Data Privacy Blog Series Part 2: Tips for Becoming Your Own Privacy Warrior

Technology is a wonderful thing, but it comes with a price. Much of the data collected about us is done so for advertising purposes. We may not like it, but if we continue to expect services for free it is only logical that providers make money one way or another. What’s important is to know what information about you is collected, who has access and what they do with it. Here are some tips and techniques you can use to minimize the data that is collected and to protect your privacy online.

Read more

Data Privacy Blog Series Part 1: Hello Tech, Good-Bye Privacy

Today’s technology and apps allow stalkers to easily track their victims’ whereabouts. Burglars can easily determine what valuables we possess and when we are not home. Hackers can use your personal information to create very believable email phishing attacks. They send you emails that trick you into clicking on links, responding, and providing more personal information or opening attachments and downloading malware. In order to protect ourselves and our businesses we must be able to recognize what information we are releasing, what is being collected, what is available and who has access to it.

Read more