Caught in the Middle: A Cyberbullying Tale

This educational storybook dives into the dangers of cyberbullying and how friends can step up and stop cyberbullying. With discussion questions at the end of the story, this is a great resource for both teachers and parents.

A Parent’s Guide to Tackling Teen Technology Use

They grew up on Wi-Fi and touchscreens. We learned on floppy discs and dot-matrix printers. When kids begin to explore more than Dora and Webkinz online, parents struggle to stay on top of new technology, trends, and tracking what our kids do online. We can feign competency for only so long. At some point, the lie of an all-seeing app …

Keeping a Safe App Environment for Tweens

My tween daughter just bought a tablet. She found one at a thrift store for $25. The kid knows the Web, from school assignments and by following her sisters. She set up online accounts and downloaded apps as soon as she arrived home. She sends me texts on an iPhone through Pinger, a cross-platform texting app. Tweens, ages 8-to-12, can …

Tools to Organize Your Finances Online

Whether you want to shop less, save more or just cut down on debt, managing your finances is hard. But these days, it’s easier than ever to get help — without shelling out for pricey financial planners or accountants. There are tons of services and apps available online, and they can help you with everything from making monthly budgets to …

What’s The Weakest Link In My Computer’s Security?

When it comes to computer security, there are many steps you can take to reduce your chance of a security threat. Of course, you need antivirus software installed on your computer. Be sure to log out whenever you’re finished with a website. Never open an e-mail from an unrecognized sender. What’s the most common security mistake people make online? Forgetting …

What’s a Blended Threat?

Strength in numbers also applies to computer viruses. The more threats combined together, the more powerful and destructive it is. A blended threat is just that – a number of different viruses, computer worms and other harmful malware combined. Essentially a blended threat is just a type of computer threat that uses multiple techniques to attack an operating system. One …

What is Latency?

In the tech world, slow websites with a high page load time can be frustrating. Latency is another term for a website’s load time. Tammy Everts, an expert at Webperformancetoday.com, defines latency as “the amount of time it takes for the host server to receive and process a request for a page object. The amount of latency depends on how …

What is Phishing?

Think of phishing as fishing for information. Phishing is a fraudulent attempt to obtain your personal information, and it almost always comes in the form of an email. The hope for these Internet criminals is to get your credit card number and even your social security number, along with various passwords and account numbers. What they want is for you …

What Is Java?

Chances are you’ve visited a website or downloaded a program that insisted you download something called Java before it would work. This can be a pain, especially if you have no idea what Java actually is. According to Lifehacker, “Java is a programming language that developers use to create applications on your computer.” With the web plug-in, you can run …

What Are Cookies And How Do I Enable Them?

Internet cookies might not be as intriguing as actual cookies, but that’s only because they aren’t a delicious dessert. Internet cookies are responsible for a lot of the things we do and benefit from online.   What do cookies do? Cookies are tiny bits of data that websites generate. Cookies get saved by Internet browsers to be used later. A …