Saturday, August 13th, 2016
Ultimately, the kind of leadership required to empower family life in the cyber wilderness is anchored in faith. Much like the authority of the people empowered by their Creator provides limited power to a government of the American republic, the authority of the parent is inherent and cannot be seized. It can only be lost if it is surrendered because it is a divine appointment.
Tuesday, March 15th, 2016
Certainly for families technology can be a very disruptive influence. The power crisis of mobile connectivity landing in the hands of youth, happening today at earlier ages, can be summed up in one question: when it is easy to believe that you can simply google anything you think you need to know, who needs a parent, teacher, coach or a benevolent deity to impart wisdom?
Monday, February 8th, 2016
In the social network, trust is the currency, and there is always something new to learn about the latest social media apps, changes to the existing most popular social media apps, and the tactics of cyber thieves and criminals to gain our trust and then exploit us. And so it goes with viruses and malware which are scripts and codes and apps designed to exploit individuals by stealing identities from social media accounts and other personal data accounts including banking, and/or to torment through cyber bullying and stalking.
Tuesday, January 5th, 2016
Effective January 1, 2016, the State of California is enforcing new rules for law enforcement to gather personal data, and for manufacturers of devices and web-enabled services, such as smart televisions and parking security services. The aim of the legislation is to protect the on-line privacy and civil liberty of citizens. And while legislation provides some very important safeguards against the abuse of personal data provided by consumers and citizens, the most important privacy measures are learned and enforced at home. This is to provide an overview of the new on-line privacy laws, and reinforce the things we must do at home to protect privacy.
Monday, November 9th, 2015
Email hacking is just one of the many ways in which cyber criminals seek to access personal information in order to exploit and plunder. As people become more accustomed to smart devices, every consumer product is web-enabled. The common term for this new reality is the “internet of things”, or IoT. Literally everything from cars to refrigerators and baby monitors are equipped with internet-enabled programming to operate remotely, according to consumer-prescribed settings which enhances convenience (for setting alarms, timing events and enabling remote access) and also introduces an element of risk from cyber hackers.
Monday, October 26th, 2015
If you sat down to calculate the number of on-line accounts associated with your email and/or phone number, it may be more than 20 - and setting and remembering secure passwords can be a challenge.
Sunday, August 30th, 2015
The AshleyMadison hack is the most recent and widely published breach of cyber security that casts a long shadow of security concern for every individual that relies upon internet connectivity for daily life. Whatever your sentiments about this web-enabled service dedicated to helping people to cheat on their spouses, the malicious exposure AshleyMadison’s clients experienced from the hacker vigilantes nevertheless reveals a very real threat for personal data security and privacy in general.
Monday, August 24th, 2015
Back-to-school is a time of new experiences and new peer groups, on and off-line. Kids will be exposed to new apps and on-line hangouts, where there is always the risk of bad actors taking advantage of vulnerable youth. And banning kids from mobile connectivity and social media is not going to keep them safe, because they can keep their access a secret – making them even more vulnerable.
There will be drama. It is a part of growing up. But certain apps truly stir drama into cyberbully ...
Monday, August 24th, 2015
As the guardian and teacher of personal security, one of the most important things a parent can do with tech-savvy kids is establish and maintain open communication. This is a lot easier said than done for two main reasons: 1) cyber communications makes it easy to keep secrets that harbor risk, and 2) the lack of control about the experiences of our children’s childhoods has never been greater.
Monday, August 17th, 2015
Konow’s guidance is also relevant for cyber safe strategies to instill at home. They include knowing and representing yourself honestly, considering social media as a tool to support your personal goals, and realizing the impact of your on-line reputation and dealing with others posting and tagging images of you.