online.
Ten years ago, the first Data Privacy Day was held in the US and Canada on January 28. Since then, the National Cyber Security Alliance (NCSA) has commemorated it every year with online privacy awareness efforts aimed at both consumers and businesses. With the recent loss of net neutrality in the United States, this year’s Data Privacy Day takes on greater significance.
We leave a huge digital footprint on Facebook. Did you ever think about what will happen with your data when you pass away? The social giant Facebook has existed long enough to realize that it is part of a human’s life events. We announce the most important milestones on our timelines by sharing with our Facebook […]
We leave a huge digital footprint on Facebook. Did you ever think about what will happen with your data when you pass away?
The social giant Facebook has existed long enough to realize that it is part of a human’s life events. We announce the most important milestones on our timelines by sharing with our Facebook friends the joy of getting married, having babies, or moving abroad. But what will happen with all that data when we pass away? Discussing your digital legacy isn’t pleasant, but it’s important is our reality. Don’t leave it up to your family member, friends, or even worse: Facebook itself. In this article I will guide you through all the options you have, so you can make a conscious decision about your data, using the tools that Facebook offers to its users.
The security stakes only seem to be rising when it comes to the threats that affect us as modern-day consumers. Over the past year, we have seen a list of notable mobile threats that put people’s privacy at risk. Previously unseen vulnerabilities surfaced, such as Certifi-gate and Stagefright, both of which can be exploited […]