Log into InfoBarrel
Forgot your password?
Need an account?

Articles about information

What do you want to see?
Technology
by Leigh Goessl
4 years ago
Are Your Facebook Posts Putting You at Risk for Identity Theft?

While there are many advantages in social sharing, it is important to be aware of the drawback as well. Unfortunately, the criminal element of society lurks on Facebook looking to steal information from you. Those who actively share too much information, or the wrong kind of information, may find themselves particularly at risk.

Technology
by Leigh Goessl
4 years ago
Things You Should Never Reveal on Facebook

Being the most popular social network on the Internet, and up high on the list of frequently visited sites on the web, Facebook has a lot of alluring and compelling reasons to visit the site. It's philosophy is based on social sharing, however, what information should you keep to yourself?

Business & Money
by Leigh Goessl
2 years ago
Ways to Reduce the Chances of Your Identity Being Stolen

Despite the increase of public awareness about the issue, thieves are becoming savvier in the ways they try to steal personal information. As a result, it has become increasingly important to be proactive.

Lifestyle
by Leigh Goessl
4 years ago
Overcoming Information Overload at Work

Most everything we touch or do nowadays tends to involve some sort of data information. If we're not being given or seeking information, we're processing it. This tends to lead to information overload for some people. How to overcome being bombarded with information?

Business & Money
by Leigh Goessl
3 years ago
Credit Card Fraud: Avoid the Phisherman

Credit card phishing has quickly become a member of the growing list of email frauds. Credit card phishing scams are clever because of the way they use social engineering to lure unsuspecting people to give up their credit card information.

Lifestyle
by Leigh Goessl
4 years ago
Is Your Trash Can a Treasure Chest for Identity Thieves?

A trash can is a treasure chest for identity thieves. Think of all the sensitive information which still transpires on paper nowadays, eventually ending up as trash, and all the possible ways thieves could use this information.

Business & Money
by Leigh Goessl
4 years ago
How to Avoid Telephone Banking Scams

Despite the rise in popularity of Internet banking scams, telephone banking scams are still very much alive and kicking. Now that scammers have found ways to circumvent caller ID blocking and intercept calling devices, every day there are likely thousands of people receiving calls that are less than legit.

Business & Money
by Leigh Goessl
4 years ago
Are Some Businesses Putting Too Much Risk on Personal Data?

Today's businesses are highly data driven, and the information compiled from consumers is a valuable commodity. Unfortunately, often businesses are liberal with the information they derive, however, do they always necessarily take due care in protecting your data?

Technology
by Leigh Goessl
3 years ago
You Can Get Free Stuff Online, But is Anything Truly Free?

Tapping into the power of the Internet to distribute freebies is a great way to try and gain a competitive edge over other companies. As a result, there are a lot of legitimate items to be found available to consumers - most at no monetary cost at all. But is there a cost?

Business & Money
by Leigh Goessl
3 years ago
Don't Get Snagged by the PayPal Phisherman

Since PayPal is so popular, the scammer realizes if he or she sends out mass numbers of email posing as the company, there is a strong chance the recipient uses this website. With the large number of phishing emails sent out, the probability is high at least a few people will click.

Technology
by Leigh Goessl
3 years ago
Understanding the Relational Database

There are a few different types of databases, but the relational database has been, by far, the most popular. The concept of a relational database was originally developed in the 1970s by E.F. Codd.

Technology
by Leigh Goessl
4 years ago
Disadvantages to Converting Healthcare Records to Digital

Using technology to manage patient records provides many advantages to establish a uniform means of collecting and storing patient data for both the medical provider and the patient. However, there are some disadvantages too, and some can be significant.

Technology
by Leigh Goessl
5 years ago
How Copy Machines Can Contribute to Identity Theft

Copy machines are handy devices, but are also a serious risk when it comes to data breaches. This article takes a look at the ways exploiters can use the sensitive data stored in copy machines.

Business & Money
by Leigh Goessl
4 years ago
Risks Associated with Using Paper Checks

For a variety of reasons, paper checks have not gone extinct just yet. Both online banking and traditional paper banking have its pros and cons, and one of the cons of using paper checks is there are many aspects of using paper checks which may put you at risk for fraud.

Technology
by Leigh Goessl
4 years ago
Why Deleting Files From a Hard Drive Isn't Enough to Prevent Identity Theft

A large amount of private information is routinely filtered through personal computers. Identity theft is big business, the losses associated with this type of crime is cited as being more than $50 billion a year. Without proper disposal when ready to upgrade, you could be subjecting yourself to ID theft.

Business & Money
by Leigh Goessl
3 years ago
Scam Alert: When to Flee from 'Free'

Today, consumers can get many products online, free of charge, by providing some personal information that is valuable to marketers. Others may want people to take a survey to highlight their personal preferences. But not all offers are as good as they seem.

Business & Money
by Leigh Goessl
3 years ago
Ways Grocery Stores Use Rewards Cards for More Than Just Discounts

Grocery discount cards are very useful on many levels. For consumers, they offer savings or perceived savings on grocery items, and this attracts many people to apply for a card, but for grocery stores, the value is potentially so much more.

Business & Money
by Leigh Goessl
4 years ago
Missing Valuables to Consider if Your Wallet is Stolen

Today's more sophisticated and savvy thieves are aware of the value of the cards, documents and other necessities people carry in their wallets. Many thieves will go to extravagant lengths in order to get the information contained in wallets.

Lifestyle
by Leigh Goessl
4 years ago
Things Facebook Tracks About Relationships

Users of Facebook share information about everything from what they ate for breakfast to their favorite YouTube video of the week and much in between. In the course of communicating with family and friends, many members also share more intimate information, and perhaps without even realizing they've done so.

Business & Money
by Leigh Goessl
4 years ago
Hot Job Opportunities: Cybersecurity

Companies today can no longer afford to ignore information security and, it's not just the private sector where it is a concern. Public facilities, such as government and schools, also must invest in security. As a result, information security is a rapidly growing field for job opportunities.

1 2 3 ... 8
© Copyright 2008 - 2019 by My Passion Media Inc. Terms of Service Privacy Policy XML Sitemap