Self Defense Products

Security is one such aspect that cannot be ignored, in the world where the crime rate is increasing with each passing day. When we take a look around we notice that there are few only who take care of each and everything related to security while many just neglect it, thinking that they are safe all the time. But someone who has the intention to harm you will never give a notice beforehand....more

Wake Up People - Facebook Messenger Isn't Reinventing The Wheel!

It was a typical morning, I opened up Facebook and what do I see?  Well, a newly gone viral article talking about Facebook's Messenger App and how appalling the Terms of Service are for it.  So, since it was posted on Huntington Post, I decided it must be worth reading and gave it a shot.  I admit, as I read through it the first time I was a bit taken back....more

Strange Customs

I'm not trying to be disrespectful. I'm just thrifty.My husband swallowed a laugh as the customs agent replied that I would have to give the banana peel to the Agricultural Inspection Agent.Beginning to comprehend the gravity of our situation, I quickly stuffed the banana into my mouth, passing the rest to my ever-helpful husband....more
henmom Thank you! You just wrote the first comment I've ever received on BlogHer!! Get yourself ...more

4 Simple Tips to Make Your Home More Secure

As a parent, there are so many moving parts to your daily routine. More often than not, home security falls off that ever-growing list. But with homes being broken into every 14.4 seconds, it is time to reevaluate your home security!...more

Private Identifiers Not Private

Today’s commerce occurs very much online, with products and services ranging from A to Z. Hence, these many online merchants have hundreds of millions of people around the globe registered with them for convenient purchases....more

7 Laptop Security tips for the Traveler

Here are nine ways you can add a lot of security to your laptop when traveling....more

Multifactor Authentication trumps knowledge based Authentication (KBA)

What is knowledge-based authentication? The KBA design asks the user to correctly answer at least one question, a “secret” only the user would know.There are two types of KBA: 1) Answering a question that the user has pre-selected (static scheme), and 2) Answering a question that’s determined by garnering data in public records (dynamic scheme)....more

Security

My house feels like the safest on the block tonight.  I am currently dog-sitting my Mom’s dog, Keisha.  I also have a dog, Kloë.  I know, neither of them seem fierce….And neither of them look fierce….But when they bark when someone’s at the door, I feel very safe....more

6 ways to declutter your digital life

It’s the New Year so time for new starts and new resolutions. With a new year upon us, now is a good time to clean out the clutter. Clutter is overwhelming, messy and inefficient and it transcends in both our physical and digital lives.Here are some tips to help clear the clutter out of your digital world.1. Backup the Data on Your DevicesYou are (hopefully) about to delete lots of stuff....more

Devising a data security strategy

Whether you are an individual who games, a work-at-home employee, a family of four that shops online, a road warrior or even a small business, chances are you have data to protect—and so this all pertains to you.Fundamentals:...more