Lifestyle

Keeping Your Children Safe in the Age of Smartphones

Monitor Your Kids’ Activity

A simple Norton Security Premium account will give valuable insight into your kids’ activity on Android phones, as well as allow you to control the kind of content they can install or access, they don't even need to know you are watching.

Some of the options include turning off YouTube access, you can see these restrictions as installing a PG rating on less than child-friendly material which is still widely available.

Unwrap your Christmas goodies with care.

This security concern, is entirely valid and is being demonstrated to us, over and over. Amazon, for example, has several fingers in cyber pies when it comes to turning entire product lines at Lowes into a shade of something digital, including Cloud Cam and Amazon Key which offers remote access to your home for delivery people.

The problem is, as soon as Amazon Key was introduced, the news headlines spotted that the remote video may have a fatal flaw and that residents may be viewing a still image, whilst dubious delivery men are robbing their home.

The Great Cyber Conspiracy

Well, turns out that this conspiracy could have more to it than meets the touch screen.

This week the US Department of Justice reportedly gathered enough evidence to charge at least six Russian government officials with hacking the elections. Earlier this year the US government had concluded that Russia was behind the hack, and now they have finally found enough evidence to put some ink to their claim.

The hack itself:

Facebook threats

The implications may not go straight to your bank account, although obviously the intention is to get there eventually, but it does go right to the core of our precious virtual life.

Social Media enthusiasts spend their idle time clicking or swiping on interesting articles or comical memes on Facebook without giving a thought of what they are linking to and if it poses a threat.

U.S.A – The Cyber Doomsday Preppers.

This time, hackers have been trying to access numerous email accounts in a brute force cyber-attack, predicted to last several days. Members of the Scottish Parliament’s accounts are being locked out to safeguard their private information.

The National Cyber Security Centre (NCSC) is working closely with the Business Information Technology (BIT) Office to both locate the hackers and minimize the damages. Luckily, there was no evidence that the defense of Holyrood as a whole (the Scottish Government) was compromised, in any way.

Coding Bootcamps

Our complete reliance on computers and cell phones are only the starting point of our tech dependence. From your household appliances through to your business investments, being slightly tech-friendly, forget savvy, is the only way to make it through a normal day in contemporary society.

Economies are being transformed and are shaping our approach to the way we educate and raise our children, with far-reaching consequences.  We wince when we encourage our children to spend more time in front of the computer yet know secretly that they are going to need it.