Archive for the 'Internet Social Networks' Category
Saturday, September 5th, 2015
Itay Glick is the CEO of Votiro Inc., an internet security services technology firm that specializes in identifying unknown threats embedded in emails and data exchanged in the context of an enterprise network. “The phishing threat is not just a concern for businesses,” Glick said, “Everybody is vulnerable. Phishing emails are sophisticated and contain references that are relevant to the user.” This is what is known as “spear-phishing” scams, which are personalized to deceive.
Monday, August 24th, 2015
Back-to-school is a time of new experiences and new peer groups, on and off-line. Kids will be exposed to new apps and on-line hangouts, where there is always the risk of bad actors taking advantage of vulnerable youth. And banning kids from mobile connectivity and social media is not going to keep them safe, because they can keep their access a secret – making them even more vulnerable.
There will be drama. It is a part of growing up. But certain apps truly stir drama into cyberbully ...
Monday, August 24th, 2015
As the guardian and teacher of personal security, one of the most important things a parent can do with tech-savvy kids is establish and maintain open communication. This is a lot easier said than done for two main reasons: 1) cyber communications makes it easy to keep secrets that harbor risk, and 2) the lack of control about the experiences of our children’s childhoods has never been greater.
Monday, June 15th, 2015
Texting apps are web-based and photo-centric and the barriers to access are very low as the innovation makes it easier for people to assemble and authenticate networks. And cyber connectivity is easy to keep it secret from parents. The challenge with texting apps is that it also lowers inhibition – leaving the door wide open for gossip, sexting (inappropriate photos) and bullying. Children witnessing or experiencing these assaults on individuals feel shame, guilt or fear and will be motivated to keep it from you. Below are a couple of considerations for parents to maintain an appropriate and instructive presence in their child’s texting life:
Tuesday, February 24th, 2015
It is only human to “reach for the stars” and share our dreams with one another, but we can’t actually make these things reality if we settle for a habitual routine of “liking” and posting.
Tuesday, December 30th, 2014
Friday, December 26th, 2014
Indeed relating to the modern child, (who is more worldly and empowered by the feeling of validation in a tap-and-click world), requires more proactive thought, reflection and conviction about your personal worldview. In generations past, the social norms for civilized conduct and compassion for fellow human beings were generally supported by the wider community norms and children were socialized at home and school accordingly. Today, the modern culture of entitlement amplified by internet-powered connectivity blurs the boundaries for personal responsibility and security.
Monday, December 15th, 2014
Last Wednesday the Sacramento Sheriff’s Hi-Tech Crimes detectives arrested a 21-year-old man for possession of child pornography. According to the press release, he had been employed as a recreational aid at a Sacramento region elementary school and after school program. This arrest reminds us that bad actors can appear harmless and go undetected while they are actively searching for victims on and off line. So how can parents protect their children?
Detective James Williams, of the Sacramento Sheriff’s Department of Internet Crimes Against Children wants parents to know that predators target youth who are seeking love, affection and attention – for whatever the reason. “The child is searching for something and the predator is targeting this vulnerability,” he said. Williams says that parents ask him about recommendations for spying software, which he does not encourage. “The best approach is a positive one,” he said, explaining that spy software will not solve the problem if you are not involved with your children’s life. “It is easy for kids to keep secrets with the texting apps like Kik Messenger, which is not a part of the texting function,” he said.
Monday, October 13th, 2014
Parental control settings have limited value, more like the training wheels on a bike. Before long the child will master the device and the controls. Parental controls have value as instructive ways to engage and maintain an ongoing dialog with the child about purpose-driven use of the cyber tools.
When the use of parental controls are perceived as training wheels to help the child develop their own self control essential to be secure in the network, the signal conveyed to the child is one of confidence in their ability to become a responsible user. And so the aim of parenting with parental controls is to prepare the child to be in control, and for the parent to monitor in age-appropriate ways.
Monday, September 29th, 2014
There are cyber device settings and apps that parents and kids can deploy as a part of your anti-bully strategy. The aim is to create boundaries in the cyber tools and in your child’s own hearts and minds embrace the correct thinking and actions in confronting a bully mentality. The most important thing parents can do is use these tools to inspire open dialogue about recognizing and responding to mean-spirited, nefarious or unkind communications in the children’s cyber social realm.