Say No to Cyber Bullying!

Cyber bullying has become a serious issue these days. According to last year’s statistics (2014), over 25% of teenagers report that that they have experienced repeated bullying via their mobile phone or online. Reports also show that over half of young people experienced the same problem; while 11% of adolescents and teens have experienced embarrassment with damaging photographs taken without their knowledge or consent. And the numbers just keep piling up. I’m also sure that you have heard stories about teens taking their own lives because of cyber bullying.

In this post, I have gathered some tips on how to prevent this problem and the cycle of aggression. May it serve as guideline not only for parents or guardians, but also to everyone who may have been involved to such incident.

For kids and teens

Don’t respond or retaliate. Most of the time, these cyber bullies would actually wait for your reaction because they think it gives them power over you; and empowering a bully is the last thing you don’t want to happen. Just try to ignore these “keyboard warriors”. Retaliating could only make things worse. If you can’t remove yourself from the situation, sometimes humor disarms or distracts a person from bullying.

Save the evidence. To support the things mentioned above, don’t respond or retaliate. The best thing to do is to save the evidence in case things escalated and report it to the authorities.

Reach out for help. You don’t have to keep everything to yourself. Find a person you can trust or just listen to what you have to say—if not your friends, perhaps your parents or guardian. Don’t be afraid to reach out for help, especially if it’s really getting under your skin. Always remember, you’re not alone.

Use available tech tools. There are many apps services you can use to disengage you with such incidents. You can block the person, set your account’s privacy, or you can also report the problem to the service provider. This may not end the bullying, but at least you get to control the harassment, and you’ll be less tempted to respond. If you’re getting threats, you should definitely call your local police or let your parents or guardians know. Consider reporting it to school authorities as well.

For parents or guardians

Monitor your children. You’re really lucky if your child is open to you. Most children don’t share these things to adults. Monitor their activities. If you notice some changes like they can’t sleep at night or they lose interest going to school or seems restless when on his or her phone or computer, try to ask why as calmly and open-heartedly as possible.

Work with them. Keeping your children involved is always a good thing. Victims of bullying (in any form) usually involve loss of dignity or control over a social situation. Getting your child participate to some activities may help him or her regain that control.

Respond thoughtfully. Gather your thoughts before making an action. The problem with most parents is they retaliate as quickly as possible. This would only make things worse. Find out what really happened and gather your thoughts so you can find out the best solution to the problem.

There are many ways you can do to prevent these problems. Just keep your eyes open. For sure, you know your child better than anyone else. And for the others, I hope you do your part as well. Say not to bullying. Sometimes, lending your two ears could save lives.


6 Ways to Secure your Facebook Account

There is no doubt that Facebook is one the most popular social networking sites with over a million of active users around the world. While this site has become a part of our daily routine—people’s live journal, newsstand, online store, entertainment and more—take note that anyone can see what you post. This is why you need to be more vigilant with what you share to your wall. People can easily grab your photos, videos, and other information. In this article, we will provide some tips on how to secure your Facebook account.

Step one: View your profile as others view it

sample2Checking your own profile can help you decide what changes you need to make to your share settings. To do this, you can simply log in to your account, select the gear icon in the top-right cornet, go to Privacy Settings, and select Timeline and Tagging in the left panel.

Now, go to View As to the right of “Review what other people see on your timeline” in the “Who can see things on my timeline?” column. This allows you to manage your share settings and what you want or don’t want to share with your personal network or public. This will also allow you to manage the tagged posts your friends want to share in your wall.

Step two: Double check if you’re browsing securely

Just recently, Facebook made adjustments to secure users when browsing. Check if you’re using a secure connection whenever one is available. Go to Security in the left panel of Facebook’s Account Settings and see if secure browsing is activated.


This setting also allows you to manage log-in notifications and approval. It also allows you to view or edit your recognized devices and active sessions. To deactivate a certain device, go to Edit to the right then Remove next to the device’s entry. Same thing goes with your log in sessions.

Step three: Manage the accessibility of your account

You can restrict access to your posts by going to the Privacy settings. You can check who can see your posts and who can see your future posts. Fix the options according to your preference. Take note that a warning pops up when you limit access to all your past posts at once rather than changing the setting post-by-post.

Step Four: Fix your wall and tags


Once you have managed your timeline viewers, you can now remove friends from adding you to your wall and review photos when some tries to tag you in. Just simply go to the Timeline and Tagging Settings. You can see two options for “Who can post to my timeline?” under “Who can add things to my timeline?” (Friends, and Only Me.) You can also review the tagged posts in your wall by going to the Edit tab to the right of the entry and select Enable in the drop-down menu.

Step 5: Choose your apps

Yes, these apps are quite entertaining. But don’t let them grab all the permission they can. If they request for too much details, think again. You might end up flooding your wall and your friends’ timeline   with status updates and more annoying posts.

Step 6: Check your friend list

Finally, take some time to review your friend’s list. Make sure you know all your friends and their accounts are legitimate. This is why you need to have separate accounts for business, personal, or work.


More Ways to Prevent Phishing Emails

In my previous post, I have discussed the possible threats online particularly scams and identity theft. Today, I am going to elaborate more on how to prevent these problems so that you don’t give away your business information.  We help all kinds of Clients with this issue from Solar Panel Installers in California to Limousine Services in Texas, so follow these steps and protect your information!

It’s really surprising how these cyber criminals can get into to your personal details easily. In fact, it only costs 2 bucks for a hacker to create a convincing  email and pretend to be from your trusted retailer or bank.  As mentioned to some of my posts, they usually start asking for your login details to obtain the information they need to hack your account. And with over 300 million phishing emails sent every single day, you might have received one of these.


So, how can you detect these scams? To help you out, here are some ways to identify a phishing or spoofing attack. Read on.

Tip #1: Hover over friendly from

The simplest way to identify a legit email is to hover your mouse arrow over the name in the “FROM” tab. This should tell you if the email is from a recognizable domain linking to the actual sender name. For example an email from should match the domain name.

Tip #2: Check the exact URL

After checking the domain name of the actual sender, you should also check the landing page from the email. Make sure the link is legit and uses the right encryption. Be careful when clicking to the links. The best way to do this is to open a new window and go to the site directly without using the email link provided in the message.


Tip #3: Incorrect grammar or spelling

Some cyber criminals use misspelled words on purpose. While for most of us can easily detect this as a spam or suspicious message, this can also be a tactic used to find less savvy users. With this tactic, spammers can easily pinpoint the easy targets.

Tip #4: Plain texts no low-res graphics

Usually, legitimate emails are HTML formatted and a combination of text and images. If you think the content is too plain, think again. Check the content and the graphics used from the sender. If you notice something fishy, then trust your instinct and ignore the message.

Tip #5: Message is pure image

Many spammers nowadays are good with this, so you better watch out. They may send you enticing graphics that could lead you to another page where they can get access to your account and passwords. So before clicking any images make sure to hover within the file for extra precaution.

Keep these things in mind when checking your social media accounts and your email to prevent these online threats. If you have more tips to share, please don’t hesitate to drop them below at the comment section.


Why Do you Need Updated Antivirus Software?

As modern technology continues to rise, you can expect more and more updates from the so-called “Cyberworld.” While most of us enjoy the convenience what the Internet has to offer, there are also risks that we should not forget. Again, these powerful machines are still limited which means, we still need to take care of them. One system-maintenance that we should not ignore is the importance of having efficient and up-to-date antivirus software. In this article, I will discuss the main importance of installing and updating your antivirus program. Read on.

Possible threats you may encounter

One of the most common threats up until today is the “Trojan Horse.” This can get onto your system by pretending to be useful, but once inside the system, it spreads a suspicious payload. Some message you may receive will ask for personal information like your name, address, contact number, email address, and many more. It can capture your email address, social networking accounts and passwords. In some cases, it can also capture your financial transactions and could drain your bank account.


Fortunately, there are tons of antivirus programs to prevent this problem. Many software today can easily detect spam messages and unsolicited programs. One popular program today is the AVG, and this can do just about everything like spewing spam, activate firewall, and protect your system to any malicious service attack.

On the other hand, if your ISP detects GameOver Zeus coming from your IP address, you might find it really difficult to fix your Internet connection.

Other forms of unsolicited messages

One popular form of unsolicited messages is the “reward scam”. As the name implies, you may get personal messages from your social networking accounts or your email saying that you have won a random raffle and you can claim your reward by submitting your personal information.


Another threat that can harm your system is the “Ransomware.” This happens when your computer system have been reached already. You may get messages demanding you for some money so you can regain your access. It may also come in many varieties, and trust me you don’t want to experience this. And even if you pay your “ransom”, there are no guarantees that you can recover your data so you need to reformat or install a new driver.

Here’s another scenario that you may encounter. If these cyber criminals manage to infest your data with malware that can reach your accounts, passwords, and personal information; this may result into a full blown identity theft. It can be really difficult to detect this. Many victims of identity theft didn’t realize they are getting hacked until you get the bill for a credit card or you check your bank account slowly depleting.

This is why I really recommend having an updated antivirus. Don’t go for the cheap ones. Find the best one in the market. Read reviews and customers’ feedback. And if you see spam messages from your social networking accounts and emails, don’t hesitate to report them. One of our Customers that owns a Towing Service in Frisco, Tx found out the hard way after having issues with spam reviews so take care of the issue right away.

You should also be careful when buying antivirus program online. To avoid buying fake antivirus programs please watch the video below.




More Ways to Prevent Identity Theft, Hacking, and Scamming

Identity theft is a serious crime and everyone knows how difficult it is to deal with such experience. In today’s technology, criminals have also find ways to hack your accounts or even impersonate your identity. These criminals have been doing it for a long time already—and they have been doing it without using a computer. Imagine how good they are today. They can simply copy your profile, grab your photo and everyone knows what comes next.

This is why it is only advisable to protect your personal information while using the Internet. Well, it may be impossible to advise you to limit the use of Internet. And since you’re already here, I assume that you are one net savvy and spend a lot of time online. To help you prevent this crime, here are some tips you could use. Read on.

  1. Look closely on “Phishing” websites

Some “Phishing” websites can be difficult to distinguish. They may april_11_copyseem legitimate with all the formatting and graphics used. They often require a username and password, which leads to other questions like your full name, social security number, address, and other personal information. Be cautious if a site requests for the following information:

  • Bank account number
  • Credit card number
  • Social Security number
  • Driver’s license number
  • Home address and phone number


  1. Update your anti-virus/anti-malware program

Using updated anti-virus and anti-malware programs can help you detect suspicious activities from your system. There are many resellers offering these products. Make sure to find a reputable service provider by reading customers’ feedback and testimonials. You can also refer to this list for the best anti-virus and anti-malware programs.


  1. Use OpenDNS


We all know that this particular feature can boost your Internet connection. The good news is it is more than that. It also allows you to sort or filter content, which can alarm you when you visit an unsolicited website marked dangerous by yours truly, the Phishtank service.

  1. Set unique passwords for every website

Force-Strong-Password-to-Registered-Users-in-WordPressAnother way to prevent hacking and identity theft is to set strong passwords to every email and online accounts you have. It is also advisable to have different sets of password to avoid multiple hacking. This is very basic, but many people still take this for granted.

  1. Shop only at reputable websites

This is the main avenue of many hackers, identity thieves, and evenSeal-vertical-text-lg scammers. It’s really easy to set up an online store. This is why you need to do your best to check the credibility of every page or website. Other than the vouching system or word of mouth, you may also refer to Web of Trust’s list.

Vector of Internet Security Systems

Online Privacy: Protecting your Identity in the So-called “Cyberworld”

Just want to remind everyone to do yourself a favor and be careful on what you post on your Facebook, Twitter, Instagram, or to any social networking accounts you have. Keep in mind that whatever you post—whether a random blurb, photos, or videos—can take a toll on your reputation. As we enjoy the convenience the Internet offers, we also have some obligations to protect your own privacy. Yup, it’s easy to view your profile and post that information anywhere with your photo on it without your approval. Maybe you should run a test now and search yourself on Google because there could be someone using your identity without you knowing it. So for your own peace of mind, here are some tips you could follow:

Think before you post

digitalcitizenshipYes, it’s your wall, your account, your profile—you can say anything, but you need to face the consequences as well. Again, everything is fast online. People can spread the word in no time. If you want to say something bad about your boss, teacher, or colleagues, just keep it in private. Never post sexually provocative photos or comments, illegal activities, messages intended to harass or threaten anyone.

There should be a separation between your social life and professional life

There are applications and settings you can manage to keep things 219c76bin private. You can make a separate profile and engage in academic community. One popular tool in schools today is “My Blackboard”. This allows you to manage your social media account and who can view your profile.

Manage your Facebook list

Managing your Facebook list allows you to exclude specific people when you want to share something. If you think you’re posting something offensive to a certain group, put them on restricted list. Make sure to check the posts shared on your wall. You can also activate the restriction settings. They need to get an approval before they can post to your wall.



Make a separate email address for work and personal network

As mentioned earlier about separating your social life to professional life, you need to have separate email accounts. Choose more stringent privacy settings for all social network accounts. Check the site’s guidelines for more detailed instructions regarding privacy settings.

And finally, maintain your personal safety. Check your friend list regularly and consider deleting some random people in the list. Also, avoid location check-ins on any site. Do not post where you are going, especially if you’re alone. Be cautious on the information you are providing online.

As a personal friend found out that owns and installs Solar Panels in Utah, a close call with identity theft almost ruined his business and personal credit.  Caution is always the most important thing, and then you can rest easy at night knowing your Identity is safe.


Online Security: 5 Ways to Prevent Getting Hacked

For over the years, many people including multinational companies have been victimized by hackers. While most of us enjoy the convenience of technological advancements, it also makes it easier for hackers to get the information they need. This is why you should be cautious about the personal information you provide online.

Just last year, online privacy and security firms worked together in a social experiment and enlisted an eight-year-old giving her the opportunity to hack a participant’s laptop and gain access private information. Unexpectedly, as young as she is, this student managed to find out the person’s email, web history and other information. How did she do it? She just simply followed the instructions online.

Incidents like these can affect a business’ reputation, this is why many experts are now doing the best of their efforts to prevent any dangers of possible cyber attacks and act before any data is breached.

To help you out, here are some tips from online security experts to prevent such incident:

  1. Be careful public WiFi

Many hackers today use free WiFi to gain access to people’s danger-free-wi-fiinformation. One simple way to prevent this problem is to check the network and see if it’s legit. Hackers can easily set up a fake network. Before logging in to any WiFi connection, make sure the network is an official one. You can do this by simply checking the network name and see if it simply allows anyone to sign in. An official WiFi network should at least establish a password. Ask the staff where you at to verify which one is their network. Also be aware of what your are searching and how it could be manipulated. Be specific with a location and services needed. Instead of searching floor service, try searching floor stripping services in Lancaster. Adding the name of the exact service and location will narrow your search to legitimate businesses.

  1. Be cautious with the network you’re joining.

Once you’re done browsing using their WiFi, make sure to log off all services you were using and forget the network so it won’t connect you automatically the next time you’re in range.

  1. Turn on the WiFi only when necessary

Make sure to deactivate the WiFi settings when you’re not using it. This is to prevent your device from connecting to unsolicited networks automatically without further notice.

  1. Activate your VPN

This feature can track your device and the main server, allowing you to monitor your routing activities through your own little loop of connection that is usually encrypted. This means you can easily detect an intruder trying to get your information. This also enables you to see whose using your account whether you’re on a mobile, tablet, or laptop.

  1. Check your passwords

PasswordsPosterChanging your passwords regularly is also a good idea. It would be difficult to hack your accounts if you’re not using the same passwords across many different services. There’s an app available also to help you manage your passwords or pass codes. You can also use services enabling the two-factor authentication. This allows you to a two levels of password protection on your social networking sites and email accounts.

Again, hackers take advantage of our carelessness. Let us be cautious with our actions. Secure your personal information at all times.



How to Prevent Identity Theft

Identity theft has become a serious problem affecting thousands to millions of people every day. This is why it is only advisable to be cautious with your actions wherever you are. Whether you’re buying stuff online or signing an application for credit cards or whatever membership you’re looking into, you should be very careful about the information you’re giving. This post provides some useful tips to secure your identity. Remember, the more people who know how to prevent this incident, the less inclined others may be to commit the crime.

It all starts with how you manage your personal information. As mentioned above, you need to be extra careful and be more “sensible”. Here are some precautions to keep you out of trouble:

Bring only the documents you need

When applying for a job, passport, or a visa, make sure to bring only identity-theft-insurancethe documents you need. In case you need to bring all your documents, secure them on clean folder. Check the requirements needed before heading to their office.

Track your transactions online

If you love shopping online, make sure to check all the transactions you made. This gives you an opportunity to review what products you bought or services you availed. Check the dates of transaction. Keeping track of every transaction can prevent any discrepancies. Contact your bank if you notice some purchases that you didn’t actually make.

Keep new checks out of the mail

As much as possible, get your checks personally at the back instead of having them sent to your home. This is to make sure only you can claim the check. There are several cases reported that checks were stolen, altered and cashed by identity thieves.

Be careful when providing personal information over the phone

[ File # csp6501428, License # 3132532 ] Licensed through in accordance with the End User License Agreement ( (c) Can Stock Photo Inc. / barneyboogles

There are many scammers who gather personal information thru a phone call. One of the most common scams today is they will tell you that they are working for banks or government agencies. First, they will offer you promos like free gift checks or credit cards then will ask you for your personal information so you can claim the prize. So be careful when giving out personal information over the phone. Always contact the main office to verify the promos they are offering.

Be careful when dumping your files

It may sound weird, but many identity thieves search the dumpster for receipts, credit cards, and anything that contains your personal information. So shred any document containing your information like bank statements, returned checks or any other sensitive information before disposing them.

Make sure your documents are safe

While its your employer’s job to secure your personal identification, it is always better to verify that your records are safe. Make sure they keep things confidential.

Get regular updates of your credit

Keep track of your credit reports and make sure everything is up-to-date. Check the information provided and again, check the transactions posted. You can sign up for a credit monitoring service to make things easir for you.

These are some of the things you need to consider to secure your information and prevent identity theft. If you have suggestions, please feel free to drop them at the comment box.



News Blogging and Traditional Print Media

For decades and even centuries, journalism has been manifested in different forms. Through time, as technology evolves, various mediums for journalism have emerged – from print, radio, television and now the emergence of blogs.

As Wikipedia defines, Journalism is the profession of writing or communicating, formally employed by publications and broadcasters for the benefit of a particular community of people – has been the primary source of information for the society for so long. And today, it is now considerably evident that the most traditional form is encountering one big problem today.

According to many experts, the print medium of newspaper is slowly fading. This has brought to many assumption that new media, specifically blogs, plays a major role in its decline. Today, almost everyone prefers to go online to search for information they need resulting to series of debates whether blogs can replace print media i its role in society. But the question still remains—how much do blogs influence the sociological and ethical aspects of journalism? Has it really reached its peak? Let’s try to dig deeper into these and dissect some of the pros and cons of weblogs. But first, what is a weblog?

Bloggers: Identity Issues 

Basically, a blog is an online journal, where anyone with a basic Blogger-21knowledge of computers can post anything—this includes random blurbs, photos, research, and any composition a person wants to post to his or her site.

There is really nothing wrong with this new medium since a blogger can always say he or she has the right to express his or her feelings and experiences. The problem is many bloggers today abuse this freedom. And even worse, anyone can write anything they want without checking their facts. They become too careless to the point they can mislead their readers with their writings.

Another problem is that some people make multiple or dummy accounts and use it as a “propaganda”. And when you’re too careless putting everything on your site, people can easily hack your account resulting to identity theft. This is why I strongly suggest to be keen on the information you put online.

Ethical standards 

The ethical standards violated mostly by some blogs are plagiarism, libel, vulgarity, use of profane words, violating the privacy of others, and other false claims among others. The sociological influence of blogs to print media is that it serves as a form of recreation, a means of making profit and aids in making everyday activities like– reading and publishing easier, cost-effective and more convenient. People greatly rely on blogs nowadays

Blogging and print media are really different from each other. The only similarity that they have is both can deliver news and information to the people. Because print media is written down and blogs are over the internet, blogs became more personal compared to print media. Blogs only give ideas of the bloggers while the newspapers report the news itself.

The reasons why blogs are more preferred than traditional media is because of the rapid growing of mainstream media are beginning to embrace interactive media and features like blogs and because of free advertising, feedbacks, free services in the internet, more accessible, it’s the new craze, direct interaction, and instant information.