Providing real Information and accurate service is always strong and powerful. Everyone wants to real not reality, you can not convince anyone of anything. You can only give them the Real Information, so that they convince themselves
To the world of computer technology, government, police and intelligence units, Cyber crime is emerging as serious threat. Cyber Security techniques developed to safeguard information systems stored on computers. Potential threats which is include the destruction of Computer Software and Computer Hardware and the loss, modification, theft, unauthorized use, observation or disclosure of computer data. Cyber security restricted to describing the criminal activity in which the computer or network is a part of crime as fraud, black mail and theft.
Cyber Security protect from theft, corruption or natural disaster while allowing the information and property remain accessible. It helps to understand the cyber security strategy, cyber ecosystem and science of cyber security. Cyber security deals with securing the future- “Securing for tomorrow’s world”.
Many Companies spend million of their dollars on firewalls and secure access devices and it’s money wasted because none of these measures address the weakest link in the security chain.
5 Stages of Business Cyber Security
Identity
Am: Asset management
BE: Business environment
GV: Governance
RA: Risk Assessment
RM: Risk Management strategy
2. Project
AC: Access Control
AT: Awareness Training
DS: Data Security
IP: Information Protection process and procedures
3. Detect
AE: Anomalies and events
CM: Security Continuous Monitoring
DP: Detection Processes
4. Respond
RP: Response Planning
CO: Communications
AN: Analysis
MI: Mitigation
IM: Improvements
5. Recover
RP: Recovery Planning
IM: Improvements
CO: Communications
Cyber security Process
Assess = Analyze Assets and Controls
Evaluate = Understand GDPR Maturity Based on Current Program
Build = Develop Road map to Fill the Gaps
Execute = Take Action with Strategic GOPR Readiness Road map
This process repeat again and again.
Process for Secure from Cyber Security
Awareness = A lot of hacks happen because staff is not aware of the risks. Encourage SMEs to educate more in terms of cyber security.
Strong Passwords = With strong password it is one step closer to being secured from breaches or hacks.
Updates = Updating is one crucial part of being safe, for example a lot of websites get hacked through plugins that are out of date and vulnerable.
Backups = Having duplicate copies of your information saved in a remote location keeps it safe in case anything goes wrong with your computer or website.
Firewall = Use the protective measures which can protect you even if you can not react in time.
Real Challenges of Cyber Security
The world economic forum again rated cyber-attacks in top 5 risks to society
Social networks are websites or apps that allow people to connect with friends and even make new fiends, virtually, and share content, interact, create communities of similar interests such as Working, games reading friendship relationships etc.
A social network has always existed, but the way in which it connects has changed dramatically .Some most popular social networks or social media apps are Facebook, Twitter, Yahoo, Blogger and LinkedIn.
If you’re not using SOCIAL to DRIVE TRAFFIC and therefore leads that convert to revenue, your brand is LOSING OUT.
Be a smart in social media can reduce many cyber bullying problems such as hacking, cracking, phishing etc. Do you know about meaning of SMART in social media?
S = Be safe –> Keep your personal information safe and secret. Think carefully before you share a photo of yourself or your friends.
M = Don’t Meet Up –> Never arrange to meet an online friend because it can be dangerous. No matter how well you think you know people, they might be pretending.
A = Accepting E-mails can be dangerous –> If you receive junk mail or spam messages that make you feel uncomfortable, tell an adult that you trust and delete them. Don’t replay to them.
R = Reliable?–> The Internet is full of friendly people and amazing information. However, sometimes people might say or write things which are untrue, so you should always think carefully before trusting what you see or hear.
T = Tell Someone! –> Most of the tie that you are online, you will have lots of fun. However , if you see anything that makes you feel uncomfortable or worried, make sure that you tell an adult that you trust.
Use passwords that are difficult to predict.
Avoid over-sharing information on social media.
Use secure modes of payment such as PayPal.
Security Issues of Today
The internet has allowed for mass communication among people, especially with comings of social media. With so many users online, we must learn to protect our self from threats, not everyone on the internet or every website is safe.
10 SOCIAL MEDIA POSTING RULES PARENTS SHOUKD TEACH THEIR KIDS
BE KIND : say nice things because you never know who will read what you say
BE SAFE : know who you are friending and talking to
BE SECURE : don’t share personal information with strangers
BE LEGAL : don’t download music or images that you didn’t pay for
BE PROTECTED : don’t share your passwords with anyone
BE ALERT : tell an adult when a friend is in trouble online
BE SMART : use positive words to build your online brand
BE RESPONSIBLE : don’t access sites and apps you should not access
BE CONSCIENTIOUS : be truthful, never lie or gossip
BE MODEST : don’t take or share inappropriate pictures on the internet
TIPS FOR YOUNG DIGITAL PARENTS
TIPS FOR YOUNG DIGITAL PARENTS
MODEL USE : When kids are around, set an example by using media the way you want them to use it.
START EARLY: Start when your kids are young by setting screen limits that work for your family’s needs.
MINIMIZE DISTRACTIONS: Hide your apps so they don’t display and shut down your devices during family time .
USE TOGETHER : Discuss media content with your kids. Be present and aware of what your child is doing online.
TURN OFF WORK: Set boundaries for work time and family time
They’re being distracted form other Important things and their friends:
57% :- of all teens agree that using social media often distracts them when they should be doing homework.
64% :- of teen social media users agree that it often distracts them when they should be paying attention to the people they’re with.
34% :- of teen smartphone owners say they’ve been woken up by their phones during the night by a call, text, or notification.
49% :- of teens agree that social media has taken away form time they could spend with friends in person.
What happens online stays online:
When asked to pick which comes closer to the truth, teens say.
54% – If parents knew what actually happens on social media, they’d be a lot more worried about it.
46% – parents worry too much about teen’s use of social media.
IMPACT OF MEDIA ON FAMILY TIME
12% –> More time together
28 % –> less time together
58%–> No difference
38% –> of children under 2 use a mobile device for media
17% –> of children use mobile devices on a daily basis
Just 28 minutes a day is spend reading or being Read to.
Among parents who own a mobile device
26% –> sometimes use media to keep themselves occupied while out playing with their children
31%–> sometimes let their child play with the device while out running errands
DIGITAL PARENTING
75% =Of all children have access to a mobile device in their home
63%= use a smartphone
40%= use a tablet
27%= use an iPod touch/similar
SOCIAL MEDIA PRESENCE
SOCIAL MEDIA PRESENCE
When we pass away, our digital footprint be comes our digital legacy. If you want to control how you’re remembered online, here are 4 tips for taking ownership of your social presence.
Assign a Digital Executor = Digital executors can close your social media accounts or keep them live.
Memorialize your Facebook Account = Facebook : prefers to convert profile into memorials. Walls remain active for friends to post condolences. Facebook : allows the family to download account contents with prior authorization or a court order.
Deactivate your accounts
Twitter : works with your estate to deactivate an account. They will not let anyone take over an account unless you get an exception.
LinkedIn : closes an account if a close family member makes the request.
Instagram : honors family requests to deactivate an account. An heir may keep the account live if the deceased provides them with a username and password .
Live on through social media end -of -life tools
Dead Social: Creates a series of goodbye videos, texts or photo messages on Facebook and twitter that are published at your digital executor’s request.
If I Die : Facebook application allows you to creates a single video or text message that is published after you pass. A single message is free $ 25 for five videos.
Cirrus legacy : An online service that allows you to securely store your usernames, passwords and instruction that are released to your digital executor upon death.
Social Media While Jobs Searching
Go ahead and ego-surf
Google your name to see if there is anything inappropriate or embarrassing coming up. Are the first results consistent with how you want to be perceived as a person?
Clean up your social media dirt
Look closely for anything that could harm your image -don’t just remove embarrassing photos, but look for any controversial comments or posts too.
Work on your digital brand
Create a neat, professional and interesting online image that will impress hiring managers and make them want to know more about the offline you.
See who can see what
Check your privacy settings and use the ‘view as’ option to see what people who are not connected with you can see. Then adjust accordingly.
Next time you post..
Edit privacy settings
Make sure the massage is not embarrassing or (highly) controversial
Check for any grammar errors and typos
Social Media and Body Images
Boys have issues with body image too.
Boys’ own body concerns and risky behaviors can go unnoticed , and their role in supporting healthy attitudes among girls is vital.
Pay attention to your son, too
Listen for negative body talk.
Look for dramatic weight loss or fain.
Check the messages from coaches, peers, and online forums about weight, exercise , and muscle-building.
Measurements of by toy male action figures exceed even that of the biggest bodybuilders.
Unrealistic, sexualized, and stereotypical images and messages about bodies and gender are rampant on the media your kid consumes.
Media is influential- If all your child sees are unrealistic body types she’ll come to believe they’re the ideal.
Immunize your child
Choose quality media with diverse characters.
Question assumptions about appearance
Challenge stereotypes about gender, body types, abilities.
Teens feel pressure to look good and cool online, but also fell social media helps their friendships and connections.
Kids live in constant feedback loop of criticism and connection that moves quickly and is difficult to escape.
Be a social media supporter
Help teens find supportive online communities.
Encourage social media breaks when online drama heats up.
Ask teens how online feedback makes them feel
41% of teen girls say they use social media to “ make themselves look cooler”.
According to some studies made by “the telegraph”, exposure to wireless waves interfere with the human body and can create problems such as: Short term memory loss, Lethargy, Cardiac problems, Sleep disturbance.
Wireless Internet routers or WiFi modems use dangerous electromagnetic radiation to send their signals to your computer through walls. If you have a wireless internet router set up in your home or office you are receiving massive EMF exposure, and living or working in a dangerous soup of radiation.
Not only atmospheric + ve charges, the wireless WiFi devices + cell phone radiation and the static electricity but also other pollutants.
Reduce your WiFi Radiation
We know that some people can’t quite bring themselves to surrender their wireless devices so here are some tips on reducing Wifi radiation.
Keep your distance : WiFi radiation drops off significantly with distance. many routers have a strong enough signal to maintain a connection up to 100m from the router.
Switch off at Night : Studies tell us that the biggest danger with WiFi radiation comes from nighttime exposures; cellular regeneration, rejuvenation, and detoxification is impeded and notably melatonin production can be significantly reduced.
Use USB Adaptors wisely: If you are use a USB WiFi adapter use it on a USB extension cable. The same goes if you use a 3G USB dongle to connect to the internet wile you are traveling, an extension cable will significantly reduce your exposure.
The dangers of WiFi are real. Use the above tips to eliminate or reduce your exposure to WiFi radiation.
10 Shocking facts about the Health Dangers of WiFi
Contributes to the Development of Insomnia
Damaging to childhood development
Affects cell growth
Derails brain function
Reduces brain activity in females
Neutralizes Sperm
May Impact fertility
Linked to cancer?
Provokes cardiac stress
You can protect yourself limiting exposure and staying healthy
Creating WiFi Monetization
Grow WiFi Network : Deploy public, hoe and business WiFi network
Baseline : Create compelling ROI through baseline business models
New Revenues : Deliver new sources of revenue and expand value of the WiFi network
Value Added Services : Enhance the WiFi network with new sources of value
Employee Use of Public WiFi networks
Percent of organizations with employees who connect company owned devices to public WiFi when on the go
Yes –> 61%
No –> 24%
Don’t know –> 15%
Risk to Pregnant Women
There are radiation related risks throughout pregnancy which are related to the stage of pregnancy and absorbed dose and also radiation risks are most significant during organogenesis and in the early fetal period somewhat less in the 2nd trimester and least in the third trimester.
A pregnant woman and the fetus both are vulnerable a RF radiations pass placental barrier and continuously react with the developing embryo and increasing cells. Use of WiFi during pregnancy can lead to greater likelihood for behavioral problems in their children. It is believed that the eggs, which form the embryo can be affected and the damage will become apparent after the child reaches puberty.
Government who Against the use of Wireless networks in School..
The European Union is recommending tighter standards for wireless systems to protect children.
Frankfurt City Government and the Bavarian Parliament have recommended against the installation of WiFi in schools.
The Public Health Department of Salzburg has warned against the use of WiFi in Schools and nurseries.
French National Libraries has imposed a moratorium on WiFi networks in French libraries after staff reported ill effects
Teachers union voice has said wireless computer networks in schools may be jeopardizing children’s health and should be suspended pending a full safety inquiry.
The International Commission for Electromagnetic Safety has advised against the use of wireless networks because of health concerns.
The chairman of the health protection agency has expressed concern about the use of wireless networks in schools.