1 in 10 Children Are Victims of Identity Theft [Infographic]

Child online identity theft

I've never thought that children would be at risk for online identity theft, but it turns out, they are actually at higher risk! Children are targeted up to 35 times more. With 10% of kids becoming online identity theft victims, you will want to make sure you follow these six simple steps towards safeguarding your children's online identity: ... Continue Reading

How Secure Are Your Passwords? [Part 4,645,978]

password

Remember the silly passwords web security pundits have been worrying about for years? The ones people have finally abandoned? Yeah, let's talk about that. "Password" is no longer the most popular password. According to industry heavyweight SplashData, it's the second most popular password, having been bumped by the 6-digit ironclad option of "123456" in the last year. In other words, feeble passwords still rule the roost. The data is sourced from the infamous Adobe breach, and reveals some ... Continue Reading

The Internet Cookie-Less Monster [Infographic]

Cookie-Less Monster Infographic

Whenever someone comes onto your church's website, I hope that you are collecting analtyics. But for those that do not know, so much of your user information is being collected with Internet cookies. But now with the new hype of electronic fingerprint access into everyday devices like your phone and laptop, instantly the issue of privacy becomes a problem. And let's be clear, Apple does not have to store your data for the NSA to get, they only need to look at the cookies that tie into your ... Continue Reading

The Tech Battle for Your Teen’s Heart: Teachable Moments [Part 4]

Teens and Technology

[This is part four of The Tech Battle for Your Teen's Heart series. Be sure read parts one, two and three!] Even with the parental control tools available to protect your kids online, it can still seem like a battle to get those tools in place.  If these are in place from the time your teens start using technology, then it is much easier.  However, it is more likely the case that they are already online and will be opposed to you adding any new boundaries to their use of the internet.  This ... Continue Reading

The Tech Battle for Your Teen’s Heart: Parental Controls [Part 3]

Teens and Technology

[This is part three of The Tech Battle for Your Teen's Heart series. Be sure read part one and part two.] New technology, websites, apps, and gadgets are released every day where undiscerning teens might get themselves into trouble.  In recognition that it often seems like an endless battle to stay current with the technology that your teens are probably using, here are some of the most effective ways to set up parental controls for your family. ... Continue Reading

Facebook Privacy and Security [Infographic]

facebook privacy security settings

Facebook. It happens. I am surprised, more and more, how many people are willing to hand-over their Facebook privacy. Most of it has to do with education, as many people are unknowingly handing it over every time Facebook updates its policies. The infographic, below, really outlines how Facebook is used and how to keep yourself protected. Be sure to study the do's and don'ts and make sure your teens have appropriate privacy and security settings as well. ... Continue Reading

Vogue Gets Gloriously Hacked!?!

VogueHacked

It's rare when something brings me so much simple child-like joy but this morning I saw something that was just amazing! I don't know if this is a case of hacking, disgruntled employee tinkering, some sort of weird strategy on Vogue's behalf or just one epically glorious Easter Egg - either way the irony is rife! ... Continue Reading

Tech Wreck Tuesday #9: Go Big or Go Home

keycard

My undergraduate degree was in Computer Engineering which meant that by my senior year, spending the night in a computer lab of compiling code, testing the execution, and debugging the program was a common occurrence. I loved spending that time in the lab as I have fond memories of finding solutions to complex problems and eventually creating a final program that has a very specific use. One of my most favorite memories is when I unintentionally knocked out the power of the whole university ... Continue Reading