Once a year you should take time to review and audit your digital hygiene to make sure you’re doing everything possible to protect yourself online. First, make sure you know what we mean when we discuss privacy and security online. Second, take control of your passwords. Third, use two factor authentication to add a layer of protection on top…
Posts tagged "privacy"
Clean out your browser extensions
Once a year you should take time to review and audit your digital hygiene to make sure you’re doing everything possible to protect yourself online. First, make sure you know what we mean when we discuss privacy and security online. Second, take control of your passwords. Third, use two factor authentication to add a layer of protection on top…
How to use two factor authentication to protect yourself online
Once a year you should take time to review and audit your digital hygiene to make sure you’re doing everything possible to protect yourself online. First, make sure you know what we mean when we discuss privacy and security online. Second, take control of your passwords. This post will discuss a layer of protection to…
Three steps to develop a system to take control of your passwords
Once a year you should take some time to review your digital hygiene to make sure you’re doing everything possible to protect yourselves online. One the first steps in discussing privacy and security in online spaces usually involves your passwords. The challenge is that far too many of us have awful passwords, or terrible systems to…
Understanding the differences between privacy and security
As we discuss online rights and freedoms, it is often hard to understand what is meant by relatively simple terms like privacy and security. These two terms are often incorrectly used as synonyms. But, data security is not privacy. Privacy is also not data security. These two terms are often used interchangeably, but there are…
Everything you need to know about encryption but were afraid to ask
Many times we would rather not talk about encryption. It tends to be one of those things that people don’t understand, or would prefer that others take care of for them. We often times think about encryption as a hassle or something we should only talk about when we have something to hide. There is…
What You Need to Know About “Acceptable Use Policies”
As access to the Internet and other technologies become a mandatory requirement of working in a connected society, networks need to protect against misuse of access to the web. Throughout each working day, organizations ranging from corporations to schools and libraries need to prepare for possible misuse by users. Users can be a wide ranging…
Don’t click here: Facebook, algorithms, & articles you’re not meant to see
How well do you trust what you read online and in social networks? It is highly likely that the quality of digital texts and links that you obtain as you read search and sift through the internet has been slowly degrading. This is because without knowing it, something called the filter bubble is sifting…
Noticing and Naming Elements When You’ve Been Hacked
TL;DR version: In this post I document a recent hack suffered by a colleague of a Google Account and gMail. I detail some of the evidence and steps taken to secure the account. Let’s face it, things will now get hacked online. At some point, whether through your own decisions or aggressive moves by an…
Facebook’s Secret Mood Experiment and the Challenges of Living Online
TL;DR Version: This post shares my thoughts about the “Facebook Mood Experiment” and how this relates to online research and the IRB. Finally, I conclude with possible next steps for a free, safe, transparent Internet. Over the weekend, news of the Facebook “mood” experiment was revealed. The truth of the matter was that the results…