CISA has released six (6) Industrial Control Systems (ICS) advisories containing information about current security issues, vulnerabilities, and exploitsRead more
The remote learning necessitated by the pandemic led to an explosion in the amount of educational technology. But results of a new survey conducted by the EdWeek Research Center and commissioned by ManagedMethods, a cloud application security and student safety monitoring platform, suggests that districtlevel ed-tech decision makers may lack...Read more
Children’s Online Privacy Protection Act (COPPA) helps parents protect their children’s privacy by giving them specific rights. COPPA requires websites to get parental consent before collecting or sharing information from children under 13. The law covers sites designed for kids under 13 and general audience sites that know certain users are under 13. COPPA protects information that websites collect upfront and information that kids give out or post later.
Inappropriate conduct: The online world can feel anonymous. Kids sometimes forget that they are still accountable for their actions.
Inappropriate contact: Some people online have bad intentions, including bullies, predators, hackers, and scammers.
Inappropriate content: You may be concerned that your kids could find pornography, violence, or hate speech online.
Cyberstalking involves the use of information and communications technology (ICT) to perpetrate more than one incident intended to repeatedly harass, annoy, attack, threaten, frighten, and/or verbally abuse individuals.
Perpetrators can engage in cyberstalking directly by emailing, instant messaging, calling, texting, or utilizing other forms of electronic communications to communicate obscene, vulgar, and/or defamatory comments and/or threats to the victim and/or the victim's family, partner, and friends, and use technologies to monitor, survey and follow the victim's movements.
Perpetrators can also engage in cyberstalking indirectly by causing damage to the victim's digital device (by, for example, infecting the victim's computer with malware and using this malware to surreptitiously monitor the victim and/or steal information about the victim) or by posting false, malicious, and offensive information about the victim online or setting up a fake account in the victim's name to post material online (social media, chat rooms, discussion forums, websites, etc.).
Child grooming (a.k.a. enticement of children or solicitation of children for sexual purposes) "can be described as a practice by means of which an adult 'befriends' a child (often online, but offline grooming also exists and should not be neglected) with the intention of sexually abusing her/him".
You’ve taken all the security measures to hide your WordPress login and admin screens from hackers. You’ve also changed your default usernames and removed them from your theme. You still think that you are fine! Now, there’s no way a hacker can find your login usernames. Well think twice! You...Read more