Archive for the 'Identity theft' Category

Tips to teach your family to detect and respond to viruses and malware

Monday, February 8th, 2016
In the social network, trust is the currency, and there is always something new to learn about the latest social media apps, changes to the existing most popular social media apps, and the tactics of cyber thieves and criminals to gain our trust and then exploit us. And so it goes with viruses and malware which are scripts and codes and apps designed to exploit individuals by stealing identities from social media accounts and other personal data accounts including banking, and/or to torment through cyber bullying and stalking.

New on-line privacy rules for 2016: What can you & the government do to protect your family’s privacy?

Tuesday, January 5th, 2016
Effective January 1, 2016, the State of California is enforcing new rules for law enforcement to gather personal data, and for manufacturers of devices and web-enabled services, such as smart televisions and parking security services. The aim of the legislation is to protect the on-line privacy and civil liberty of citizens. And while legislation provides some very important safeguards against the abuse of personal data provided by consumers and citizens, the most important privacy measures are learned and enforced at home. This is to provide an overview of the new on-line privacy laws, and reinforce the things we must do at home to protect privacy.

The ‘internet of things’: Preparing for the typical ways smart devices and phones get hacked

Monday, November 9th, 2015
Email hacking is just one of the many ways in which cyber criminals seek to access personal information in order to exploit and plunder. As people become more accustomed to smart devices, every consumer product is web-enabled. The common term for this new reality is the “internet of things”, or IoT. Literally everything from cars to refrigerators and baby monitors are equipped with internet-enabled programming to operate remotely, according to consumer-prescribed settings which enhances convenience (for setting alarms, timing events and enabling remote access) and also introduces an element of risk from cyber hackers.

Simple tips to create & remember secure passwords

Monday, October 26th, 2015
If you sat down to calculate the number of on-line accounts associated with your email and/or phone number, it may be more than 20 - and setting and remembering secure passwords can be a challenge.

Identity theft prevention is a life skill for the modern family: Tips for every parent & child

Monday, October 12th, 2015
Cheryl Cobbins is an identity theft prevention specialist with LegalShield in the Sacramento region, who encourages parents to think about the many ways in which personal data is shared and stored in electronic databases or in social media platforms, and then consider the importance of having access to experts if your personal data gets into the wrong hands. “There are so many ways that people wind up giving personal information through social media,” she said. “A parent sharing a proud moment by posting a picture of their teen with their driver’s license is one good example.”

Teach your child to recognize and respond to email scams

Saturday, September 5th, 2015
Itay Glick is the CEO of Votiro Inc., an internet security services technology firm that specializes in identifying unknown threats embedded in emails and data exchanged in the context of an enterprise network. “The phishing threat is not just a concern for businesses,” Glick said, “Everybody is vulnerable. Phishing emails are sophisticated and contain references that are relevant to the user.” This is what is known as “spear-phishing” scams, which are personalized to deceive.

How to avoid identity theft when giving new devices to your family for Christmas

Monday, December 22nd, 2014
Christmas is a time when many families are making new investments in devices and apps. According to Google, the top searches for Christmas gift purchases are devices and game consoles, followed by wearable gear like FitBit. The most common problem with these new gadgets is the improper disposal or redeployment of the old ones leaving your personal information vulnerable to thieves and bad actors. According to cyber safety experts, deleting files is not enough.

Latest News

Go to Core Connectivity to see current articles and resources.

About Joanna Jullien

Joanna Jullien

Joanna (jullien@surewest.net) and her husband have raised two sons in Roseville, CA. She has a degree from U.C. Berkeley in Social Anthropology (corporate culture). Her honors thesis was awarded the Kroeber Prize and funding from National Science Foundation grant. Joanna writes to help parents with the modern-day leadership challenges of raising children. She is a contributing writer for The Granite Bay View, the Press Tribune, the Sacramento Examiner, and editor of Banana Moments.

More...