The 12 Days of Christmas: Tech-Style

In the world of social media, each site or channel offers slightly different ways to communicate. Twitter allows for only 140 characters, YouTube features videos, Flickr features photos, etc. And while some choose to share Twitter updates on their LinkedIn profiles or the same news on Google+ and Facebook, I have posted unique content on all of my sites. But sometimes, a situation occurs that causes a deviation from the norm. So, if you saw this content on my Tips4Tech wall on Facebook, please excuse the repetition. But in case you missed any of these posts, here is the full list of 12 individuals or companies who bring valuable insights to all of us who live and breathe technology, or in the language of the season, my “12 Days of Christmas: Tech-Style.”

DAY 1:

Introducing the firm of Fortalice, LLC, led by Theresa Payton, an infosecurity and cybersecurity expert who has been called, “a protector of the cyber universe.” Fortalice is a tech consulting firm comprised of cybercrime fighters who vigilantly watch over governments, businesses, and consumers in an effort to protect all from Internet predators.

DAY 2:

Introducing Identity Theft Expert and Professional Speaker, John Sileo – he provides important tools to defend against identity theft and data theft.

DAY 3:

Introducing Yoursphere, led by Mary Kay Hoal – the extraordinary social network for kids and their parents, where online safety is priority one.

DAY 4:

InfosecIsland is the website that combines an online community, infosec portal, and a social network. While designed for tech professionals who manage security, risk, and compliance issues, the info provided by bloggers is useful for businesses of all sizes, non-profits, and government agencies.

DAY 5:

For all the details as to how privacy issues affect the law as well as a perspective on how privacy issues are handled in Europe, check out Monique Altheim’s site, blog, and iOS/Android apps.

DAY 6:

Shaun Dakin of Dakin & Associates is an advocate who fights for everyone’s privacy rights. He leads weekly #privchat discussions on Twitter (Tuesdays at noon Eastern) and also founded the National Political Do Not Contact Registry.

DAY 7:

Introducing iLOOKBOTHWAYS led by Linda Criddle – with the belief that we all deserve the right to a positive and rewarding online experience, the goal is to educate consumers of all ages how to use online services safely.

DAY 8:

Introducing Computer Data Privacy led by Shawn E. Tuma, a lawyer with experience in computer fraud, data security, privacy, the Computer Fraud and Abuse Act, unfair competition, and theft of trade secrets. Shawn’s posts and discussions can be found on his Blog, Twitter, Facebook, and Google+.

DAY 9:

Recognized as one of the “Top Influences in IT Security” and one of the “Best Privacy Advisors in the World,” Rebecca Herold is an internationally-known author, blogger, instructor, and consultant specializing in information security, privacy, and compliance.

DAY 10:

Shawn Marie Edgington is America’s leading “Texpert” and cyberbullying prevention expert and also referred to as the “cyber-safety mom.” She is the author of the book, “The Parent’s Guide to Texting, Facebook and Social Media,” and the founder of The Great American NO BULL Challenge, a youth-led national campaign against cyberbullying. As CEO of a national insurance firm, she advises clients about the repercussions of inappropriate social media and harassment in the workplace.

DAY 11:

You’ve seen him on TV and online, and that’s because Identity Theft Expert and Speaker Robert Siciliano is committed to empowering everyone to avoid becoming victims of phishing scams, data breaches, cybersquatting scams, ID theft, and a myriad of other online crimes.

DAY 12:

While the newspaper and publishing industries are evolving to keep up in the digital world, one brand continues to set the standard. Check in daily to see the latest in tech news and analysis from The New York Times – also follow on Twitter at

Happy Holidays to one and all!


About Allan Pratt

Technology and cybersecurity professional with focus on tech news, cybersecurity, networking, infrastructure, data protection, consumer electronics, and social media.
This entry was posted in Data Security, Network Security, Online Privacy, Online Security, Privacy Rights, Social Media. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s