Data Privacy Blog Series Part 1: Hello Tech, Good-Bye Privacy

Today’s technology and apps allow stalkers to easily track their victims’ whereabouts. Burglars can easily determine what valuables we possess and when we are not home. Hackers can use your personal information to create very believable email phishing attacks. They send you emails that trick you into clicking on links, responding, and providing more personal information or opening attachments and downloading malware. In order to protect ourselves and our businesses we must be able to recognize what information we are releasing, what is being collected, what is available and who has access to it.

Read more