The Stay Safe Online Blog
Jeff Bermant, Founder and CEO of Virtual World Computing, offers a number of tools and tips to provide for safe web browsing and to protect children from victmization, online and off.
Amy Hebert, Consumer Education Specialist at the U.S. Federal Trade Commission, offers the infographic on children and mobile safety, "Keeping Up with Kids' Apps." It includes four things your kid's apps might do -- but might not tell you.
Identity protection firm CSID and the U.S. Federal Trade Commission joined STOP. THINK. CONNECT. for a Twitter chat to discuss how parents can combat a growing but relatively underreported cybercrime: child identity theft.
Michael Waksman, CEO of Jetico, a company that provides military-standard data protection software to the U.S. Department of Defense, offers his tips on how exactly to make your passwords 'long and strong'.
Digital industry leaders from RSA, Microsoft, AT&T and others answered questions about information security issues during a Twitter Chat from the RSA Conference in San Francisco. For more information, visit: http://stopthinkconnect.org/get-involved/twitter-chats/
Bobbie Stempfley, acting assistant secretary for cybersecurity & communications for the U.S. Department of Homeland Security, discussed cybersecurity workforce development, the importance of the STOP. THINK. CONNECT. campaign, and online safety and security issues from the RSA Conference in San Francisco.
As a user, if you have never taken Facebook's impact on your privacy, reputation and security seriously, it's now time to do so.
When you work with personal data on a Windows computer, your privacy and identity are at risk. We will show you a few basic things you should keep in mind, to make sure your privacy and identity are always protected.
We recently joined STOP. THINK. CONNECT., Holland & Knight, InfoSight, ISACA and the U.S. Department of Homeland Security for a Twitter chat about privacy & small business. Here's a partial transcript of the chat..
As businesses and organizations upgrade to the newest wireless devices, every day thousands of used mobile devices are being replaced and companies run the risk of inadvertently compromising confidential internal information contained on these devices.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27