September 6th, 2018

It is difficult to turn on the television or browse news online today without being assaulted by another privacy breach by a major company. In coverage of the latest hack or security lapse, you may have heard the term “third-party hosting” and wondered exactly what it means and how it relates to your online privacy. This is an important concept for families to understand, as third-party hosting is considered the weakest link… ... Continue reading >

September 6th, 2018

By 2019, the global ad spend on children is projected to top $4 billion. That’s a lot of money, and it can come with consequences for your children. Advertising may be everywhere, but is it really so bad for our children? The short answer is: yes. Marketers know that, by reaching children early, they can create lifelong customers. Children are naturally open-minded and primed to form a positive opinion about things that entertain them. As they… ... Continue reading >

July 13th, 2018

On BBC.com , Tom Calver and Joe Miller outline a simplified list of what the biggest tech companies do with your data. It’s clear and a little scary. Facebook, Google, and others are grabbing your data and they explain why and how. However, there are no solutions here–just clear explanations about how your privacy is compromised daily. Reading this article provides a fantastic checklist for your annual privacy update. It works for both you and for… ... Continue reading >

September 6th, 2018

As a parent, you try to keep your home as childproof and safe as possible. It starts with baby-proofing the electrical outlets, installing nightlights in the hallway, and learning the hard way that apps need two-step authentication unless you want to be the proud owner of $500 worth of bonus tokens for your child’s favorite iPad game. But what happens when your Internet-connected devices are suddenly bringing dangers right into your living room? As you… ... Continue reading >

September 6th, 2018

Parents’ No. 1 goal is to keep their kids safe. Relatively simple to do when it comes to sharp objects and matches; trickier when we’re talking about digital dangers and risks. As your kids rely on smartphones and PCs for more and more of their education and entertainment, they make themselves vulnerable to countless online threats. A VPN can help you keep them safe while they browse. First, what is it? A virtual private network, or… ... Continue reading >

September 6th, 2018

We’re generally familiar with HTTP, an abbreviation for Hyper Text Transfer Protocol, which is the typical way data is transferred over the Internet between site owners and site visitors. It describes the (hopefully) quick process of how visitors will see a whole bunch of specific images, text, links and other formatting as one, organized page. If someone were to figure out a way to intercept this flow of data, they’d get everything, which is… ... Continue reading >

September 6th, 2018

Professor Zeynep Tufekci has been talking to the tech world about the dangers of data collection since 2012. Six years later, everybody else is finally starting to listen. She has received a lot more attention since the news broke about Facebook and Google’s data collection in Spring of 2018. The Chronicle of Higher Education has an interview with her (behind a paywall). And on Vox, she recommends three books on how… ... Continue reading >

September 6th, 2018

Have you ever checked the cookies on your computer or looked at the history on your web browser? This information is part of your “digital footprint,” and it is a data-fueled overview of how your family interacts across various digital platforms. This includes web-browsing, online-purchasing, details of how long your teen spends on gaming, chats or instant messages from work. Do you truly understand how this digital footprint is gathered — and how you can limit it?  ... Continue reading >

June 11th, 2018

Baratunde Thurston guides you through the maze of data which Facebook and Google collect about you. He shows you what he did to protect himself and his family. Following his steps, you can improve your privacy and limit who takes your data. While this article is… ... Continue reading >