The Stay Safe Online Blog
Almost anything we do can now be done over the Internet: pay bills, shop for appliances, go banking, apply for jobs or make appointments. But these websites with your personal information in their databases can be potential threats as well. So how can you protect your identity?
Safer Internet Day (SID) is a global initiative organized by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. This year, SID is on February 10. Join us as we talk about online safety for #SID2015 and what you can do year-round to keep yourself and your family safer and more secure online.
Passwords have been used for thousands of years. They are still here today, though, and have proved their staying power.
In honor of Data Privacy Day, NCSA and the Georgia Institute of Technology's Scheller College of Business and School of Interactive Computing held an interactive, lively and revealing conversation with leading technology and privacy experts. The discussion centered on the future of health privacy and the pioneering technologies that are changing the game.
It may sound ridiculous at first, but a strategic deployment of the most common and visible form of personally identifiable information - the humble email address - might be enough to send a would-be identity thief packing to an easier mark.
Here are 10 ways to safeguard your information from the most common threats and vulnerabilities that put you, your family and your office at risk.
An anonymous, unnamed CEO for a popular transparency company whose mascot is a ghost is fond of saying "running a business these days would be easy - if it weren't for all the people and computers." It's a joke meant to add perspective to everyday problems - but it can also apply to just trying to comfortably exist in the "Information Age."
We need to prioritize the importance of developing a comprehensive plan for data privacy and student learning - one that is thoughtful, balanced and comprehensive. We don't want to get this wrong. We can't. Too much is at stake for this and the next generation of students.
It's time for a reality check: complete anonymity online is not possible. The myth distracts people from what they should really be looking for in privacy programs and services: transparency, trust, ease of use, performance and reliability.
Data never dies. And data doesn't have a conscience - this immortal resource comes with significant risk. Time for a closer look.
While constant connectivity has its benefits, the rise of mobile devices and the proliferation of WiFi networks can be a dangerous coupling. In fact, many WiFi hotspot users are unaware of the inherent risks that the technology poses - such as an increased risk of identity theft, hacking and compromised bank accounts.
In today's mobile, connected world, we access the Internet everywhere and from multiple devices as we work, play and travel. This chat will offer ways that you can protect your privacy on the go.
The FIDO Alliance recently held a breakfast event to discuss its efforts to strengthen online authentication, its explosive growth in membership since its inception in 2012 and its recently released specifications. Additionally, the event featured a panel discussion of "the good, the bad and the ugly" of replacing passwords.
Yeah, you got a new computer. So what's next? Securely migrating to a new computer can be done in just 5 steps.
A 2014 privacy study found the most important issue for the majority of Americans is transparency: to understand how a business collects, uses and shares personal information - in conclusion, Privacy Is Good For Business. This #ChatDPD will provide tips to help business better address consumer privacy concerns and avoid privacy practices that are perceived as bad or "creepy" that can also harm your company’s reputation.
The term "Big Data" carries a lot of weight. So what should we think when we hear news reporters and insiders talk about "Big Data"? How can we manage what we contribute to its vast (and seemingly scary) collection of information?
In 2014 there seemed to be a new data breach every week. In these breaches of credit card data, student information, Social Security numbers and corporate intellectual property, the personal information of many businesses' clients and employees was exposed. Here are five priorities to consider for your business as we embark on 2015.
#ChatDPD Twitter Chat Transcript: Make a New Resolution: Stay On Track While Protecting Your Health Information
Your health, physical activity and eating habits are some of the most personal and sensitive details about you and your lifestyle. Most of us are unaware, however, of all the places our data may end up on a given day. Join us for another #ChatDPD to discover your health data's journey in our digitally-connected world and learn steps you can take to protect your privacy.
EDUCAUSE and the higher education community were active participants in NCSAM 2014. Colleges and universities have continued to offer fun, creative cybersecurity and online safety activities and events for students, faculty, staff and their local communities. Here are a few highlights.
Privacy is a personal notion - we all have different ideas of what it means to properly manage information about who we are and how we behave. We've gathered a few interesting points about worldwide privacy legislation which show that how much others know about who you are can depend largely on where you are.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33