The Stay Safe Online Blog
We need to prioritize the importance of developing a comprehensive plan for data privacy and student learning - one that is thoughtful, balanced and comprehensive. We don't want to get this wrong. We can't. Too much is at stake for this and the next generation of students.
It's time for a reality check: complete anonymity online is not possible. The myth distracts people from what they should really be looking for in privacy programs and services: transparency, trust, ease of use, performance and reliability.
Data never dies. And data doesn't have a conscience - this immortal resource comes with significant risk. Time for a closer look.
While constant connectivity has its benefits, the rise of mobile devices and the proliferation of WiFi networks can be a dangerous coupling. In fact, many WiFi hotspot users are unaware of the inherent risks that the technology poses - such as an increased risk of identity theft, hacking and compromised bank accounts.
In today's mobile, connected world, we access the Internet everywhere and from multiple devices as we work, play and travel. This chat will offer ways that you can protect your privacy on the go.
The FIDO Alliance recently held a breakfast event to discuss its efforts to strengthen online authentication, its explosive growth in membership since its inception in 2012 and its recently released specifications. Additionally, the event featured a panel discussion of "the good, the bad and the ugly" of replacing passwords.
Yeah, you got a new computer. So what's next? Securely migrating to a new computer can be done in just 5 steps.
A 2014 privacy study found the most important issue for the majority of Americans is transparency: to understand how a business collects, uses and shares personal information - in conclusion, Privacy Is Good For Business. This #ChatDPD will provide tips to help business better address consumer privacy concerns and avoid privacy practices that are perceived as bad or "creepy" that can also harm your company’s reputation.
The term "Big Data" carries a lot of weight. So what should we think when we hear news reporters and insiders talk about "Big Data"? How can we manage what we contribute to its vast (and seemingly scary) collection of information?
In 2014 there seemed to be a new data breach every week. In these breaches of credit card data, student information, Social Security numbers and corporate intellectual property, the personal information of many businesses' clients and employees was exposed. Here are five priorities to consider for your business as we embark on 2015.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33