Identity Theft

Part 1 Scam Avoidance: How to Spot and Protect Yourself from Scams

This is the 1st part of a 3 part series in protecting yourself from on-line and of-line scams.

Part 2 Scam Avoidance: Avoiding Scams

This is the 2nd part of a 3 part series in protecting yourself from on-line and of-line scams. In part 1 I attempted to make you aware of some of the common ways in which a scammer operates.

Part 3 Scam Avoidance: Protecting yourself after the Scam

This is 3rd part of a 3 part series in protecting yourself from on-line and of-line scams. In part 2 I discussed some ways you can avoid scams before you become a victum.

What is Identity Theft Protection, and do you need it?

It is relatively easy from the standpoint of a thief to impersonate your online identity and assume your financial standing. Using your identity, a thief can open up a line of credit under your name and go on a shopping spree making you assume all of…

How to Securely Delete Data

This is a good guide that explains how to securely delete data from a Mac, but it also references a PC. These instructions might be beyond the capabilities for the average computer user, but it’s still good to know what is involved in securely deleting data.