Mobile – Daily risks mitigated

If you don’t maintain the health of your device then you should expect that your device will at some point in the future become compromised in some way, shape or form.
What type of compromises may occur? How often? What can you do?
Let’s answer these in order…

Online Safety: Are bots in your twitter following?

Yesterday I had a an interesting sequence of events happen within my Twitter footprint that I had not seen previously. I had 11+ new followers, all who had over 100, some over 1000 followers. These new followers all arrived in my follower list in sequence over the course of the early morning. Each of these *individuals* had sent between 2-10 tweets, none of which were original content – all of them being RT (re-tweets) of pieces from trusted sources such as Mashable.

The Twitter handle/name had the format of “given name” + “3 to 5 random characters”. Click on the Figure-1 o the left to see all of these names which arrived in my follower list and you’ll understand the naming convention. Every single one of these names is a “bot” generated name.

read more…

Trust: Bad things can happen to good children (online safety)

In David Schwimmer’s TRUST, bad things happen to Annie, a good child. She is by all appearances a typical teenager – totally wired, online and available, 24/7/365. In the physical world, parents see with whom their child interacts. As the parents witness this interaction they are able to help guide and influence their child’s choices. The number one rule for every family: “The child must not engage in any personal meetings with an individual whom they have only met online without explicit parental permission.”

Safer Internet Day 2011 – It’s more than a game, its your life

Today, February 8, 2011 is Safer Internet Day. It’s more than a game, its your life. One can’t over emphasize how important it is to pay attention when you and your family are online. The internet is integral to our daily lives. Online is where we live and we need to stay safe online.

Here are a eleven tips to achieve that goal:

How does my child access the internet? With whom is my child engaging?

A question which every parent should be asking themselves, “How does my child access the internet?” “With whom is my child engaging?” The array of answers may startle you. So make no assumptions. Why does it matter? Knowing how your child accesses the internet and with whom they are engaging are the first steps in crafting an online safety plan for your child. I have said it before and will repeat, our family is our responsibility.

Passwords – Creation & Usage – Online Safety & Security

Do you use a password? The evolution of online crime is as much about your password strength as it is about your password usage. If you use your strong password for shopping site A and then reuse the password for shopping sites B, C, D, E, F then you are basically saying to yourself – “I trust each of these sites to have the same robust level of security”