Main Content RSS FeedFEATURE ARTICLE

4 Things Identity Thieves Search For On Your Blog or Social Website

Understanding what identity thieves do with your information and how they can obtain it might go a long way in protecting yourself from becoming a victim.

Continue Reading

How do I Block mySpace?

Certified Author

How do I block mySpace and similar websites?


There are many ways to accomplish this task, but first lets find out if you really want to completely block sites like these or if want to restrict access by children, or allow teens access and monitor their online behavior. The latter choice/option being the preferred way to go. You know as well as I do, if you make restrictions on teens or you stop them from doing something as a form of punishment they will find a way to undermine your authority. They will find a way or sneak online somewhere else. And the possible outcome could be very tragic.

(more…)

OSA Technorati Tags: , , , , , , , , , , , , , , , , ,

The Top 10 List 4 The Top 10 Security Issues Four 2 Thousand 10, 11, 12, 13…

We had such a great response for our last series of Top 10 lists… the (30 Top 10 Ways)!! we decided to do a brand new updated Top 10 Lists for the Top 10 Security Issues for 2010, 2011, 2012, 2013

We hope that you find our research is useful and pays big dividends, in giving you the tools necessary and especially the knowledge to protect you and your family… but importantly Keeping Our Children Safe, should be every persons responsibility in this new net generation we all find ourselves in now, closing out the first decade of the millennium…

The first Top 10 list is based on a very hot topic right now, and is fast becoming a nation wide and global problem that it is called: SEXTING

We featured this Security Issue in one of our our recent OSA eZines… OSA Investigate SEXting to get more information and more of an understanding of how big, this problem really is:

SEXting

As new as this trend is figures from a recent study suggest that it is far from rare. The results of the study suggest that up to 40% of teens have been asked to send nude photos of themselves electronically and possibly up to 20% of teens have actively engaged in sexting.

Please check out all of the other Top 10 List… as they become available:

1.  top-10-dangerous-behaviors-promoted

2.  top-10-dangerous-drugs-teens-commonly

3.  top-ten-signs-you’ve-trojan

4.  top-10-tricks-online-predators

5.  10-ways-catch-cyber-bullying-early

6.  top-10-facts-human-trafficking

7.  top-ten-tips-teens-safe-social

8.  top-10-child-pornography-facts

9.  top-10-online-propaganda-techniques

10.  top-10-results-sexting

Special Report : top-ten-ways-to-protect-your-online-privacy

Also, if you have not seen our first series Top 10 Ways List… Go Now The Best 30 Of The Top 10 Ways

As Always Be Safe Online, and if you find you have topic’s or ideas on other subjects that you would like us to investigate or create a list please email us our use our contact form.

Thanks for all the support and please Learn IT, Teach IT, Share IT!

Your Online Security Authority

Bill Wardell

Reblog this post [with Zemanta]

OSA Technorati Tags: , , , , , , , , , , , , , , , , , , , , ,

Parenting

Threats to mobile and online security are constantly becoming more sophisticated… So, Protect Yourself!

Great info… and some good advice for parents, families, home owners and business owners as well, that they can use to protect themselves!!

July 29, 2011 | Read the story »

Predators and Pedophiles

5 Things Parents Should Know About Predators on Social Networks

A recent study done by the American Psychological Association found that of all internet offenders only 5 percent pretended to be teenagers. Most of the time teens met with offenders more than 1 time. They also found that teens who engaged in risky behaviors like maintaining friend lists with people they did not know were much more likely to receive online sexual solicitations. The problem is, most teens are still not as concerned about the risks of sharing information and photos to the public.

December 20, 2009 | Read the story »

Teen Guidelines

Kids Take the Darndest Drugs

When I was in elementary school, I got a lesson from my teachers every year about saying no to drugs. To be honest, I didn’t quite understand what drugs were. I knew about ibuprofen and stuff like that, but the idea of recreational substances was foreign to me (even though I knew I was always supposed to say no to whatever people offered me).

August 26, 2011 | Read the story »

MySpace

MySpace using new technology to weed out sexual predators…

I for one am happy to see MySpace using new technology to weed out sexual predators, and start taking a proactive roll in the process, everyone has to be aware of the behavior of online predators and pedophiles and we need to really start to understand the new face of the 21st century predator they are not who think we they are, find out here from Julian Sher!

May 12, 2009 | Read the story »

Bullies / Bullying

Show Your Child How to Beat Cyber Bullies at Their Own Game

Bullies have been around since the beginning of time. Traditionally, these tormentors have been associated with vicious verbal taunts and teasing. In contemporary times, technology has been a tremendous “boon” for cyber bullies. Lack of supervision, bully anonymity, and victims’ ubiquitous proximity to electronic devices are the main facilitative factors.

March 20, 2011 | Read the story »

Keeping Our Children Safe

Keeping Your Teen Safe on Twitter

Keeping Your Teen Safe online:
Part IPart IIPart III

Twitter is an interesting social network, since you only have 140 characters to say whatever you want. You cannot post pictures or videos but you can post URLs to them. Many people have embraced twitter as a source to vent out their daily musings or to “follow” their favorite celebrities to get an idea of their life. Parents should be cautious as to how and why their kids are using Twitter. There is nothing bad about Twitter, in fact it has many advantages. The fact is teens need to be careful as to who follows them and especially what they tweet.

June 5, 2010 | Read the story »

Shopping Security

Protect Your Identity: How to Use Online Shopping and Online Banking Wisely – Part III



Security systems are also in place to monitor which computers you use to log on to the bank site. Whenever you log on to the site from a computer that is not your regular home computer, you are asked to provide additional information. Most banking systems will generate a security question that you answered during account setup… Protect Your Identity | Part I | Part II | | Part III |

June 20, 2011 | Read the story »

Banking Security

How to Safely Use Online Banking When On the Go

Ask your bank if they can assign a second active user name associated with the same account. Explain that you access your online bank account a lot in a public environment, and you want the additional security of a limited-rights user name. Some banks gladly add the second access avenue. When accessing your online bank publicly, use only that second access information set.

January 12, 2011 | Read the story »

Home Security

How to Handle a Home Invasion

No matter how expensive or highly-rated an alarm system is, or no matter how many precautions someone takes, a home invasion is always a possibility.

June 16, 2011 | Read the story »

Home PC Security

How to Avoid Online Fraud – Part III

We hope you’ve enjoyed our look at various online fraud techniques used by the unscrupulous. You can find the previous two entries here and here. Our final post will dive into one of the biggest hubs for rip-offs and scams online, eBay. Since its inception, people have taken advantage of trusting buyers on eBay and other auction sites. We’re going to highlight some of the sure signs of potential eBay fraud and how to dodge it.

November 11, 2011 | Read the story »

Privacy

Top Ten Ways to Protect Your Online Privacy

Of course, internet crime is not usually violent crime, it tends to be more along the lines of destruction of property, through viruses and worms, and thefts through the use of scams and ID theft. But these crimes are highly destructive to people’s lives, as well, and need to be taken just as seriously as any other.

July 2, 2009 | Read the story »

ID theft

Keep It Locked When you’re Vacationing: Identity Theft

Travelers are particularly vulnerable for ID theft because they are distracted and in unfamiliar territory. Here’s how to protect your ID while on vacation.

December 19, 2013 | Read the story »

 

Main Content RSS FeedFINAL THOUGHTS

Cyber Security Awareness Month: As Businesses Battle Hackers, Cybersecurity Professionals in High Demand

The U.S. Department of Defense requested $3.4 billion for its Cyber Command in 2013. Yes, that’s billion. If that’s not enough evidence, there’s always this sobering analysis from a federal report titled Cyberspace Policy Review:

Continue Reading

Add Me As a Friend

Categories

Archives

OSA Gang

Blog Marketing
Jack Humphrey's blog marketing, social marketing, and link building tips.

The Publicists Assistant
We are experienced in helping clients receive the Online Publicity and Radio Publicity they deserve. Since your success determines our success, we are dedicated to bringing you RESULTS!

Recent Peeps

Recommends


Recommend Site




OSA Highlights





Submit Blog & RSS Feeds



OSA & CHW Radio

blogcatalog





googlesyndication