The framework provided by the Center for Media Literacy presents educators and students with a way for understanding how systematic companies are with obtaining information and how we as consumers need to be responsible participants in this ongoing dynamic. The five key concepts and questions of authorship, format, audience, content and purpose are gateways for a broader discussion on mediated environments.
“Apptitude” isn’t just about being able to use technology; it’s also about knowing how to use it responsibly.
This #ChatSTC Twitter chat discussed how you can take security precautions and protect your personal information as the world of cutting-edge technologies continues to grow.
Oct. 31 is the last day of National Cyber Security Awareness Month, and as the month comes to a close we hope you will continue to promote a safer, more secure and more trusted internet all year long. The National Cyber Security Alliance has online safety materials that you can share at home, at work and school and in the community.
For the fifth year in a row, the National Cyber Security Alliance (NCSA) and Nasdaq partnered to host their Cybersecurity Summit in honor of National Cyber Security Awareness Month (NCSAM) on Monday, Oct. 24.
As customers balance the increasing need to use connected devices with the risks of losing touch with where their personal information is going, they will have a harder and harder time determining where to draw the line between protection and enablement of our technology-driven, day-to-day lives. It's a company's responsibility to protect customer information with adequate security and privacy measures.
The State of Our Connected Lives’ Devices: Understanding the Security Risks & How to Defend Against Them
The proliferation of connected devices is staggering. As the use of these connected devices in our everyday lives continues to increase, it’s important that we all understand the potential security risks associated with our connected lives and how to better protect ourselves and our families against these potential threats.
As the Internet of Things grows, it’s important to think about the personal information you are providing to the devices you have now and the ones you might adopt in the future and how that information is collected, managed and stored.
Do you think an abusive partner or ex is monitoring you through your phone? They might be using stalking apps (spyware) that secretly track your devices. Here’s information about what stalking apps are, how to tell if they’re on your device, and what to do if they are.