92% of US teens are online daily
After two long months of computer games and ice pops, it’s time to head back to school. And with the new school year comes new gadgets, new friends and new past times. So this is the perfect time to speak to your kids about staying safe online.
Today’s hyper-connected environment presents amazing opportunities for kids to explore ideas they would never be able to otherwise, but it also presents many dangers. The more tools you have for keeping your kids safe, the better. Here are 7 steps for keeping your kids safer online.
1. Get Parental Controls – Because parents can’t be everywhere
Relax this summer, and stay safe online.
As essential as internet security is every single day of the year, June is Internet Security Month, which makes it the perfect time to review what it means to keep your computers, tablets and smartphones as secure as possible.
As you relax into summer, make sure that you are not relaxing your policies of vigilance when it comes to online safety for you and your family.
Hackers look for vulnerabilities that they can exploit.
If you look for the term zero-day attack in your home dictionary, you probably won’t find it.
Go ahead and check…I’ll wait.
You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).
Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Forbes, Time, and USA Today. So what’s the deal? If the term is so important, why isn’t in the dictionary yet?
As with so many computer-related terms, the phrase zero-day attack has recently crept into the lexicon of the common person, after being used by technical types for more than a decade. Also known as 0day attacks, zero-hour attacks and 0hour attacks, these are attacks that exploit a vulnerability in a computer application or program.
A vulnerability, by the way, is simply an error in a software that could be exploited. It isn’t a problem in itself, and it isn’t something that stops an application or program from working properly. However, if a vulnerability is discovered by a hacker, and if the hacker uses the vulnerability to conduct nefarious activities, then the moment these nefarious activities are discovered, it is known as a zero-day attack.
As you sit at your computer, have you ever thought about how someone could gain access to your PC and online accounts by exploiting some weakness or loophole? If that thought has never crossed your mind, now is a good time to start thinking about it. After all, if you’re not taking time to identify and address potential weaknesses and loopholes, cybercriminals are sure to take full advantage of them and make you an easy victim of cybercrime.
Continue Reading… To Prevent Cybercrime, Think Like a Cybercriminal
- May 2nd, 2012
- 9 Comments
The Internet has proven to be a powerful and useful tool for billions of people worldwide. However, in the same way that you shouldn’t leave your house unlocked, you shouldn’t venture online without taking some basic precautions. Where do you start? Learn more about online threats and ways to protect yourself.
Continue reading…Online Threats 101