As this story unfolded and I was left all day without access to some of my favorite social networks and worse yet the tools and 3rd party apps I use, along with millions of other users experiencing those same problems... if large companies and major corporations can have these kinds of attacks, what makes us think we are not just as vulnerable even more so, because we assume we are protected... oh MY!!
There are many ways to accomplish this task, but first lets find out if you really want to completely block sites like these or if want to restrict access by children, or allow teens access and monitor their online behavior. The latter choice/option being the preferred way to go. You know as well as I do, if you make restrictions on teens or you stop them from doing something as a form of punishment they will find a way to undermine your authority. They will find a way or sneak online somewhere else. And the possible outcome could be very tragic.
We had such a great response for our last series of Top 10 lists… the (30 Top 10 Ways)!! we decided to do a brand new updated Top 10 Lists for the Top 10 Security Issues for 2010, 2011, 2012, 2013
We hope that you find our research is useful and pays big dividends, in giving you the tools necessary and especially the knowledge to protect you and your family… but importantly Keeping Our Children Safe, should be every persons responsibility in this new net generation we all find ourselves in now, closing out the first decade of the millennium…
The first Top 10 list is based on a very hot topic right now, and is fast becoming a nation wide and global problem that it is called: SEXTING
As new as this trend is figures from a recent study suggest that it is far from rare. The results of the study suggest that up to 40% of teens have been asked to send nude photos of themselves electronically and possibly up to 20% of teens have actively engaged in sexting.
Please check out all of the other Top 10 List… as they become available:
Special Report : top-ten-ways-to-protect-your-online-privacy
Also, if you have not seen our first series Top 10 Ways List… Go Now The Best 30 Of The Top 10 Ways
As Always Be Safe Online, and if you find you have topic’s or ideas on other subjects that you would like us to investigate or create a list please email us our use our contact form.
Thanks for all the support and please Learn IT, Teach IT, Share IT!
Your Online Security Authority
Great info… and some good advice for parents, families, home owners and business owners as well, that they can use to protect themselves!!
A recent study done by the American Psychological Association found that of all internet offenders only 5 percent pretended to be teenagers. Most of the time teens met with offenders more than 1 time. They also found that teens who engaged in risky behaviors like maintaining friend lists with people they did not know were much more likely to receive online sexual solicitations. The problem is, most teens are still not as concerned about the risks of sharing information and photos to the public.
When I was in elementary school, I got a lesson from my teachers every year about saying no to drugs. To be honest, I didn’t quite understand what drugs were. I knew about ibuprofen and stuff like that, but the idea of recreational substances was foreign to me (even though I knew I was always supposed to say no to whatever people offered me).
I for one am happy to see MySpace using new technology to weed out sexual predators, and start taking a proactive roll in the process, everyone has to be aware of the behavior of online predators and pedophiles and we need to really start to understand the new face of the 21st century predator they are not who think we they are, find out here from Julian Sher!
Bullies have been around since the beginning of time. Traditionally, these tormentors have been associated with vicious verbal taunts and teasing. In contemporary times, technology has been a tremendous “boon” for cyber bullies. Lack of supervision, bully anonymity, and victims’ ubiquitous proximity to electronic devices are the main facilitative factors.
Twitter is an interesting social network, since you only have 140 characters to say whatever you want. You cannot post pictures or videos but you can post URLs to them. Many people have embraced twitter as a source to vent out their daily musings or to “follow” their favorite celebrities to get an idea of their life. Parents should be cautious as to how and why their kids are using Twitter. There is nothing bad about Twitter, in fact it has many advantages. The fact is teens need to be careful as to who follows them and especially what they tweet.
Security systems are also in place to monitor which computers you use to log on to the bank site. Whenever you log on to the site from a computer that is not your regular home computer, you are asked to provide additional information. Most banking systems will generate a security question that you answered during account setup… Protect Your Identity | Part I | Part II | | Part III |
Ask your bank if they can assign a second active user name associated with the same account. Explain that you access your online bank account a lot in a public environment, and you want the additional security of a limited-rights user name. Some banks gladly add the second access avenue. When accessing your online bank publicly, use only that second access information set.
No matter how expensive or highly-rated an alarm system is, or no matter how many precautions someone takes, a home invasion is always a possibility.
We hope you’ve enjoyed our look at various online fraud techniques used by the unscrupulous. You can find the previous two entries here and here. Our final post will dive into one of the biggest hubs for rip-offs and scams online, eBay. Since its inception, people have taken advantage of trusting buyers on eBay and other auction sites. We’re going to highlight some of the sure signs of potential eBay fraud and how to dodge it.
Of course, internet crime is not usually violent crime, it tends to be more along the lines of destruction of property, through viruses and worms, and thefts through the use of scams and ID theft. But these crimes are highly destructive to people’s lives, as well, and need to be taken just as seriously as any other.
Identity theft is a crime that occurs when someone steals your personal information, such as your name, Social Security number, or credit card number, then without your permission uses that information or card to make an illegal purchase or conduct a fraudulent transaction. The report by Javelin Strategy and Research also shares that, despite repeated warnings about the hazards of social networks as a great resource for fraudsters, “consumers are still sharing a significant amount of personal information frequently used to authenticate a consumer’s identity.”
The U.S. Department of Defense requested $3.4 billion for its Cyber Command in 2013. Yes, that’s billion. If that’s not enough evidence, there’s always this sobering analysis from a federal report titled Cyberspace Policy Review: