1. Technology
You can opt-out at any time. Please refer to our privacy policy for contact information.
Andy O'Donnell

Andy's Network Security Blog

By

Follow me on:

Parental Controls For YouTube

Saturday May 31, 2014

Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?

In our featured article: YouTube Parental Controls, we'll show you a couple of steps you can take to attempt to enforce some parental controls. Note: there is no guarantee that the controls mentioned in the article will be effective or that your kids won't circumvent them altogether, but at least doing something is probably better than doing nothing at all.

Have you found YouTube's parental controls to be effective or not? Let us know your thoughts in the comments area:

Craigslist Safety and Security Tips

Saturday May 31, 2014

Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal.

In our featured article: How to Buy and Sell Safely on Craigslist, we'll give you some security tips to help make your Craigslist experience a safer one.

Have you ever had a bad Craigslist experience? Tell us your story in the comments section below:

5 Tips to Help You Land an IT Security Job

Saturday May 31, 2014

IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence.

Have you thought about a career in the cyber security field? Check out our article: Tips to Help You Land an IT Security Job for some advice on what you can do to help get your foot in the door in this lucrative field.

Do you have a job in IT security? What do you think helped you get the job? Share your story in the comments section:

How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam

Saturday May 31, 2014

There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom demands via the lock screen. Victims are told that if they pay the ransom then they will be given the code to unlock their phones.

This scam takes advantage of the 'lost mode' feature of Find My iPhone. In this week's featured article: How to Protect Yourself From iPhone Device Lock Ransom Scams, we'll show you what you can do to help secure your phone so you don't become a victim, we'll also tell you what to do if you've already been hit by this scam.

Have you already become a victim of this scam? Let us know your experience in the comments section:

Are Your Employees Leaking Sensitive Company Information on Facebook?

Thursday May 29, 2014

Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading.

In this week's featured article, we'll ask the question: Are Your Employees Leaking Company Data On Facebook? We'll tell you what might be leaking and how. We'll also check out some things you can do to help prevent data leakage via social media.

Does your company allow Facebook at work? Let us know in the comments section below:

Rev up Your Security with a 10-minute PC Security Tune-up

Thursday May 29, 2014

Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture.

In this week's featured article: The 10-minute PC Security Tune-up, we'll show you some quick tips to get you started on the road to a secure PC.

Do you have a security tip that you would like to share with us? Tell us about it in the comments section below:

 

How to Prevent Your Web Browser From Being Hijacked

Wednesday May 28, 2014

Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?

You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent Browser Hijacking, we'll learn about browser hijacking, including how it happens, why it happens, and how you can try and prevent your browser from getting hijacked.

Have you ever had your browser hijacked? We're you able to resolve the problem or is it still happening? Let us know your experience in the comments section below:

Are Your Clicks Getting Jacked?

Wednesday April 30, 2014

Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.

Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our article: How to Protect Yourself From Clickjacking Attacks for information on how you can avoid becoming a victim.

Have you ever been clickjacked? Let us know your experience in the comments area below:.

Is Your Google+ Account Secure?

Wednesday April 30, 2014

Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steam

Just like Facebook, Google+ has privacy and security settings that you should configure to keep yourself safe. Check out our article on Google+ Privacy, Security and Safety for information on configuring the various security and privacy settings offered by Google+.

Do you use Google+? How do you think it compares with Facebook? Tell us your thoughts in the comments area:

If Your PC Was Just Hacked, Read This:

Wednesday April 30, 2014

You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.

If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'll show you the steps you need to take right now, before any more damage is done.

Have you recently had your computer hacked? Did you start over from scratch or did you try to fix the problem without reloading? Let us know in the comments section.

©2014 About.com. All rights reserved.