Keep Your Family Safe Online A Parent's Guide To Internet Safety 2012-01-05T05:48:01Z http://keepyourfamilysafeonline.com/feed/atom/ WordPress Bryan Bowers <![CDATA[Internet Safety for Kids Podcast – Episode # 20]]> http://keepyourfamilysafeonline.com/?p=1204 2017-09-07T13:19:33Z 2017-09-19T10:10:38Z ]]> Bryan Bowers interviews Ken Shallcross of Pandora Corp.  Ken works for the company that makes PC Pandora which helps parents monitor their children’s online activities. This is the second in a two part series.

Listen as they discuss the following topics relating to child predators:

  • How PC Pandora operates like a DVR for your computer
  • Two success stories of parents using monitoring software:
    • How a child was rescued from drug addiction
    • How a runaway was located and brought safely home
  • Difficulties associated with the statistics collected about online predators, sexting and cyber bullying
  • Common approaches used by predators to find victims
  • How adults in their 20′s are one of the biggest threats to kids today
  • Why monitoring is an effective parenting technique
  • How it only takes minutes a day to review your child’s online activities
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode # 19]]> http://keepyourfamilysafeonline.com/?p=1208 2017-09-10T02:36:08Z 2017-09-12T10:15:55Z ]]> Bryan Bowers interviews Ken Shallcross of Pandora Corp.  Ken works for the company that makes PC Pandora which helps parents monitor their children’s online activities. This is the first in a two part series.

Listen as they discuss the following topics:

  • How PC Pandora operates like a DVR for the computer
  • The biggest dangers facing kids
  • How children’s ignorance can put them at risk
  • How unfiltered Internet access is dangerous to children
  • How monitoring is different from parental controls
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[Internet Safety for Kids Podcast – Episode #18]]> http://keepyourfamilysafeonline.com/?p=1199 2017-08-30T12:53:59Z 2017-08-29T12:45:10Z ]]> Bryan Bowers interviews Keith Dunn of KDCop.  Keith is a retired police officer from New Jersey who worked extensively with youth and Internet crimes against children. This is the second in a two part series.

Listen as they discuss the following topics relating to child predators:

  • Online predators are the biggest fear relating to children for law enforcement
  • How Keith would open 350 cases a month (11 per day) for online predators
  • Anyone can be a predator and is not the stereotypical middle aged male
  • 20-30 year olds the biggest threat to kids today
  • Online activities that attract child predators
  • Reasons why kids do not report victimization
  • How predators are now communicating and sharing information with each other
  • New methods used by child predators to locate victims
  • How monitoring can help prevent your child from being exploited
  • The process to report a predator to law enforcement
  • How education is the key to prevention
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[Internet Safety for Kids Podcast – Episode # 17]]> http://keepyourfamilysafeonline.com/?p=1180 2017-08-21T17:25:43Z 2017-08-22T10:45:04Z ]]> Bryan Bowers interviews Keith Dunn of KDCop.  Keith is a retired police officer from New Jersey who worked extensively with youth and Internet crimes against children. This is the first in a two part series.

Listen as they discuss the following topics relating to child predators:

  • Keith’s work on the Internet Crimes Against Children Taskforce
  • How Keith trains law enforcement, parents, school administrators and children on the topic of online safety
  • How Keith got started in online safety and started the first taskforce in New Jersey
  • How Keith would open 350 cases per month (11 cases each day) of online predators looking to exploit children
  • The biggest threats to kids online today
  • How the process of cyberbullying unfolds and can go viral quickly
  • How perception is a major part of cyberbullying
  • Common denominators in how children are exploited online
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[Fox Business News article]]> http://keepyourfamilysafeonline.com/?p=1164 2017-08-19T15:39:23Z 2017-08-19T15:10:21Z ]]> Fox Business News reporter Kate Rogers interviewed our founder, Bryan Bowers.  The interview involved an industry survey on the top concerns for parents with back to school around the corner.

The biggest concern for parents was sexting.  Bryan was also able to share tips for parents to help keep their kids out of trouble.

You can read the full article here.

]]>
1
Bryan Bowers <![CDATA[Bryan Bowers mentioned in industry survey]]> http://keepyourfamilysafeonline.com/?p=1162 2017-08-17T19:32:22Z 2017-08-17T19:32:22Z ]]> SpectorSoft  Corporation conducted a survey (click here to access) about the biggest concerns parents have relating to Internet safety.  Our founder, Bryan Bowers, was quoted in the article.

You can view the article by clicking here.

]]>
0
Bryan Bowers <![CDATA[Internet Safety for Kids Podcast – Episode #16]]> http://keepyourfamilysafeonline.com/?p=1153 2017-08-15T13:06:12Z 2017-08-15T13:06:12Z ]]> Bryan Bowers interviews Brent Maguire with TechoArmor Consulting.  Brent is a retired police officer from Illinois who worked extensively with youth and Internet crimes against children. This is the second in a two part series.

Listen as they discuss the following topics relating to online reputations:

  • What an online reputation is and why it’s important
  • How others “discover” your online reputation
  • How information posted online is essentially permanent and can follow someone for their entire life
  • Examples of mistakes made by children and young adults which affects their online reputation
  • Information posted online is out of context and can magnify a situation
  • Effects of a negative online reputation to children and their family
  • How to “repair” an online reputation
  • Professional services to help correct online reputations
  • How an online reputation can attract online predators
  • How to proactively manage your child’s online reputation
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[How to remove your cell phone number from FaceBook]]> http://keepyourfamilysafeonline.com/?p=1149 2017-08-11T19:14:19Z 2017-08-11T19:14:19Z ]]> You may have heard recently how your cell phone number is being shared with all of your FaceBook friends.  If you do not like this invasion into your privacy by FaceBook please watch this video to learn how to remove your cell phone from FaceBook.

This is especially important for parents too.  You do not want your child’s cell phone number to be leaked to predators online.

]]>
0
Bryan Bowers <![CDATA[Internet Safety for Kids Podcast – Episode #15]]> http://keepyourfamilysafeonline.com/?p=1091 2017-08-08T13:47:15Z 2017-08-08T13:47:15Z ]]> Bryan Bowers interviews Brent Maguire with TechoArmor Consulting.  Brent is a retired police officer from Illinois who worked extensively with youth and Internet crimes against children. This is the first in a two part series.

Listen as they discuss the following topics:

  • How posting information online can haunt someone their entire life
  • How parents need to get involved in their child’s digital life
  • How children are now the focus of identity thieves
  • How predators are upfront about their intentions and the process of grooming
  • How children post way too much information online and how predators use that to exploit them
  • How geotagging puts families at risk
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[Internet Safety for Kids Podcast – Episode #14]]> http://keepyourfamilysafeonline.com/?p=1006 2017-07-31T22:45:16Z 2017-08-01T11:02:44Z ]]> Bryan Bowers interviews Jayne Hitchcock with Working to Halt Online Abuse (WHOA).  Jayne is a nationally recognized expert in helping prevent cyber stalking and cyber bullying. This is the final in a two part series.

Listen as they discuss the following topics relating to cyber stalking & cyber bullying:

  • The legal definition of cyber bullying
  • Ways the cyber stalking escalates
  • Methods to track cyber bullies
  • Procedures to report cyber stalkers
  • When online harassment should be reported to law enforcement
  • How to escalate a case if local law enforcement cannot handle the case
  • How to protect your kids from cyber bullies and cyber stalkers
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[Smartphones can broadcast your confidential location information]]> http://keepyourfamilysafeonline.com/?p=1012 2017-08-07T17:58:42Z 2017-08-01T01:36:20Z ]]> Most people don’t realize that smartphones broadcast location information to everyone who sees your picture online.  This can include unsavory persons such as stalkers, pedophiles, and other criminals.

 

To learn more please visit our Dangers of Geotagging page.

]]>
0
Bryan Bowers <![CDATA[PSA on cyber bullying]]> http://keepyourfamilysafeonline.com/?p=1010 2017-08-08T17:18:50Z 2017-07-31T22:52:47Z ]]> This is a great public service announcement that illustrates the problems on cyber bullying.

]]>
0
Bryan Bowers <![CDATA[The dangers of posting inappropriate pictures online]]> http://keepyourfamilysafeonline.com/?p=986 2017-08-08T17:21:48Z 2017-07-27T04:39:00Z ]]> Unfortunately pictures posted online can take on a life of their own. An intimate or inappropriate picture uploaded to a social networking site like FaceBook, Twitter, MySpace, etc can haunt someone for years to come even if the picture has been removed.

Please view the following public service announcement.

 

]]>
0
Bryan Bowers <![CDATA[How to Deal With Cyberbullies and Online Creeps]]> http://keepyourfamilysafeonline.com/?p=981 2017-07-26T13:31:39Z 2017-07-26T13:31:39Z ]]> Article from YoursphereForParents.com

If it’s a situation of cyberbullying, here’s what you and your child can do.

  • No matter what, don’t respond to the bully. That’s what they want.
  • Make copies of the bullying so it’s documented. Learn how.
  • Print out the copies and either mail or bring them to the parents’ house to show proof of bullying. Tell the parents you want it to end…and now. Let them know that you will involve law enforcement (and the school, if relevant) if it can’t be solved right then and there.
  • Law enforcement can’t get involved or do a thing unless life is threatened. That said, it doesn’t hurt to go to the police and document the incident.
  • Block the bully from your child’s Facebook account and from their cell phone
  • Your child should take a big long break from Facebook. (Mom or dad could log in to see if the offender(s) are doing anything and document if necessary).

If the situation involves a creeper, it’s most likely because your child, like most Facebook users, doesn’t understand the importance of keeping their profile on privacy lock down. That means NO ONE should be able to view anything about them other than their name and profile photo, until they are accepted as a friend.

Some social networking safety tips follow:

  • On any social network, it’s best to avoid using last names. Try and use first and middle names only.
  • Phone numbers should never be shared on her profile. The only contact information that should be on there, if any at all, is an email address.
  • There’s no need for them to disclose their high school name. Only real life friends should know where they go to school.
  • They should never post their home address. Teens should disable Facebook Places and minimize Facebook photo tagging.
  • Never accept a friend request from a person you don’t know in real life. For teens, this includes not accepting a friend request from someone they just met at a party last night.
  • Whether a teen stalker/creeper or adult stalker/creeper, it’s best to not disclose any information that makes it easier for them to “get to you”. Again, real life friends know who they are and their contact information is.
  • If it becomes serious, don’t hesitate to inform the police. Make copies of everything that happens so the police have evidence.
  • Finally, block the person from Skype, Instant Messenger, cell phone and anywhere else where they can possibly contact them.

Yoursphere Media focuses on the family and publishes the kids social network, Yoursphere.com. Check it out with your children as an alternative to the adult-intended social networks.

 

]]>
1
Bryan Bowers <![CDATA[Internet Safety for Kids Podcast – Episode #13]]> http://keepyourfamilysafeonline.com/?p=968 2017-07-25T14:29:47Z 2017-07-25T14:29:47Z ]]> Bryan Bowers interviews Jayne Hitchcock with Working to Halt Online Abuse (WHOA).  Jayne is a nationally recognized expert in helping prevent cyber stalking and cyber bullying. This is the first in a two part series.

Listen as they discuss the following topics relating to cyber stalking:

  • How cyber stalking propelled her into the security industry
  • How the innocence of children can get them into trouble online
  • Why parents cannot ignore the Internet and the dangers present online
  • How WHOA is helping stop cyber stalking and cyber bullying
  • Surprising statistics showing that female harassers are increasing
  • That 53% of harassers are complete strangers and increasing each year
  • The importance of managing your “digital footprint”
  • How to identify and eliminate potential stalkers from your child’s FaceBook account
  • Why online harassment escalates in 70% of cases
  • Steps to stop cyber bullying and cyber stalking
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[How To Set Up Parental Controls on the iPad]]> http://keepyourfamilysafeonline.com/?p=853 2017-07-21T03:41:40Z 2017-07-21T03:41:40Z ]]> Article from YoursphereForParents.com

1. The first thing you’ll want to do is find the Settings button on your home screen –

Ipad1

2. Once you’ve clicked that, look for the “General” tab on the left side. From there you’ll see the “Restrictions” option—click it.

Ipad2
3. At the top, you’ll want to click “Enable Restrictions”. This will bring up a password box. Since this is your first time, you’ll need to think of a code and enter it twice to confirm.

Don’t forget this password. It’s your only way to turn restrictions on and off on the iPad. If you forget, the only way to bypass it is by resetting your iPad to the factory settings.

Ipad3

Ipad4
4. From here you’ll be given the option to disable or enable a number of apps and allowances: Safari, YouTube, installing apps, etc.

Switching these apps to the “off” position will actually remove them from your iPad’s homepage—meaning you/your children won’t be able to access them until you switch them back “on”.

Some suggestions:

Safari – You’ll want to turn this off if you don’t want your child browsing the web. Safari doesn’t have a content filter, so unless you’ve installed a third-party, kid-friendly web browser, switching this to the off position might be the best option.

YouTube SafetyMode isn’t an option here, so the same rules apply here as they do for Safari.

Installing Apps – If you have little ones using your iPad (and I’m assuming you do if you’re reading this article), turn this off is highly recommended. This will prevent any unwanted bills from Apple.

Ipad5
5. If you scroll down on the same page you’ll notice that you can also choose the type of content you allow to be downloaded, installed or viewed on your iPad, as well as the option to disable in-app purchases.

Ipad6
In-app purchases – these are actual purchases made inside any app that’s downloaded to your iPad. So, if your son or daughter decides that they want to buy $100 worth of “gold coins” in Sally’s Silly Adventures, they can…if this isn’t turned off. Click here to read one father’s horror story.

Remember, your iTunes account is probably tied to your credit card if you’ve ever bought an app in the App Store.

From here you can also limit the kind of content that gets downloaded or played on your iPad. This is done by selecting the rating for each type of content.

Music – Setting the Explicit setting to OFF makes it so any explicit songs that your child may already have on their iPad become unavailable. It also disables all explicit purchases in the iTunes Store.

Ipad7
Movies –

Ipad8
TV Shows –

Ipad9
Apps –

Ipad10
All in all, parents, safety enabling your iPad will take just 10 short minutes, but will offer you hours of peace of mind!

Yoursphere Media focuses on the family and publishes the kids social network, Yoursphere.com. Check it out with your children as an alternative to the adult-intended social networks.

]]>
1
Bryan Bowers <![CDATA[Internet Safety Podcast For Kids – Episode #12]]> http://keepyourfamilysafeonline.com/?p=932 2017-07-17T23:44:33Z 2017-07-18T10:43:22Z ]]> Bryan Bowers interviews Mary Kay Hoal, with YourSphere Media. Mary Kay is a nationally recognized expert in child Internet safety and was recently featured on the ABC News show 20/20.  This is the last in a three part series.

Listen as they discuss the following topics relating to social media privacy for children:

  • How a majority of kids are at risk due to privacy settings
  • Incorrect privacy settings open door for pedophiles
  • How children are at risk from identity theft, cyber bullying, and more
  • Overview of federal laws regulating online privacy for kids
  • How Yoursphere.com is taking a proactive approach to privacy
  • Plus lots more

You can also subscribe to our podcast on iTunes

 

 

 

 

]]>
1
Bryan Bowers <![CDATA[How to Set Parental Controls on Mac OS X]]> http://keepyourfamilysafeonline.com/?p=873 2017-07-17T23:51:29Z 2017-07-17T23:51:29Z ]]> Article from http://internet-safety.yoursphere.com

First, find the System Preferences icon on your desktop and click on it.

It looks like this:

281252091900762326
Now look for “Accounts” and click that.

Screen shot 2017-06-30 at 2.20.34 PM

 

You’ll be taken to a screen where you can modify or add users to the computer. In order to set parental controls, your child will need their own user account. To create one, click the little + sign.

 

Screen shot 2017-06-30 at 2.09.03 PM

 

Keep the account “Standard”, and then fill out the rest of the fields before hitting “Create Account”.

 

Screen shot 2017-06-30 at 2.09.41 PM

 

Once you’ve done that, you’ll need to start setting the parental controls, so check the “Enable parental controls” box, and then click the “Open Parental Controls” button.

 

Screen shot 2017-06-30 at 2.10.31 PM

 

On the next screen, you’ll be able to set a number of controls and restrictions, including: app restrictions, website blocking, email limitations and time limits. These are organized by tabs at the top. You’ll see how useful these settings can be once you get going.

Let’s start with The Apps tab -

Here, you can limit the types of applications that your child has access to on their account. This includes everything from Firefox to Photo Booth.

It’s also important to set an age restriction for the app store. In the image I have it set to “up to 9+”, but you can always say “Do not allow” and block the app store altogether.

 

Screen shot 2017-06-30 at 2.15.42 PM

 

The Web tab

This is probably the most important section of the parental controls as it allows you to block and allow certain websites. Now, you can go one of two ways: you can let Apple’s parental controls “try” and limit access to adult intended websites, or you can create your own list of allowed/blocked sites.

 

Screen shot 2017-06-30 at 2.16.18 PM

 

Clicking the “Customize” button brings up a box where you can type in whichever sites you deem appropriate or inappropriate for your child.

 

Screen shot 2017-06-30 at 2.17.00 PM

 

The Mail tab

Setting limits here is fairly straightforward. Checking the two boxes at the top will allow you compile a list of email addresses that you allow your child to contact either through Apple’s mail system or iChat. Check the two boxes and then click the little + to begin adding allowed email addresses.

NOTE: If you don’t have the time to add email addresses to this list, then I recommend you disable the Mail and iChat applications. This can be done from the Apps tab. Then, when you have the time, you can come back and fill in this list.  Don’t just “skip” this part of the safety-enabling your Mac. This is too important.

 

Screen shot 2017-06-30 at 2.17.53 PM

 

You’ll also want to put your parent email address in the “Send permissions requests to” box. This sends you an email notification if your child tries to contact someone who’s not on the list of allowed contacts.

 

Screen shot 2017-06-30 at 2.18.46 PM

 

The Time Limits tab

This tool is very useful if you want to limit the amount of time your kids spend on the computer during the week and/or the weekend. Just use the scroll bars to adjust the number of hours.

 

Screen shot 2017-06-30 at 2.19.28 PM

 

You’ll notice that you can also prevent access to the computer during certain times of the day, like bedtime.

The Other tab

This tab just gives you a few more things to control. One of them is the ability to hide profanity in online dictionaries and sites educational resources like Wikipedia. You can also limit printer access and CD/DVD burning.

I do recommend that you check the “Disable changing the password” box. This will prevent your child from changing their own account password and possibly restricting your access to their account.

 

Screen shot 2017-06-30 at 2.20.07 PM

 

Finally, you’ll want to lock these changes so click the little lock in the bottom left corner. This will make it so that only you (assuming you’re the only one who knows the admin password) can change the parental control settings.

That’s it! Please be sure to pass this on to anyone you think would find it useful. And if you have any recommendations as far as parental controls go on Mac OS X, please feel free to share in the comments.

Yoursphere Media focuses on the family and publishes the kids social network, Yoursphere.com. Check it out with your children as an alternative to the adult-intended social networks.

]]>
2
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #11]]> http://keepyourfamilysafeonline.com/?p=895 2017-07-11T14:58:21Z 2017-07-11T10:09:08Z ]]> Bryan Bowers interviews Mary Kay Hoal, with YourSphere Media. Mary Kay is a nationally recognized expert in child Internet safety and was recently featured on the ABC News show 20/20.  This is the second in a three part series.

Listen as they discuss the following topics relating to the dangers of geotagging:

  • An explanation of what geotagging is
  • Concrete examples of how geotags can put kids at risk
  • Tools used by stalkers to location victims
  • How geotagging makes a pedophile’s job easy
  • How geotags put families at risk to other crimes
  • Other types of personally identifiable that should never be posted online
  • The risks associated with tagging of photos on FaceBook
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
2
Bryan Bowers <![CDATA[Take control over your privacy and discover which FaceBook apps are spying on you]]> http://keepyourfamilysafeonline.com/?p=914 2017-07-07T15:26:32Z 2017-07-07T15:21:23Z ]]> Do you remember all those quizzes you took in Facebook?

Do you realize that each one of those apps is silently collecting information about you every day and feeding it to marketers?

We just discovered a new service which analyzes every app in your FaceBook account and gives you a detailed report on:

  • Information collected by the app
  • Reputation of app developer
  • Last time you used the app

This information is invaluable so you can take control over your FaceBook privacy.  After running the report I was shocked to find more than 50 apps that I did not need.  With a few clicks of the mouse you are able to remove all of them in a matter of seconds.  This is much easier than the manual removal process that FaceBook provides for you.

Best part is that the service is free!  They do offer some paid services but it doesn’t cost you anything for the FaceBook app removal.

This service is recommended by the heavy hitters in the technology industry like TechCrunch.com, Gizmodo.com, LifeHacker.com and CNNTech.com.

Check it out:  http://www.unsubscribe.com

]]>
0
Bryan Bowers <![CDATA[Victim of cyber bullying inflicted self harm because of abuse]]> http://keepyourfamilysafeonline.com/?p=906 2017-08-07T17:46:06Z 2017-07-06T13:52:33Z ]]> A 14 year old boy in the the United Kingdom initially shrugged off the messages he received from a cyber bully.  But, as the cyber bullying continued, his confidence lagged and his sense of self-worth diminished.

After a year of continuous cyber bullying, the youth began a campaign of self harm called cutting.  This involves slicing of the wrists or other body parts and can escalate into an actual suicide attempt.  Fortunately, a friend noticed the cuts and contacted school officials who helped the boy get back on track.

This cyber bullying would have been caught in the beginning stages through the use of monitoring software or a monitoring service.  Parents should seriously consider some sort of monitoring solution to make sure their children are not being cyber bullied or engaging in cyber bullying.

Full article is located here.

]]>
1
Bryan Bowers <![CDATA[How to configure privacy settings in Google Plus]]> http://keepyourfamilysafeonline.com/?p=903 2017-08-08T17:23:48Z 2017-07-06T02:42:50Z ]]> Google Plus (also known as Google+) is a brand new social networking site recently created by Google. Just like FaceBook, it’s important that people understand how to configure their privacy settings for themselves and their family.

Google Plus has many different features (circles, incoming posts, sharing defaults, network visibility, and more) that are different from other social networking site like FaceBook, and Twitter.  An improperly configured profile could leak information to search engines, or people in other circles which could cause embarrassment or worse.

Watch this video so you can have the knowledge to properly secure your Google+ profile.

Be sure to sign up for our newsletter so you will receive the latest information about technologies that can put you or your family at risk.  Sign up here.

]]>
1
Bryan Bowers <![CDATA[Twitter – A Revolutionary Way for Kids to Text for Free, Cyberbully and More]]> http://keepyourfamilysafeonline.com/?p=850 2017-07-03T14:55:07Z 2017-07-03T14:55:07Z ]]> Article from YourSphereforParents.com

“@” is a way to directly refer to another Twitter user when you send out a tweet. So, if you post a tweet and you put @marykayhoal in the tweet, then I will see on my Twitter account that you mentioned me in your tweet. As well, anyone who follows me on Twitter will see that you mentioned me.

Twitter    marykayhoal

“#” is a bit more complex than “@”. The #, or hashtag, is used to create topics of discussion, or add to an already existing topic of discussion. These topics (hashtags) can be searched for by Twitter users, allowing them to see anything that was said by anyone who used that hashtag. So if you’re interested in parenting advice, then you might find #parenting to be a useful discussion to follow. There are millions of these hashtags topics, and anyone can create a topic about anything. So if you want to tweet “Finally finished reading a book a started a month ago!”, you can add a hashtag like #ilovebooks or #momalonetime or #thattookforever. Those are now topics of discussion that you’ve either created or added to.

Twitter   Search    vacationwishlist

Granted they have an Internet connection on their mobile device, these two features make Twitter a very attractive alternative for any tween or teen that’s getting slack from their parents for going over their text messaging limit.

This switch over to Twitter creates some concerns for their privacy, though, as the whole point of Twitter is to make your tweets public to your followers—a bandwagon that most Twitter users hop on without really taking into consideration how it affects their privacy. In a sense, Twitter is just a way for people to let everyone, friends and strangers, know who they’re texting and what they’re texting them. Think of it as the ultimate status update.

My concern was triggered when I noticed some heavy discussion going on in the #cyberbullying topic.  I was seeing people, young and old, using it to send hurtful direct messages to another person (@), and then categorizing it as #cyberbullying so that everyone knows their intention.  It seems these people have embraced the non-private, mass text messaging capabilities of Twitter, and then added in that extra hashtag in order to humiliate the person they’re referring to in their tweet. Needless to say, this trend can easily expand beyond cyberbullying, into sexting, and pretty much any hurtful or inappropriate topic imaginable.

Because Twitter was created to facilitate mass communication, privacy isn’t really a priority for the folks at Twitter. But if you know your tween/teen uses Twitter, there is one thing you can do to keep their profile somewhat private:

Go to Settings Account Check the box called Tweet Privacy

This will make it so their tweets are only visible to the people they approve to follow them.

Twitter   Settings

Don’t forget to also talk to your kids about Twitter. As important as it is to let them know that you’re on top of technology and technology trends, it’s equally important to talk to them about the consequences of cyberbullying and sexting. Twitter is the definition of “social networking with no regard for privacy”. And because millions of Twitter users embrace this online culture, it’s more important than ever to talk to your kids about it.

Also, keep in mind that Twitter is not intended for children 12 and under. And just like Facebook, it is in violation of a very important privacy law for children called the Children’s Online Privacy Protection Act.

Yoursphere Media focuses on the family and publishes the kids social network, Yoursphere.com. Check it out with your children as an alternative to the adult-intended social networks.

]]>
0
Bryan Bowers <![CDATA[14% of Children Have Chosen to Meet a Stranger They Met Online]]> http://keepyourfamilysafeonline.com/?p=877 2017-07-02T04:26:40Z 2017-07-02T04:24:41Z ]]> Article from http://internet-safety.yoursphere.com

3304385 14% of children 9 – 14 years old, and 12% of high school students 15 – 18 years old purposefully chose to meet with a stranger (in real life) they had chatted with online according to research published in the July issue of the American Journal of Nursing.  In addition, half of the children and teens were either sexually assaulted or threatened, touched inappropriately, or had “something sexual happen.”

Participants in the survey also included “Internet sexual offenders” (those convicted of either an Internet sexual offense or a hands-on sexual offense and/or a prior Internet offense). Their preferred method of communication is with girls versus boys, and about 2/3 bring up the topic of sex during the first chat session with children and young adults the study found.

The first thought that came to my mind was: How could a parent of a 9 year old let this happen? And then after pulling myself off the ceiling of our office, I realized how many parents have told us at Yoursphere that they have “felt like their child is safe because they’re on the computer in the other room.”  While I certainly understand the feeling of safety a parent has knowing and seeing exactly where your child is, these concerning facts simply underscore the fact that:

  1. Each of us should, in plain English, tell our children: You may not go and meet a person in real life that you talk to online unless you, the parent, also know that person. Remind and keep reminding, even if you get the eye-rolling from your 17 year old daughter.
  2. Utilize monitoring software like GoGostat, SocialShield or BSecure. (Admittedly, introducing these types of products into the social networking equation of your teen will likely garner tremendous push back and might not be an option, but I still encourage you try. And this is a great reminder for those parents who have younger children to make these software solutions a part of the equation for any digital device they use. They’ll grow up not knowing otherwise.)

Yoursphere Media focuses on the family and publishes the kids social network, Yoursphere.com. Check it out with your children as an alternative to the adult-intended social networks.

]]>
0
Bryan Bowers <![CDATA[“Kids and Geotagging” video now available]]> http://keepyourfamilysafeonline.com/?p=870 2017-08-09T00:36:46Z 2017-07-01T11:00:06Z ]]> Check out our latest video on “Kids and Geotagging”.

 

]]>
0
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #10]]> http://keepyourfamilysafeonline.com/?p=804 2017-06-22T02:14:38Z 2017-06-30T10:30:55Z ]]> Bryan Bowers interviews Mary Kay Hoal, with YourSphere Media. Mary Kay is a nationally recognized expert in child Internet safety and was recently featured on the ABC News show 20/20.  This is the first in a three part series.

Listen as they discuss the following topics relating to Internet safety for kids:

  • What caused Mary Kay to begin her career in child Internet safety
  • The biggest dangers facing children today
  • How her site YourSphere.com helps keep children safe
  • How YourSphere.com helps train both children and parents to responsibly use social networking sites
  • How pictures of Justin Bieber helped teach a valuable lesson to the parents of an 8 year old
  • What things parents can do to protect their kids
  • Steps overwhelmed parents can do to quickly safeguard their children’s devices
  • The importance of safety enabling all digital devices in the home
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[iTunes Parental Controls and Safe Syncing]]> http://keepyourfamilysafeonline.com/?p=851 2017-06-30T18:46:21Z 2017-06-30T02:15:42Z ]]> Article from YourSphereForParents.com

To get started, follow the step-by-step guide below.

  1. Open iTunes and click on “Edit” (Windows PC) in the top menu, or “iTunes” for Mac users.
  2.  

  3. Then, click on “Preferences”.
  4. Itunes1

  5. A Preferences window will pop up, and at the top you’ll see seven different tabs. One of them is called “Parental”, click that.
  6. Itunes2

  7. From here you can choose to disable certain iTunes content/features altogether, like Ping or the iTunes Store. You can also set restrictions for movie, TV show and application content by age range.
  8. The important thing to do here is to check the box that says “Restrict Explicit Content”. This will disable the ability to download/purchase explicit music and other explicit content on your iTunes account.

  9. Clicking the little lock will make it so the admin password is required to change these settings. Click it, type in your admin password and click OK.

Safe Syncing –

It’s important to understand a couple of key things after you’ve set and locked iTunes’ parental controls:

  1. Any explicit content that you had in iTunes prior to setting the parental controls will still be in iTunes. Furthermore, you/your child will still be able to sync this explicit content to any iDevice when it’s connected to iTunes. Because of this, it’s important that you also configure the parental controls on the iPod Touch, iPhone, or iPad itself.
  2.  

  3. Since any previously downloaded explicit content will still be in iTunes, you might want to consider deleting the content from your music/TV playlists.
  4. If this isn’t a practical solution for you, you may want to create a separate user account for your child on your home computer. Then you can download iTunes on their user account and set the parental controls there so they have their own settings and you have yours.

  5. Your iTunes parental controls DO NOT have an effect on content that you’ve imported into your library. It only affects content that’s bought in the iTunes Store either through iTunes or an iDevice.

That’s it, parents! Remember to take the time to set the parental controls on all three iDevices, not just iTunes. Also, it might be good idea to let your kids know that you’ve set and locked the parental controls on iTunes so they know you’re on top of things. That said, parental controls are never a substitute for parental involvement. Open dialogue about your child’s online activities is, and always will be the best “parental control”.

Yoursphere Media focuses on the family and publishes the kids social network, Yoursphere.com. Check it out with your children as an alternative to the adult-intended social networks.

]]>
0
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #9]]> http://keepyourfamilysafeonline.com/?p=798 2017-06-22T00:35:31Z 2017-06-27T10:32:34Z ]]> Bryan Bowers interviews Tshaka Armstrong, with Digital Shepherds. This is the second in a two part series.

Listen as they discuss the following topics relating to Internet connected and online video games:

  • What downloadable content for video games is and why parents should be concerned
  • How downloadable content can change a PG rated game into one that is X rated
  • What things parent should look out for when purchasing video games
  • What questions to ask store clerks about video games
  • The dangers of voice chat capabilities in video games
  • Ways to protect your family when video game networks are hacked
  • Two of the best game consoles for enabling parental controls
  • How to keep kids safe from predators when playing video games
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[“Me on the Web” – Google tool to manage online reputation]]> http://keepyourfamilysafeonline.com/?p=827 2017-06-26T14:39:19Z 2017-06-26T14:35:45Z ]]> Article from Kent Trust Web.org.uk

Google has launched a tool to enable users to understand and manage what people see when they search for you on Google. The tool called “Me on the Web” and is part of the Google Dashboard (users register to access personalised Google apps and tools).

Google states “Your online identity is determined not only by what you post, but also by what others post about you – whether a mention in a blog post, a photo tag or a reply to a public status update“. Being aware of your own digital footprint is an essential part of everyone’s digital safety, this tool enables web users to become more aware of and manage their online reputation.

You can use “Me on the Web” to alert you when your personal information gets published online.

To create alerts:

  1. Sign in to your Google Dashboard
  2. In the ‘Me on the Web’ section, click Set up search alerts for your data.
  3. Select the checkboxes beside the alerts (such as your name or email address) you’d like to receive.
    • (Optional) Enter additional information in the text field and then select the checkbox for that alert.
    • (Optional) Click Add another alert to create alerts for additional personal information.
  4. In the ‘How often’ drop-down box, choose the alert frequency.
  5. In the ‘Deliver to’ drop-down box, choose which email address your alerts should be sent to.
  6. Click Save alert preferences.

You will now be notified when content about you (depending on the options you have selected) is publicly indexed via Google.

Users can also register for a Google profile. Google state that this can help users manage the information (such as contact details, and other information) that people see. With a Google Profile, you can also link to other sites about you or created by you. For example, you can link to your blog, online photos in Picasa, and other profiles such as Facebook and LinkedIn. This could be a useful tool in managing and maintaining separate professional and personal presences online. Google profiles can be made private or public (meaning it will be visible via search engines) and is optional. Professionals should carefully consider if this is a suitable option for them and should ensure it is compatible their professional role prior to use.

Parents and carers might want to consider using the tool to manage content posted online about themselves and their family. It could also be useful in showing Young People how visible their digital footprint is and how important it is to be aware of how the content you post online can be shared further and on a larger, more public, scale than intended.

Google also provides some very useful advice for users on how to remove unwanted content and unwanted search results.

For more information visit Google’s help and advice section: “Managing your Online Reputation” here

Original article: http://kenttrustweb.org.uk/CS/community/esafety/archive/2017/06/23/quot-me-on-the-web-quot-google-tool-to-manage-online-reputation.aspx

]]>
0
Bryan Bowers <![CDATA[First Cyber-Bullying Arrest]]> http://keepyourfamilysafeonline.com/?p=816 2017-06-25T17:05:29Z 2017-06-25T17:04:27Z ]]> Article for Kid Safe.com

From http://wnyt.com/article/stories/S2159862.shtml?cat=300

COHOES – Everyone at Cohoes High School heard about the Facebook page, but no one knew who created it. It was called ‘Cohoes Flame’.

The anonymous creator cut and pasted pictures of Cohoes High Students, and wrote nasty things underneath each picture. “They were just degrading everybody on there, it was ridiculous,” said Cohoes High School student Ryan Goergen.

Goergen’s name ended up on that page, he never knew who put it there until NewsChannel 13 told him who police arrested, 16-year-old Marquan Mackay-Meggs. “Are you serious? He’s my friend. Wow. That’s crazy, that’s crazy.”

Another student held her hand over her mouth in disbelief. “Oh my god, wow. I thought it was someone else,” she said.

Cohoes Police spend more than six months investigating this case. Detective Jason Johnston even created a Facebook account to send a message to the then anonymous page creator. “He replied by telling me that if I could prove to him who I was, then he would take the page down,’ said Johnston. Detective Johnston then took a different route, contacting Facebook directly.

Eventually the page came down. And, through tracking IP addresses, police found Mackey-Meggs. “He thought he was being funny.” . . A neighbor came out, completely shocked to learn why NewsChannel 13 was there. “It’s crazy to hear about it, I don’t know why he would do that to hurt somebody,” said Christina Beliven. “Even my friend was on it and it said how she was nasty and all these hurtful things.”

Albany County law makers recently passed a cyber bullying law. This is the first arrest. Cohoes Police Chief William Heslin says he’s pleased the case is resolved, but it was extremely draining for a small department to tackle a cyber bullying case. He says cases like this need help from the federal level. “They can pass all the county laws they want, you’re still dealing with out of state companies that you need the information from.”

 

May I suggest that you contact your local Congressman and push for a federal level bill against cyber-bullying?

]]>
0
Bryan Bowers <![CDATA[What can Parents do about Cyber Bullying Victims]]> http://keepyourfamilysafeonline.com/?p=809 2017-06-25T00:25:12Z 2017-06-25T00:24:03Z ]]> Article from Kid Safe.com

Parents can help stop cyberbullying. You can start by talking to kids about the issue and teaching them the rules below that will help prevent cyberbullying from happening to them or someone they know.

What Kids Need to Know:

  • Never give out personal information online, whether in instant message profiles, chat rooms, blogs, or personal websites.
  • Never tell anyone but your parents your password, even friends.
  • If someone sends a mean or threatening message, don’t respond. Save it or print it out and show it to an adult.
  • Never open emails from someone you don’t know or from someone you know is a bully.
  • Don’t put anything online that you wouldn’t want your classmates to see, even in email.
  • Don’t send messages when you’re angry. Before clicking “send,” ask yourself how you would feel if received the message.
  • Help kids who are bullied online by not joining in and showing bullying messages to an adult.
  • Always be as polite online as you are in person.

Since most cyberbullying takes place at home, it’s important that parents know about cyberbullying and that they get involved in preventing it. Just like parents help their kids avoid inappropriate websites, they can protect them from cyberbullying.

What Parents Can Do

  • Keep your home computer is a busy area of your house.
  • Set up email and chat accounts with your children. Make sure that you know their screen names and passwords and that they don’t include any personal information in their online profiles.
  • Regularly go over their instant messenger “buddy list” with them. Ask who each person is and how your children know him or her.
  • Print this list of commonly used acronyms in instant messenger and chat rooms from the National Center for Missing and Exploited Children and post it by your computer.
  • Discuss cyberbullying with your children and ask if they have ever experienced it or seen it happen to someone.
  • Tell your children that you won’t blame them if they are cyberbullied. Emphasize that you won’t take away their computer privileges – this is the main reason kids don’t tell adults when they are cyberbullied.
]]>
2
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #8]]> http://keepyourfamilysafeonline.com/?p=793 2017-06-07T02:04:37Z 2017-06-20T12:25:51Z ]]> Bryan Bowers interviews Tshaka Armstrong, with Digital Shepherds. This is the first in a two part series.

Listen as they discuss the following topics relating to Internet safety for kids:

  • Real life example of predator trying to meet a child
  • How hands on labs help parents understand the dangers facing their kids
  • How naivety, and lack of impulse control puts kids at risk online
  • How R rated games are so different from R rated movies
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #7]]> http://keepyourfamilysafeonline.com/?p=786 2017-06-06T22:01:27Z 2017-06-13T12:00:19Z ]]> Bryan Bowers interviews Mike Vallez, retired police officer from Tampa, Florida.  This is the second in a two part series.

Listen as they discuss the following information relating to online predators:

  • Red flags parents should be looking for
  • The myth of right to privacy for kids
  • How social networking sites make pedophiles jobs easier
  • How predators share information on ways to exploit kids
  • Other social network sites parents need to be aware of
  • Biggest mistakes made by child predators
  • Biggest mistakes made by kids that put them at risk
  • Dangers of geotagging
  • Number one weapon for parents to combat online predators

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #6]]> http://keepyourfamilysafeonline.com/?p=779 2017-06-06T22:01:47Z 2017-06-06T10:15:57Z ]]> Bryan Bowers interviews Mike Vallez, retired police officer from Tampa, Florida. This is the first of a two part series of interviews.

Listen as they discuss the following information:

  • Common techniques used by child predators
  • How predators are relentless in their pursuit of victims
  • The use of false social networking accounts to lure victims
  • The specific traits in children that are often exploited
  • How predators operate like a hunter
  • The dangers of geotagging (location services)
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[New video illustrating the dangers of geotagging now available]]> http://keepyourfamilysafeonline.com/?p=770 2017-05-31T11:21:54Z 2017-05-31T11:21:54Z ]]> We just released our latest video series “How to protect your kids in 5 minutes or less” yesterday.  This video covers geotagging and discusses the following topics:

  • Vivid demonstration of how geotags can be used to locate someone within seconds
  • Examples of how predators can use geotags to profile a victim using free tools online
  • How wide spread the problem is and who is affected by it

Check it out today and learn the hidden dangers of geotagging.

]]>
1
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #5]]> http://keepyourfamilysafeonline.com/?p=745 2017-08-05T04:12:57Z 2017-05-30T10:15:30Z ]]> Bryan Bowers interviews Sharon Wolley from SpectorSoft Corporation. This is the second in a two part series of interviews.  The two major areas of discussion involve sexting and mobile devices

Listen as they discuss the following information:

  • How mobile devices are often ignored by parents
  • The problems associated with mobile devices
  • Texting lingo (and a free guide)
  • How rampant sexting is today (stats will shock you)
  • How young children are when sexting begins
  • Increasing number of teen suicides involving sexting
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #4]]> http://keepyourfamilysafeonline.com/?p=729 2017-05-21T03:24:45Z 2017-05-23T10:15:20Z ]]> Bryan Bowers interviews Sharon Wolley from SpectorSoft Corporation. This is the first in a two part series of interviews.

Listen as they discuss the following information:

  • The biggest dangers facing kids today
  • How to protect kids from these dangers
  • Some of the ways that SpectorSoft helps parents protect children
  • The tragic death of Emily Longley
  • Plus lots more

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[Teen warns of stalker three days before death]]> http://keepyourfamilysafeonline.com/?p=735 2017-05-21T04:03:31Z 2017-05-21T04:03:08Z ]]> Emily Longley posted a chilling message to her FaceBook account three day before she was discovered dead: “I have a stalker!”  While details surrounding her death are still under investigation, police in England have determined that her death warrants further investigation.

Emily included additional information in her post about the predator.  She received a phone call from an unknown person who indicated that he knew everything about her even though she had no idea who he was.  Additionally, he persistently called her multiple times after she hung up on the caller.  She was visibly upset and wondered how the person had discovered her private number.

While on the surface, this stalking (not the death) may appear to be a once in a million situation, it actually happens every day.  It’s important for parents to understand exactly how this happens, and be able to determine if their child is at risk or currently being stalked.

It’s very common for children to accept friend requests from people that are a complete strangers to them.  There are many reasons for this:

  • Wanting to have the largest number of friends
  • Wanting to be socially “polite” and not refuse a request
  • The stranger is friends with another FaceBook friend
  • The stranger falsely claims to attend the same school, live in the same city, etc.
  • The stranger claims to like the same sports team, bands, or interests

Once that person is accepted as a friend, they have full access to your child’s profile, activities, posts, pictures and the like.  In most circumstances your child will promptly forget the person exists as a friend.  That stranger can then sit back and quietly observe your child’s online activities.  The predator will slowly build a profile of your child with the following information:

  • Home address
  • Telephone number
  • School attended
  • Favorite hangouts
  • Work location
  • Names of parents, siblings, friends
  • Colors of home, cars, and pets

With all of this information, the predator can formulate a plan to entice your child to meet him and then exploit him or her.

Parents must sit down with their child and have the child explain exactly how they know each and every person in their FaceBook account.  You should unfriend (or block) anyone who your child cannot not readily identify.

More information about this problem and solution can be found in the chapter on Social Networks.

 

]]>
0
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #3]]> http://keepyourfamilysafeonline.com/?p=698 2017-05-06T14:37:33Z 2017-05-16T12:31:35Z ]]> Bryan Bowers interviews Dustin Lopez from Kids First: Where Our Kids Matter. This is the last in a series of three interviews.

Listen as they discuss the important topics about the subject of online predators:

  • Shattering the stereotypical view of an online predator
  • Percentage of children communicating with complete strangers
  • Warning signs associated with online predators
  • Dangers of Internet connected devices in bedrooms
  • Effective tools to protect children
  • How to get your head out of the sand and into the cloud

You can also subscribe to our podcast on iTunes

]]>
1
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #2]]> http://keepyourfamilysafeonline.com/?p=675 2017-05-21T03:53:15Z 2017-05-09T12:00:52Z ]]> Bryan Bowers interviews Dustin Lopez from Kids First: Where Our Kids Matter. This is the second in a series of three interviews.

Listen as they discuss the important topics about the subject of cyber bullying:

  • Definition of cyber bullying
  • Warning signs associated with cyber bullying
  • Online and in person aspects of cyber bullying
  • Three simple words to prevent cyber bullying
  • Effective ways to report cyber bullying

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[Teachers lack training to instruct in online safety]]> http://keepyourfamilysafeonline.com/?p=682 2017-05-05T14:32:44Z 2017-05-05T12:16:53Z ]]> A survey conducted by the National Cyber Security Alliance found that 36% of teachers in the United States received no training in online security for students and only 40% received one to three hours of training.

These numbers are important when you consider that 55% of teachers, and 82% of school administrators strongly agree that online safety should be covered in classroom instruction.

While many people believe parents should be the primary source of internet safety instruction for children, often that training never happens.  There are a variety of reasons:

  • Lack of familiarity with computer technologies
  • Unaware of the dangers found online
  • Lack of time / lack of interest

There is one federal law that mandates training for students but it only applies to schools receiving discounted Internet access via a federal program.  Unfortunately, this 2008 federal law is deficient since it does not establish specific guidelines nor define the types of training that must occur.  Only six states (California, Georgia, Illinois, New York, Texas, and Virginia) have laws that deal with online safety but none mandate training for students.

Education is key in order to raise awareness, and provide children with the necessary tools to stay safe online.  Regardless of who provides the training, it is critical that children receive comprehensive instruction on how to safely navigate in today’s digital world.

Reference article (including survey)

 

]]>
1
Bryan Bowers <![CDATA[Bryan accepted as About.com expert on child internet safety]]> http://keepyourfamilysafeonline.com/?p=668 2017-05-03T19:30:31Z 2017-05-03T19:30:08Z ]]> I am very honored to have been designated an expert on child internet safety on About.com (also at AllExperts.com). About.com is the one of the top 100 most visited sites on the Internet and provides thousands of answers to questions every day to people around the world.

If you have any questions relating to Internet safety for kids you can ask me a question by going here: http://www.allexperts.com/el/Internet-Safety/

]]>
0
Bryan Bowers <![CDATA[Internet Safety For Kids Podcast – Episode #1]]> http://keepyourfamilysafeonline.com/?p=656 2017-05-21T03:54:31Z 2017-05-02T03:45:24Z ]]> Bryan Bowers interviews Dustin Lopez from Kids First: Where Our Kids Matter.  Listen as they discuss the biggest danger facing kids online, ways to protect kids from this danger (cyber bullying), unsecured wireless networks, and ways that Dustin’s company is helping keep kids safe.

You can also subscribe to our podcast on iTunes

]]>
0
Bryan Bowers <![CDATA[Ask The Expert section added]]> http://keepyourfamilysafeonline.com/?p=652 2017-04-30T16:20:57Z 2017-04-30T16:20:57Z ]]> We just put the finishing touches on the new section of the site.  The Ask The Expert page allows you to ask any question relating to internet safety for kids, internet safety tips, e safety, social networking, online predators, and anything else you can think of.

Please check it out here.

]]>
0
Bryan Bowers <![CDATA[FBI raids home with unsecured Wi-Fi network]]> http://keepyourfamilysafeonline.com/?p=587 2017-04-27T06:03:21Z 2017-04-27T11:00:12Z ]]> The FBI raided the home of a Buffalo, New York resident over the weekend in an effort to combat child pornography.  Unfortunately for the man, the raid happened because he had not configured his new Wi-Fi router with a password.  This allowed one of his neighbors to connect to his wireless network undetected, and download thousands of images containing child pornography.

Sadly, this is not an isolated incident and has occurred countless times over the years.  A friend of mine had his Internet service shut down because a neighbor was sharing pirated music via his unsecured wireless network.  Driving down my street I can find half a dozen wireless network that are unsecured and would allow access to anyone in range.

It is so critical for parents to:

  1. Verify your home Wi-Fi network is secured using effective protection (not WEP)
  2. Conduct a location survey to see if neighbors have unsecured wireless networks
  3. Provide my handout to neighbors with unsecured networks

For more information on the dangers of unsecured wireless networks, how to effectively protect your wireless network, how to locate unsecured networks around your home, and how to approach neighbors with unsecured networks, please see Chapter 14 on Location Surveys.

Reference article

]]>
0
Bryan Bowers <![CDATA[Get a free report on the 10 ten mistakes kids make on FaceBook]]> http://keepyourfamilysafeonline.com/?p=516 2017-04-23T19:07:02Z 2017-04-25T12:00:11Z ]]> I am very excited to announce that my brand new report on the Top 10 Mistakes Kids Make On FaceBook is now available for immediate download. This free report is absolutely vital for parents to get so they can learn how to protect their children from online predators.

The report provides the following information:

  • How to identify if your child is at risk
  • Specific settings to protect your child
  • Step by step instructions showing you how to solve any problems

I also put together a YouTube video tutorial which shows parents exactly how to correct three of the biggest mistakes.

You can watch the video and download the free report by clicking here.

]]>
0
Bryan Bowers <![CDATA[FaceBook removes 20,000 underage kids daily from their site]]> http://keepyourfamilysafeonline.com/?p=447 2017-04-11T06:52:43Z 2017-04-11T19:44:31Z ]]> FaceBook disclosed that 20,000 underage children (those under 13 years old) are removed each day from their social networking site.  The shocking revelation came during an Australian government hearing in March by FaceBook’s chief privacy adviser, Mozelle Thompson.

The Daily Telegraph

]]>
0
Bryan Bowers <![CDATA[Launch day: Keep Your Family Safe Online]]> http://keepyourfamilysafeonline.com/?p=433 2017-04-11T05:56:36Z 2017-04-11T07:01:46Z ]]> I’m pleased to announce that Keep Your Family Safe Online has officially launched!  You can get your copy in either paperback or eBook format (instant download).

Get your copy today: http://keepyourfamilysafeonline.com

 

]]>
0
Bryan Bowers <![CDATA[Book launch set for April 11, 2017]]> http://keepyourfamilysafeonline.com/?p=277 2017-04-06T22:30:29Z 2017-04-06T22:30:29Z ]]> The official date for the launch of Keep Your Family Safe Online is set for April 11, 2017.  Both the eBook and paperback editions of the book will be available on that day. The eBook will be available for immediate download and the paperback should arrive in 5-7 days.

]]>
0
Bryan Bowers <![CDATA[New .xxx domain name to help parents battle pornography]]> http://keepyourfamilysafeonline.com/?p=59 2017-04-14T20:55:52Z 2017-03-19T04:29:37Z ]]> On March 18 the The Internet Corporation for Assigned Names and Numbers (ICANN) gave final approval to a new domain name, .xxx.  This new “top level domain” is designed specifically for sites that distribute pornography.  These new sites would be accessed by typing in .xxx instead of .com, .net, or .biz.

While I do not condone pornography of any type, this is a great way to segregate material that parents find objectionable.  It will be a simple process for parents to block all sites with .xxx domain names in any protection solution (both location and device based) they have installed.

The downside is that using these new domains are optional at this point.  There are organizations lobbying governments around the world to force pornographers to move to these domains.  It will be difficult for this to happen due to the influence of the pornography industry but not impossible.

]]>
0