Posts Tagged ‘Communication’

Articles

Kids and technologies: 6 basic tips to bear in mind

In Security,Teenagers,Uncategorized on January 3, 2012 by tecnologyantivirus Tagged: , , , , , , ,

Published by Ana Etxebarria

Continuing our series of articles on children and new technologies, today we give you some simple tips to make sure your children stay safe on the Internet.

Last week I posted an article describing two different approaches to parenting in the digital age: controlling and permissive; and despite I am clearly in favor of the latter approach, I am also aware that you cannot lower your guard when dealing with Internet risks.

I still believe that interaction on the Internet is not very different from real-world interaction, and people who manage well in real life do at least equally well in the virtual world. In any event, I must admit the online world may pose additional risks due to the Internet’s immunity and anonymity.

How can you help your children deal with that threat?

  1. Just as you know about your children’s friends, you better also know who your child contacts on the Internet.
  2. Keep an eye on how much time your children spend online, including other points of Internet access too, like smartphones and gaming consoles.
  3. Just as you teach your children never to talk to strangers or accept gifts from them, remind them never to physically meet anyone they’ve only become friends with online. If they decide to meet a cyber-friend in person, go with them.
  4. Talk to kids about the types of information they post online and how it can impact their reputation and future. Kids can unknowingly give out personal details about their life that could be maliciously used… And embarrassing and inappropriate photos and comments can stay with you forever.
  5. Teach them to be cautious with giving too much personal information, such as their location, their parents’ working hours, hobbies, etc. The less potential ‘unfriends’, the better.
  6. As Facebook makes frequent changes to its privacty policy, it is a good idea to sit with your kids and check out their online profiles with them. Pay special attention to their privacy settings and which messages, photos and personal details are accesible to whom.

Are you comfortable monitoring your child’s online world? What are your family’s technology ground rules?

Advertisements

Articles

Social media, teens and parents… Friends?

In Security,Teenagers,Uncategorized on December 28, 2011 by tecnologyantivirus Tagged: , , , , , ,

Published by Ana Etxebarria

Social media has become an extension of the high school playground for the vast majority of teenagers, with its share of flirting, drama, cruelty and flashes of maturity.

In addition, electronic behavior has become a new frontier of parenting and, as a result, our own behavior may be changing as fast as our kids. We’re watching them more closely, talking to them more about online activities and understanding that social media has become part of growing up.

Friends

Friends

Another surprising fact is that 80 percent of parents who use social media (and who also have a child who uses social media) have friended their child on these sites.

This ‘friendship’ poses a dilemma for parents, who have to choose between being controlling parents who check which websites their children have visited, use parental control software, etc, or permissive parents who don’t embrace the trend to monitor and encourage their children’s autonomy.

According to recent studies, only a small percentage of parents (about 15 percent) consciously avoid monitoring their children’s online activities because they trust them. In my opinion that is an incredibly low figure.

I am a mother of three and I belong to a generation where social interaction between children took place in the playground. Well, let my tell you something: back then parents also fell into one of the aforementioned two categories. There were those who didn’t trust their children despite in some cases not having a reason for not doing so, and those who trusted them. Luckily, my parents belonged to the latter group although I had close friends whose parents showed an incredibly high level of distrust towards them.

So, if you think you know your children well enough, there is good communication between you and them, you are a good role model for them, and there is no reason to the contrary…Why not trust your kids? Why are we so worried and why some of us get so intrusive?

Not so long ago a friend of mine told me that they had installed some sort of ‘spyware’ (I can’t find a better word for it) on their 11-year-old son’s computer and they monitor every step he takes online: the games he plays, the sites he visits, the time he spends on each page, the photos he downloads, who he chats with, the content of his conversations, etc. Isn’t it terrible? That’s like reading someone’s journal, tapping their phone lines or hiding cameras in every room in their apartment.

Do you monitor your child’s social media activities? Do you use parental controls? Why or why not? I’d love to hear your opinions or personal experiences.

Articles

Why do we act so differently in our virtual worlds?

In Presentations,Uncategorized on May 19, 2010 by tecnologyantivirus Tagged: , , , , , ,

Published by Darragh Kelly, May 19th 2010

Social media is being embraced by individuals and companies in all industries and internally across all company silos. Whether companies are adapting to or embracing new media correctly is up for discussion what is not however is the ever increasing use of this new media which is gradually becoming more integrated in today’s business communication processes.

So we are all, the business and individual, starting to leverage the many benefits of being connected to the masses in this new form. However, there are also other not so positive aspects to this connectivity; whilst minimal they must not be discarded.

security_lapiazza_support_blog_75

  • Anything that connects or congregates the masses has a certain element of risk and this risk must be managed. We can see this quite clearly in airports, train stations, sports stadiums, etc. In these physical spaces we can see that security is implemented to counter act the probable risks.  In these situations we can see how the officials at these physical spaces (airports,…), take these security precautions on our behalf and for the overall integrity of the environment.
  • As individuals this security is comforting, even though we may complain about long queues, etc. we understand that it is necessary. However, we also know that this security is not all inclusive. When we are in crowded areas, even though official security exists, we are always more conscious of our vulnerabilities. For the same reason we take certain precautions in order to protect ourselves. Such precautions could include making sure our bags are closed, that are wallets are in our inside jacket pockets and difficult to access. My wife, for example, will wear specific hand bags which she wears closer to her person.
  • In addition, if we see posters like “Beware of pickpocketers” we are even more cautious, this makes us recheck our personal security protocol: our wallets, money, passports, etc. and we do this almost sub consciously.

So we know that there are inherent risks in crowded areas and generally speaking we act accordingly and if we are additionally warned we will become even more cautious.

So, why then do we congregate through social media without taking any precautions? And why do we not pay any attention to the security warnings? I know that all IT security companies, including my own Panda Security, are trying to get those “posters” everywhere they can but apparently it is proving to be an uphill battle.

I am no anthropologist but I have a theory as to why this happens, and like all theories I cannot prove it and I don’t claim that it is right, it’s just my theory…in which I think the following 3 factors are part of the problem: environment, pain (cause and effect) and social fabric.

Before I go into each point above I would also mention that there is an obvious variable in this equation and that is the novelty of the threat. It is all so relatively new, we still have not been affected enough to internalize the situation as we have with other threats so I believe there is a learning curve here in which we must mature and the socialization of this information is key. However, that being said I still feel there are other factors which are not so tangible and they are as follows:

Environment:

  • Physical: In the physical crowd we are more cautious in unfamiliar spaces. This is a basic defense mechanism in which we constantly look for the known and when we do not find it we know that there is a variable of risk. The risk variable causes uncertainty and influences our actions, as such we take precautions.
  • Virtual: We congregate in our virtual worlds (networks, communities) whilst, obviously, being physically in our safe, familiar physical contexts, such as our homes or work places. As such we do not perceive the danger associated with our virtual surroundings, it gives us a false sense of security.

Pain (cause and effect):

  • I  am outside my knowledge area here, however I will try. In the physical world if you get pick pocketed this would be a horrendous ordeal for the person involved. I would imagine that this creates a feeling of personal vulnerability and sense of violation. This has never happened to me; however it is pretty clear in my mind that there are serious consequences if I am not careful. You can visualize the consequences and as such internalize what could happen.
  • In the virtual world, however, it all seems to be a lot of harmless clicks. You cannot visualize the actual attack as it is all a lot of 101110011001. Also we do not associate The negative consequences, and believe me they exist, with our actions. Our PC runs slower, Internet connection is slower, PC blocks completely. At a business level, mail servers running slow, staff complaining about IT problems etc. However, we do not have that same clear cause and effect as we mentioned in the real world, it is obviously annoying what is happening but…. these things happen, …after all its IT, right?

Trust / Social Fabric:

  • It has been seen at least in virtual gaming worlds that gamers have an instinct to trust.  The attitude of gamers in virtual online worlds is to trust and share resources and challenges with unknown strangers. I am sure this can be extrapolated to nearly all virtual networks. Personally I am more trusting in a virtual environment due to the two points mentioned before, I do not perceive danger and I see so negative consequences that could be associated with my actions.
  • I have no doubt that the socialization of these real risks will have a direct impact on the points mentioned above but it seems that progress is slow. This is a huge challenge for the entire online community as a whole and this is my small contribution to an improved understanding of the risks that are out there.

So the take away here is be informed of the risks, be aware and take the necessary precautions. This is not rocket science by the way; there are very simple steps to take which can reduce the risk dramatically.

To get informed I would recommend that you sign up to a security feed which gives updated information about IT security issues and good practical examples on what you should do to protect yourself and data. There are plenty of excellent blogs and sites out there that are endeavoring to socialize this information. I can share the ones I use.

=================================================================================

My name is Darragh Kelly, I am a native of Dublin but have lived in Spain since 2000. I have worked in Panda since 2001 and have been fortunate to have been able to have work in many areas within the company; QA, Tech Support, Training and shortly I will begin a new career challenge in Product Marketing. I find all forms of communication fascinating.

If you want to contact me please check out my blog http://www.darraghkelly.me or follow me on Twitter http://twitter.com/D_P_Kelly.