We live in an era where most children are always online. However, even though being able to quickly access information is good, there is a lot of content that is not suitable for kids. SIMEON TASSEV advises on how to keep youngsters safe online.
Always-on connectivity has become part and parcel of today’s society, with more and more people relying heavily on email, social media and web browsing. Children growing up in this era have unprecedented access to information, multimedia and interactive learning capabilities, and are entirely comfortable using the Internet for a variety of everyday tasks. However, while embracing connectivity provides new opportunities and is essential for schools to move forward, there is a lot of content online that is simply not suitable for learners. Keeping this ‘connected generation’ safe online is vital not only for parents, but also schools, universities and other educational facilities.
The Internet is home to a wealth of information and offers new opportunities for educators to provide learners with engaging, interactive experiences. For example, channels such as YouTube can be used for video demonstrations and information clips, which offer a richer learning experience than a simple lecture. However, while much value can be found online, there are also certain safety concerns with regard to learners, especially younger ones, on the Internet. From cyber predators to unsuitable content, suspicious websites and a host of malware, there are numerous threats for the unwary or unaware. Ensuring the safety of underage browsers online should be a top priority.
Simply denying online access or blocking websites is no longer a viable solution. Schools and educational facilities need to not only include IT as part of the curriculum, but allow for access to online capabilities for research purposes if nothing else. One of the most common issues faced by schools is searching online, particularly given the many connotations of certain words, which may lead to inappropriate results. Certain security solutions work to protect browsers by blocking access to known nefarious websites, however, this does not protect users from unknown dangers, nor does it take into account other content such as images, which use different search algorithms.
Leading browsers such as Google provide mechanisms to prevent this, such as Safe Search capabilities, however, the reality is that children are curious and are so adept at navigating computers that they can easily find this setting to switch it off. Internet content filtering solutions have thus become essential to ensure students continue to be able to leverage the benefits of the Internet, without the dangers. These solutions enforce safe searching policies, eliminating unnecessary or inappropriate results from searches of both websites and images.
Another specialised tool that can assist in improving safety is YouTube for Schools, which controls the content available via the YouTube channel to educational and appropriate content. This enables teachers and students to benefit from the power of multimedia content, but prevents learners from being able to access irrelevant or dangerous materials. Again, this channel can be switched off and on, and to prevent learners from disabling safety features, security needs to be enforced through a security solution that prevents them from being able to do this.
Other vital security solutions include firewalls, antivirus, link verification and social media security solutions, all of which can make online experiences safer and more enjoyable. In addition to implementing sophisticated security technology and best practices, however, education is also a critical aspect. Aside from inappropriate content, there are a host of other threats online that the unaware could fall prey to, from cyber predators to phishing scams to malicious links that download malware onto systems. Learners need to be taught not only how to use the Internet, but how to make sure they stay safe online.
The Internet has a lot of valuable information and can be hugely beneficial for educational purposes. As a result, schools need to allow access to online content. However, they are also under obligation to keep learners safe from harm. Ensuring content is safe and appropriate, implement technology to enforce this, and following best practices around security are all essential, and must be backed up with education around security and safety practices themselves. Only in this way can educational facilities ensure students are protected while still enabling them to leverage the freedom and benefits of connectivity.
* Simeon Tassev, Director and QSA at Galix
Samsung unfolds the future
At the #Unpacked launch, Samsung delivered the world’s first foldable phone from a major brand. ARTHUR GOLDSTUCK tried it out.
Everything that could be known about the new Samsung Galaxy S10 range, launched on Wednesday in San Francisco, seems to have been known before the event.
Most predictions were spot-on, including those in Gadget (see our preview here), thanks to a series of leaks so large, they competed with the hole an iceberg made in the Titanic.
The big surprise was that there was a big surprise. While it was widely expected that Samsung would announce a foldable phone, few predicted what would emerge from that announcement. About the only thing that was guessed right was the name: Galaxy Fold.
The real surprise was the versatility of the foldable phone, and the fact that units were available at the launch. During the Johannesburg event, at which the San Francisco launch was streamed live, small groups of media took turns to enter a private Fold viewing area where photos were banned, personal phones had to be handed in, and the Fold could be tried out under close supervision.
The first impression is of a compact smartphone with a relatively small screen on the front – it measures 4.6-inches – and a second layer of phone at the back. With a click of a button, the phone folds out to reveal a 7.3-inch inside screen – the equivalent of a mini tablet.
The fold itself is based on a sophisticated hinge design that probably took more engineering than the foldable display. The result is a large screen with no visible seam.
The device introduces the concept of “app continuity”, which means an app can be opened on the front and, in mid-use, if the handset is folded open, continue on the inside from where the user left off on the front. The difference is that the app will the have far more space for viewing or other activity.
Click here to read about the app experience on the inside of the Fold.
Password managers don’t protect you from hackers
Using a password manager to protect yourself online? Research reveals serious weaknesses…
Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study by researchers at Independent Security Evaluators (ISE).
“100 percent of the products that ISE analyzed failed to provide the security to safeguard a user’s passwords as advertised,” says ISE CEO Stephen Bono. “Although password managers provide some utility for storing login/passwords and limit password reuse, these applications are a vulnerable target for the mass collection of this data through malicious hacking campaigns.”
In the new report titled “Under the Hood of Secrets Management,” ISE researchers revealed serious weaknesses with top password managers: 1Password, Dashlane, KeePass and LastPass. ISE examined the underlying functionality of these products on Windows 10 to understand how users’ secrets are stored even when the password manager is locked. More than 60 million individuals 93,000 businesses worldwide rely on password managers. Click here for a copy of the report.
Password managers are marketed as a solution to eliminate the security risks of storing passwords or secrets for applications and browsers in plain text documents. Having previously examined these and other password managers, ISE researchers expected an improved level of security standards preventing malicious credential extraction. Instead ISE found just the opposite.
Click here to read the findings from the report.