Mobile Devices

Today’s cellphones and smartphones are literally hand held computers that connect us to a world of information. While they undoubtedly make our lives easier, they are also tools that give others direct and constant access to us.

Today’s cellphones and smartphones are literally hand held computers that connect us to a world of information. While they undoubtedly make our lives easier, they are also tools that give others direct and constant access to us.

  • Protect your phone with a password or Personal Identification Number (PIN).

  • Be careful when you install apps on your phone. No matter what kind of phone you have, install apps from a trusted source.

  • Make sure your phone has a feature that helps you find it if you lose it or if it is stolen.

  • Refrain from doing any payments or transactions on a public network

  • Consider installing a security application on your phone

If you have kids, keep these safety tips in mind:

  • Pick a service plan with the functionality and mobile phone safety features that are right for each child. Add features such as text messaging, photo-sharing, or Internet access only when you feel your child is ready to take on each new responsibility.

  • Define clear rules for sensible use and the consequences for breaking them. Talk about usage: who they can talk to or text and when, the websites they can visit, and so on.

  • Clearly explain why you are using safety tools and what they will do for your children's information security. Consider setting them up together.

  • With older kids, use of camera and video are fun, but it can invite bullying and enable the sharing of suggestive photos or videos (known as sexting). So remind kids not to say, text, or post anything that would hurt or embarrass themselves or someone else.

  • GPS tracking makes it possible to pinpoint the location of the phone—and the child. You can use this to monitor where your kids are, but if it is not used carefully, so can others. Furthermore, smartphones may tag a photo (geotagging), revealing precisely where and when it was taken.

Immediately report physical threats, persistent cyberbullying, or any form of exploitation to the police and your carrier. For more information

 Read More...

 

Saltus Video

IWF Bda Portal poster

 

Identity Theft

Unfortunately Bermuda is not immune to fraudulent...

Read more ...
Fraud


What should you do if you fall victim to a scam?...

Read more ...
Social Networking

Your kids may use social networking sites designed...

Read more ...