I’m presenting several times at TLTCon 2022 later in May. As part of the conference, they’re having some “live” or synchronous sessions where participants and presenters can interact. One of my sessions was accepted and identified as a virtual, or asynchronous session. This means that I put all of my materials together and make them…
Posts tagged "security"
Talking to youth about privacy, security, & digital spaces
As a member of the Screentime Research Group, I’m often asked about how to talk about some of these concepts with youth. These questions usually center on “at what age should I…” or “how do I talk about…” when it comes to parenting in a digital age. As an example, I recently received this question,…
B-Tags, Photos, Technology & Surveillance
My Wife and I ran the Cooper River Bridge Run last April with 27, 461 other finishers. It was our first 10K road race and a goal of ours after finishing several 5Ks. Road races are a big deal in our local area as the weather is “nice” throughout the year. The biggest race of…
Take the time to review and reinforce your digital hygiene
Your safety in digital spaces is of extreme importance. You use digital texts and tools across a number of spaces to conduct sensitive business. This includes manipulating data about your financial, health, personal, and professional worlds. Good digital hygiene is important both at home and at work. A single compromised account or device could result…
Encrypt your devices
Once a year you should take time to review and audit your digital hygiene to make sure you’re doing everything possible to protect yourself online. First, make sure you know what we mean when we discuss privacy and security online. Second, take control of your passwords. Third, use two factor authentication to add a layer of protection on top…
Protect your connection to the Internet
Once a year you should take time to review and audit your digital hygiene to make sure you’re doing everything possible to protect yourself online. First, make sure you know what we mean when we discuss privacy and security online. Second, take control of your passwords. Third, use two factor authentication to add a layer of protection on top…
Review & Revoke Social Logins & Third Party App Access
Once a year you should take time to review and audit your digital hygiene to make sure you’re doing everything possible to protect yourself online. First, make sure you know what we mean when we discuss privacy and security online. Second, take control of your passwords. Third, use two factor authentication to add a layer of protection on top…
Clean out your browser extensions
Once a year you should take time to review and audit your digital hygiene to make sure you’re doing everything possible to protect yourself online. First, make sure you know what we mean when we discuss privacy and security online. Second, take control of your passwords. Third, use two factor authentication to add a layer of protection on top…
How to use two factor authentication to protect yourself online
Once a year you should take time to review and audit your digital hygiene to make sure you’re doing everything possible to protect yourself online. First, make sure you know what we mean when we discuss privacy and security online. Second, take control of your passwords. This post will discuss a layer of protection to…
Three steps to develop a system to take control of your passwords
Once a year you should take some time to review your digital hygiene to make sure you’re doing everything possible to protect yourselves online. One the first steps in discussing privacy and security in online spaces usually involves your passwords. The challenge is that far too many of us have awful passwords, or terrible systems to…