6 Ways College Grads can protect their online reputation

5:48 PM Add Comment
6 Ways College Grads can protect their online reputation -

These days, it is crucial for college graduates seeking employment to have an online reputation that is as clean as a whistle. I'm online security and identity theft expert, so trust me when I say yes, employers do take into account what you have done to this party during your second year.

This is what you, the new college grad, can do to clean and protect your reputation in the online world.

How College Grads can clean up their online reputation

A potential employer is likely to Google your name and see the sites of this is on. And do not assume that you are somekind "Joe Smith" name. An astute employer find the right Joe Smith.

One of the first things a new college graduate should do to prepare for a job interview is to prepare for what the hiring person is likely to do so (before or after the interview.): you look online

see what people say about you in cyberspace. Use a tool like Google Alerts, Topsy, Social Mention and Sysmosys, among others. Monitor them on a daily basis.

If your search returns nothing wrong with you on Facebook, Twitter, YouTube, LinkedIn and other biggies, that does not mean there is anything wrong. Go further in search results. Type your first name or just initial, or associative fact, as the name of his hometown, to see if that alters the results.

Cleaning your online reputation, then, begins see if it needs to be cleaned in the first place. This is more important for a college graduate than, say, get that perfect manicure for job interviews or work perfect hair coloring.

The prospective employer these days may be more interested in what your name comes up in the search engines that your shoes perfectly coordinated way is with your power suit.

digitally Being proactive keeps your own online presence.

  1. digital security is a must. We have all read of politicians, celebrities, news organizations and large companies that have been hacked and negative things was released from their accounts. Even when you regain control of your account hacked, these unwanted messages can leave the searchable breadcrumbs. Make sure your devices are protected by antivirus, antispyware, antiphishing and firewall. If you access the free WiFi connections, make sure you use Hotspot Shield VPN for secure online communications.
  2. New college graduates should invest time picking out their Facebook page and any other type of social media where they have the ability to change what is on it. Delete everything about drinking, sex, drugs, being tired all the time, political and religious views, using offensive words, anything that fails to take advantage of your online reputation.
  3. Same comment as "Older people are bad drivers" can kill your chances of landing a job. Think before posting.
  4. Unfortunately, if someone posted something negative about you on their blog, there's nothing you can do unless you want to pay something like $ 2,000 to hire a company to hit negative results deep in Google search pages (a prospective employer probably will not go beyond a few pages long once they locate information about you). But someone pay is a viable option that you should consider.
  5. A university graduate can protect their online reputation by never use their name when signing a forum board where they can make posts which, to a prospective employer, do seeker job look bad. If you want to display on the comments page for Fox Sports, for example, do not use your real name.
  6. Do not even use your real name to sign on support sites for medical conditions, for that matter. You never know what can rub a prospective employer the wrong way.

The reputation of the college grad should appear as perfect and "pure" as possible in the online world.

Combining How Big Data & The Internet of Things Could End All Privacy

4:47 PM Add Comment
Combining How Big Data & The Internet of Things Could End All Privacy -

It is a scary thought, but who sees all, knows all eye of Big Brother could become part your life sooner than you might think. More and more electronics are coming equipped with the ability to transmit personal information, and storing this information in massive databases is increasingly pervasive.

According to a blog published site of the ACLU, policy advisors within the FTC concerned that "these databases include new waves of data - maybe your home or the location aware information of commercial sensors. - and thus become increasingly consolidated "your life once private could soon be released to the masses online, whether you like it or not. With privacy in mind, here are some ways Big Data and Internet of Things could join forces to have access to your personal life.

The Internet of Things in a Nutshell confidentiality

If you think back to all those science fiction movies you watched as a child, things like tracking microchip implants and devices retina-scan probably come to mind. The Internet of Things has been integrated into the public consciousness, in fact, since the first computer has become part of our technological zeitgeist in the 1940s

In more realistic terms, the Internet of today things usually refers to the accessibility of various electronic devices via the Internet, thus forming an information-sharing network. Although this is not a surprise to people who make Internet devices equipped and WiFi-enabled part of their daily lives, the transmission of personal data is filtering into every part of private business consumers.

Nowhere more apparent than in the home automation technologies - just look at Google's acquisition of Nest in January for an example of the value of these data. Although Nest says that the data will only be used to improve its own products and services, technology commentators remain skeptical and say the Internet giant plans to all users data to me on these devices, although perhaps be anonymous.

When you register for an account online and delve into the field of social media, then you are inevitably share a small part of your private life with the Internet. But the Internet of Things could share your private information without you knowing, from devices that you do not even know was on a network. And with Big Data on its side, there is no end to the interruption of privacy.

Big Data at a glance

The Cloud represents the networking capabilities of the Internet and Big Data includes incalculable amounts of data transmitted. In terms of data management, text each bit, each video, and every last photo on the Internet needs a place to go. These terabytes and terabytes of data are valuable collection sets that are generally referred to as "Big Data."

These sets of collection are stored in massive databases that Paul Ohm Harvard Business Review calls, "databases of ruin." The data sets are stored for extended there, often interminable periods of time and they are accessible by more users than you might think. In most cases your privacy online is safe, but as the Internet of Things gathers more and more of your personal information, the data collection will grow together with the accessibility of the data.

The combined powers and means for your privacy

forces In many ways, the Internet of Things and Big Data are already joining. In fact, your smartphone, tablet, and computer to transmit your personal information every day a secure location to another, but this is usually at your request.

For example, when you sign up for an account at an online retailer, address, email, and form of payment are usually stored in a database, in case you want to make another purchase at a later date. This is an example of the Internet of Things and Big Data work together to make your life easier.

But there are also millions of cases of sharing unwanted information that might affect your privacy and security online in many ways. One such example, quoted in an article Forbes published last year, involves the use of a target by analysis program that predicts the teenage pregnancy before his family even knew. And while the use of Big Data by companies is currently very limited, the implications of the combination of Big Data and Internet of things in the years to come is really amazing.

Big Data and Internet partnership objects is already at work

with all this talk about invasions of privacy, you are probably looking for some concrete examples of just how IoT and Big Data share your online presence with the digital world. Well, here are some examples of how the partnership is already in full force:

  • IP Addresses - the IP address of your computer is the way to track your every move on the Internet. Every site you visit, every email you send, and all comments you post is associated with your IP address. Unless you use a VPN service like Hotspot Shield, some of the data provides your IP address will be collected, cataloged, analyzed and stored without your knowledge
  • Cookies -. The kind you eat are harmless, but the kind on your computer can allow others users track your online habits. For example, if you are looking for a certain pair of boots online and suddenly every ad on every website you visit is the exact pair of boots you need, this is due to sharing of data as Web browser cookies of
  • social media -. Even if you set your profile private parties providers use your social media accounts to find out exactly what type of consumer you are. The next time you visit Facebook, pay attention to banner ads and sponsored posts. If they relate to your interests, then it just another way Big Data and the Internet of Things enjoy privacy
  • Smart Devices -. Your smartphone can know more about you than your own mother, but some smart devices turns your personal information to third parties. Your smart thermostat, your smart refrigerator, even smart meter in your home collects information about your daily habits of energy consumption for use by third party suppliers.

The other side of the digital coin

Big Data and the Internet of things unite their forces are not all bad news. In fact, the transmission and storage of your personal information often improves your online life. When combined with effective analysis and data management, Big Data and the Internet of things can help improve many things in your daily life.

For example, Big Data, with the help of the Internet of Things, helps companies better understand your spending habits, it optimizes storage of your medical records. Commentators also speculate that this coul help the NSA to keep the United States safe from potential terrorist plots, and help credit card companies and banking institutions to keep your financial information from cyber criminals hands and identity thieves.

But, as we have already mentioned, the potential downside is also signficant. According to the blog ACLU cited above, "Chances are Big Data and the Internet of Things will be more difficult for us to control our own lives, we grow increasingly transparent to powerful companies and government institutions that are becoming more opaque for us. "However, only time will tell exactly how many really big data and the Internet of things will impact your privacy.

Facebook Safety for Parents and teens

3:46 PM Add Comment
Facebook Safety for Parents and teens -

Facebook offers a lot of security measures that parents and teens should know.

The Connect

  • social authentication - a hacker will have a harder time hacking your Facebook account if he or she must identify your friends via Photos - This verification process is social authentication, and it is easier to use than having to remember another password
  • ID verification -. a new user must create a security question with an answer. An extra layer of security is achieved when the user adds their smart phone number so they can receive a text message with a code
  • Once the password - You can get a password- time. simply send a text to 22605.
  • Log approval - Suppose someone logs into your account with an unknown device. A code will be sent to your mobile. The user should check the next time they login try to connect in
  • Session classifier - .. Each connection is checked with details such as your device and the location

prices

  • classifier implementation -. This checks the activity of the application to see if it is suspect
  • classifier user action -. It detects when the user behavior is suspect
  • Link scanner - Every day, Facebook scans over a trillion links. Each link is compared not only Facebook but also other Internet security companies databases of malicious links and spam known
  • Photo DNA -. 300 million photos are uploaded to Facebook every day and Facebook compares these to its blacklist database of images from international, federal and state law enforcement

The Logout

  • Hacking suspicion -. If you think something fishy, ​​you can manually shut Facebook down and reset your password
  • Log alert - .. you can approve the device you use to log in, if you can get a security notification if you are connecting from an untrusted device
  • Guardian angel - If you can not access your account, your friends can receive a code. Then pre-select these individuals in the account settings page of
  • Roadblock -. Your profile will be locked by Facebook and scanned with security software, if your account is infiltrated by malware. A cleaned-up account will be certified by Facebook.
  • remote disconnect is available.

considerations for adolescents

  • The setting age - Many children lie about their age on social media. Ask your child Connect to Facebook and go to the "About" page profile to ensure that their date of birth is correct
  • Loving ad -. You warn children about what can happen if they "like" an ad. Like an ad will likely result receive updates to the ad page, and the user name could be associated with future interpretations of the announcement. Does your teen want? Ask your teen how important it is for them to "like" an ad just because the announcement this function
  • Unliking -. Once you "like" something, does not mean you can not unlike him. To find out what your teenager loved, visit the profile page and click on "More", "Likes" and "Other Likes" Hover in the upper right corner. a pop-up box will mean a choice to be different. Learn apps from your teenager by going to the main page of Facebook to click on "Apps" on the left side of the news feed. Here you can disconnect applications
  • Flag announcements -. Think an ad is inappropriate? Flag by clicking the small "X" or the down arrow at the top right of the ad unattractive. Click "I do not want to see it" and "It is offensive or inappropriate," then click reason.

Free game can mean unwanted software free. Tell your teens that downloading a free game can also download lots of unwanted clutter.

Although Facebook now uses SSL encryption with connection and user sessions, it is always a good idea to use an additional protective layer on wireless sessions. A VPN encrypts your entire Web browsing on a site, regardless of its security settings.

How Internet Security Shifted landscape in the first quarter 2014

2:45 PM Add Comment
How Internet Security Shifted landscape in the first quarter 2014 -


The good news is that the observed Internet attack traffic fell in most countries during the first quarter of 2014. the bad news is that the United States has risen to second in the world after China, as a source of attack traffic. The latest State of the Internet report from Akamai Technologies identifies these and other trends in Internet security and speed.

Akamai's Internet content delivery network US and the creator of the platform Akamai Intelligent, which provides more than two trillion Internet interactions and protects users from multiple distributed denial of service (DDoS ) every day. This platform is internationally distributed network, enabling the company to monitor the status in the world of the Internet. Here is how the Internet security landscape of the first quarter 2014 compared to the last quarter of 2013.

The geography of the attack of the changed traffic

According to the report, the geographical distribution of hackers continues to grow. During the first quarter of 2014, Akamai has identified attack traffic originating from 194 countries / regions, which is six more than the fourth quarter of 2013. The total concentration of attacks has decreased significantly compared to the fourth quarter 2013, the first 10 countries produced 75 percent of reported attacks, a decrease of 88 percent over the previous quarter.

again, the No. 1 source of attack traffic was China, which is a huge 41 percent of observed attacks. While China clearly remains a haven for pirates and black markets, countries attack the volume of traffic is slightly down from 43 percent at the end of 2013.

Most countries have seen decline of the attack traffic

most countries included in the report experienced modest declines in the attack traffic, but a handful of countries have seen massive increases. The United States, where the second largest amount of attack traffic originated, was down 40 percent in the staggering attack traffic compared to the previous quarter. The United States accounted for 11 percent of observed attacks, down from 19 percent in Q4 2013. Third, Indonesia accounted for about seven percent of observed attacks, which is an increase of 5.7 percent in the fourth quarter of 2013.

by far the steepest fall of attack traffic belongs to Canada, which fell from third place to 30th place in the first quarter of 2014 to during the fourth quarter of 2013, Canada has seen an increase of 25 times compared to the previous quarter, which catapulted to third place. Now, less than one percent of attack traffic comes from Canada, compared with 10 percent a year ago.

experienced increases large enough to lift the

quarter after quarter, South Korea, Turkey and India all top 10 volume Quarterly attack traffic also increased in Brazil, Romania and Russia.

The most frequently Ports targets 445 and 5,000 pirates

While Port 445 (Microsoft-DS) remains the most popular target for hackers, accounting for 14 percent of observed attacks, the report suggests that it is getting out of fashion. Port 445 was down 50 percent in volume of attack traffic as compared to the previous quarter. However, Port 5000 (Universal Plug & Play / UPnP) has experienced explosive increase in the volume of attack traffic, with numbers rising over 100 times from Q4 2013 to 12 percent in total.

According to the Internet Storm Center (ISC), the rise in Port 5000 attacks could be the result of Bitcoin mining malware infecting Hikvision DVRs, often used devices to collect video surveillance equipment. In the report from Akamai, it is said that the ISC speculates that the malware is sensitive to the research "devices to infect with a real feat to come later" (p. 5). Important quarterly declines in the order 40 to 50 percent were held with most ports in the top 10, with port 23 (Telnet) is the only port that saw a quarterly increase of attack traffic.

attacks on Port 445 has decreased overall

port 445 becomes less and less targeted in most countries, Q1 2014 Q4 2013, Port 445 is the most-attacked in six of the 10 countries harbor against only four in the 1st quarter of 2014 (Romania, Taiwan, India and Russia). Port 445 was the second most targeted harbor Q1 2014 in South Korea, Brazil, and the port of the United States 5000 was the most-attacked port in China, Turkey, Brazil and South Korea, and the second most targeted port in Romania and India.

quarterly decrease, an annual increase of DDoS

DDoS attacks are an attempt to make a network resource or inaccessible device users. The first quarter 2014 saw a significant decrease in reports of attacks by clients of the previous quarter, with 283 reported attacks compared to 346 in Q4 2013. Despite the quarterly decline of 20 percent, reported attacks still up 27 percent from a year ago.

Geographically, North America accounts for 49 percent of total attacks, the Asia-Pacific region to 31 percent, and Africa and the Middle East for 20 percent. The region Africa and the Middle East was unique in that it has increased 50 percent in the attacks of the previous quarter.

New Threats Surfaced

Two increased threats have emerged in Q1 2014, Akamai reported an increase (NTP) and Network Time Protocol reflection WordPress XML-RPC attacks pingback. February 2014 saw more activity because of DDoS amplification attacks NTP. Hackers spoof an IP address and send a request to a sensitive NTP server, which produces a huge amount of response data to the wrong address.

Such an attack can overwhelm the network links, preventing legitimate traffic to reach the destination. Similarly, in March 2014, hackers have begun to conduct DDoS attacks using exploits WordPress pingback XML-RPC, which Akamai has helped thwart encouraging webmasters to disable the function of pingback.

In general, the State of the Internet report paints a positive picture for the Internet landscape for the first quarter of 2014. Internet becomes faster; while attacks come from several countries now, the entire attack traffic decreased worldwide.

However, concerns persist about creativity evolving pirates, targeting different port and to design new exploits to block websites and block legitimate traffic. For this reason, more than ever as a buffer between users and enterprising pirates state-of-the-art protection of Web security and prevention.

Your search history might be making the cost of your next vacation!

1:44 PM Add Comment
Your search history might be making the cost of your next vacation! -

There are few things quite as satisfying as securing a lot of travel. You are giddy with excitement that you anticipate your journey ahead. But did you know that someone else had bought the same seat on the same flight or guaranteed a similar room in the same hotel and paid a lot less for it, simply because they had been browsing through different websites ?

your browser history could take really how to get the best deals? It does not seem fair, but experts say that this happens more often than you think.

How different are the prices?

According to USA Today, we are not talking about small changes in prices here. Way back in 07, it looks for a major travel website for flights to New York City to Sydney. Journalists from the paper used two different browsers :. a stripped cookies and one that had been used to buy several flights in the past

The authorized browser offered a range of prices ranging from $ $ 1770-1950. The second browser did not return fares $ 2,116, a hefty $ 346 more than the lowest fare on the erased browser. A spokesman of the company for the travel provider has insisted there is "no user differentiation" based on purchase histories, but the evidence seems to suggest otherwise.

Internet History still driving Up Price

While USA Today conducted its study in 07, there is anecdotal evidence suggests that the history of the Internet is still driving prices. last year, Johnny Jet renowned travel blogger wrote about the price of a ticket from Los Angeles to Las Vegas on American Airlines website using Safari. He put $ 159 round-trip ticket on the waiting 24 hours service Free American Airlines so he can think about his plans further. He returned to the site the next day to discover the price had jumped by a whopping $ 189. This represents an increase of more than twice the price !

Unimpressed with rising prices, Jet decided to try the same search in Internet Explorer, which could trace its history to the site. Its intelligent switch browser saw the ticket back to the original price of $ 159.

The psychology behind Hiking Rates

It is believed that American Airlines and other websites that use this practice trying to browsers believe demand for flights has pushed up prices for their last visit. Consumers are led to believe that if they do not buy now, at the higher price, then they can miss quite a price. Airlines do not count on buyers verify this information and often pocket a lot of extra cash by playing on the emotions of their clients.

Shop Smarter Travel for

Consumers should not blindly accept these additional costs, however. There are several tactics that can help travelers get the best rates.

As with most purchases, it rarely pays to shop on impulse. Shopping around and display of prices on a range of travel sites to help you sniff out the best deal. Do not just assume that the third party travel sites offer the best deal is. In many cases, own brand site of an airline may offer discounts, so be sure to visit to see if there are lower rates.

Also make sure you scroll through the search results, as there is no guarantee that the best deals are on top. In 2012, The Wall Street Journal reported that controversial Orbitz has changed the default display for Apple users. Website Travel found Mac users often spend as much as 30 percent more on hotels, he began to display more expensive options highlighted.

Some proponents suggest Orbitz was merely giving Apple customers what they wanted, but critics believe it was a blatant attempt to impose higher tariffs for Apple users. Whatever you think about it, the story highlights the importance scroll through the results to ensure that you are really select the option that suits you.

Once you've settled on the flight or hotel you want, disable the cache so that you can buy anonymously without your browsing history inflate the price.

Change your Internet habits

There is also a good idea to use more than one browser to shop online. In this way, the history of your browser bundling only with information on purchases. Using a range of computers and mobile devices is ideal, but if you do not have access to a range of technologies, different browsers will still work.

It is frightening to note that you will need to take a month to work out each year to read all the privacy policies that you experience, but it is worth leaning through policies on travel sites you use. You should be wary of sites that say that your personal information will be "light", "shared" or "sold" as they may engage in suspicious pricing practices. If a travel website does not share its privacy policy, you should not use it.

mask your location with a virtual private network

Anecdotal evidence suggests that the browser location can also lead the price of air tickets up. Internet entrepreneur Jose Casanova observed when he tried to book a flight from Miami to New Orleans earlier this year.

Casanova sought Kayak for the right flight on consecutive days and found that the flights were about $ 100 cheaper than the first day of the second. He noticed that he had used a virtual private network, or VPN, the first day, which led Kayak to believe he was in Toronto, Canada, instead of Miami. He wondered if flights are discounted if buyers do not live in the city of departure, and made to investigate it.

Casanova found that when he sought with his VPN, he saved about $ 70 on its flights. Most people only think about using a VPN to protect their privacy when they use mobile devices or public WiFi, but Casanova proves they can be useful even when you browse your home network .

Use a large VPN like Hotspot Shield when buying travel tickets to make sure that your site will not be held against you.

Data mining in schools: How it could threaten the privacy of your children

12:43 PM Add Comment
Data mining in schools: How it could threaten the privacy of your children -

Once upon a time, the school's performance your child was properly summed up in two, maybe three, newsletters per year. The maps are based safely in his student file, shared only with administrators of parents, teachers, and colleges. digital technology of today has completely revamped this practice, and academic information once private is now shared with countless people that you will probably never meet.

Is this an acceptable practice? According to Jose Ferreira, CEO of a six-year data exploration company called Knewton, it is perfectly acceptable, and it is also in your child's education interest. However, many critics still feel the data extraction is a widespread threat to the privacy of students

Knewton :. Data Mining Academic your child

You may wonder how a stranger such as Jose Ferreira could so easily access personal academic data of your child.

the answer lies in the large number of electronic products used by school districts today. Many school districts have stocked computer labs where students enter their personal login to access games, applications, the Internet, and so on.

Some schools ready on iPads or other electronic devices that encourage children to explore and learn on their own at home. Other districts provide students with magnetic stripe cards, they Swipe to the library, on the bus, and in the lunch line.

Most likely, your child creates a personalized digital track simply attending school every day. And just as likely, this path has fallen under the control of a powerful mining company such as Knewton.

Knewton has partnered with some major educational publishers, including Microsoft, Pearson and Houghton Mifflin, to the adaptive learning technology into the hands of millions of American students. In the words of the company itself, Knewton made makeshift concentration "data science, statistics, psychometrics, machine learning, marking, and unified learning stories" in one place to create custom digital lessons students on a "scale".

in other words, Knewton software quietly hiding inside digital gadgets that your child uses at school.

This collects data on school performance of your child by analyzing the keystrokes, wrong answers, correct answers, time on task, and a host of other input data. the information is stored in the cloud where teachers your child can access it.

Who can access it? Knewton, of course.

A Matter of Student Achievement?

Ferreira is neither shame nor apologetic for huge amounts data it has collected on the children of America.

"We literally know everything you know," he boasts. "We have five more controls on the scale that Google has." But Ferreira said he did not make the trip for the power.

student data is used by the software adapting Knewton to narrow the digital lessons that encourage student achievement. It's like having a tutor one-on-one integrated in the tablet or computer in your child, a guardian can differentiate instruction through, formative assessments in progress.

delivery of instruction Differentiation is a skill that classroom teachers spend years trying to perfect. countless hours of professional development are versed in the study of education differentiated, and ultimately, teachers are assessed on their ability to deliver.

It is difficult for a human to take to tackle 25-35 students, who all have different learning styles and levels of ability. Ferreira's solution: Give the task of differentiated instruction to a computer program, and see what happens

The goal is to ease the burden on teachers while improving the learner experience. . Certainly the concept is attractive. After all, the US has lost its foothold in the global academic ratings in recent decades. In 2012, US students ranked 27 e in mathematics, 17 e in reading, and 20 e in science worldwide, according to data for the International Student Assessment Program. For the country to maintain its identity as a superpower, most people agree that the overhaul of the education system is long overdue.

The ethical concerns surrounding Knewton

electronic information systems such as Knewton to bring to the table a host of often unanticipated ethical concerns. For the brainchild of Jose Ferreira, one of the main concerns of the public is student privacy. The US government restricts the use of encryption codes, which means that student data could easily fall into the wrong hands and be misused, abused, or even spread internationally.

Although the data were fully protected by encryption, it could still be sold to marketers and advertisers hoping to make a profit of children who have difficulty learning. America is no stranger to security breaches, and nobody wants to see a child prey to the evils of greedy pirates.

In the eyes of many Americans, privacy compromise is not worth the academic benefits leveraged by an adaptive learning software Knewton.

What other Ed-Tech companies are

Khan Academy, another platform for online learning remarkable, recently changed its information collection policy to appease users who were nervous about privacy concerns. The nonprofit organization, which, once admitted to a policy of "targeted advertising" is now claiming to defend the protection of students' privacy. Khan Academy does however still allows collection of information for cookies placed by third parties such as YouTube and Google.

Moodle is a platform similar to learning Knewton of which can be downloaded by teachers and students to create a share, the adaptive learning environment. According to Moodle's privacy policy, it does not sell user information, but personal information could inadvertently be seen by "volunteers and staff" who work for the company.

other ed-tech enterprises, such as data storage company eScholar and analyzing data Panorama education provider, does not specifically specify a privacy policy. the risk of sharing personal information with online entities such as -ci is that you do not know where your information is going or what might harm you.

When technology advances faster than ethics, questions will inevitably arise. It is true that large data gives great benefits. Knewton and Google are some great data collection companies we know, but there is much more that we could not know. it is equally true that we do not want our privacy exploited for purposes other than our own. The question we must ask is: How can we analyze the good from the bad when it comes to student data mining - or any data extraction, for that matter

[?

7 ways to celebrate Data Privacy Day

10:41 PM Add Comment
7 ways to celebrate Data Privacy Day -

Data Privacy Day on 28 January every year. This day is designated internationally as a time to focus on the protection and respect for privacy, awareness about the risks of data, and to allow consumers to be accountable for how and where their information is used.

Celebrate Data Privacy Day this year with the following activities to help you and others stay safe.

attend a Privacy Day Event data

You can participate in the Data Privacy Day events both online and in person. There are a number of events that can provide valuable information for professionals.

In Atlanta, you can attend private health living in a world fully connected to the Georgia Tech Academy of Medicine. San Francisco hosts the confidentiality of data Trends 2015. The second annual turnover of privacy Summit is scheduled on January 27 the confidentiality of data ensures Day, in New York.

If you are unable to attend an event in person, you can login to participate in webinars as EDUCAUSE Live: The Power & the Passion of Privacy to build something better . Twitter chats will take place on and around the confidentiality of data daily to treat current trends and concerns as well.

Share what you know about social media

Social media is a great place to start the conversation about data privacy. Hit the Internet on or around data privacy Day, and you'll find lots of coverage to explore.

Learn from the experts and professionals of the confidentiality of data. Discover the latest news about security breaches and take some time to delve a little deeper into what is happening.

Share the valuable information you find with friends and family. Even something as simple as a tweet reminding everyone of the most important steps to protect their privacy can have an impact.

Request a credit report

You are entitled to one free credit report each year from each of the three major credit reporting agencies. If you divide these, you can get a free credit report every four months.

It is important to look through your credit report regularly, as this is often where you find the first signs of identity theft. Your report may display accounts in your name that you were not aware or reflect inaccurate information.

If you have not checked your credit report recently, take a moment to request a free credit report in honor Data Protection Day. Put it on your calendar as a recurring task and stay on top of this important activity.

Update your passwords

We all know we need to update our passwords regularly, but not everyone really worth going to. Go through all your important accounts and change your passwords. Make sure they are not the same. Challenge yourself to come up with something completely original that you have never used before. Use a combination of numbers, letters and symbols and avoid any recognizable words.

While you're at it, set up a recurring reminder to do this again in three months. While it is certainly annoying to have to come up with a new original password every 0 days, remember that it is not nearly as annoying as relations with an account that has been hacked.

review your privacy settings

Your privacy settings control what you share with the world. Your social media accounts, blogs, email and other profiles you have created online have their own privacy settings. You can never think to look at them, but Data Privacy Day provides the perfect opportunity to start. Sign, read the fine print and check where your information is really going.

If you are not actively managing your settings, things like photos and Facebook updates are probably known to the public. Unless you have changed the settings on your smartphone, these photos can also contain geotagging information that indicate the tech-savvy predators exactly where your photos were taken. It is important to make informed decisions about where your information goes.

Do not forget to check the accounts used less, like those set up with online forums. If you create a connection to the website of your favorite magazine, you can also have a searchable profile where others can use to find you. In most cases, these profiles show no problem, but if you are sensitive to where your data is, you should take a magnifying glass to your online presence.

to make it easy for you, click here for instructions to update the privacy settings for all the different services.

Give your computer a Check-Up

You must always maintain updated antivirus and anti-malware software on your computer. Open yours now and make sure that everything is up to date. Go through the programs you use most often and download updates available for those as well.

Also, if you have not already, you need to download Hotspot Shield VPN application to protect your data against snoops and hackers. This is especially important if you regularly connect public WiFi.

If you've been putting off major updates to your computer, you might leave a door wide open for cyber criminals. The updates are often issued to plug the known holes that hackers have gained through.

You can give your computer a free safety check-up of the National Cyber ​​Security Alliance to ensure that everything is as it should be. If you find areas of interest, you might be able to leverage data privacy day deals to plug the holes.

Talk to your children

If you have children, Data Privacy Day gives you the perfect opening to start a conversation with them about the importance of data privacy. Children and teens today face temptations that most adults never had to think about their own school days.

A Pew Research survey found that 71 percent of teens see their school name on social media. Fifty-three percent from their e-mail address, and 20 percent after a cell phone number. In addition, 92 percent use their real name on their profile and 82 share their birth date.

It is tempting and easy to share more information as appropriate percent. Children often fail to realize how much and how fast an image or video can spread. Use this day as an important reminder for everyone in your family just how critical data security and privacy are on the Internet.

Day confidential data is a useful reminder that your privacy and information security is a concern that you need to face every day. Use this day as an excuse to give your own presence of a check-up.