Online Safety – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Sun, 25 Aug 2024 00:44:58 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png Online Safety – iDefend https://www.idefendhome.com 32 32 Parents – Back to School Checklist: Ensuring Your Kids – Online Safety https://www.idefendhome.com/blog/familysafety/backtoschoolchecklistonlinesafety/ Thu, 08 Aug 2024 20:03:17 +0000 https://www.idefendhome.com/?p=6967 Get your kids ready for the new school year with these essential online safety tips for parents. Learn how to protect your children from digital dangers, set up secure online habits, and create a safer internet experience at home. From privacy settings to cyberbullying prevention, this guide has everything you need to keep your kids safe online as they head back to school.

The post Parents – Back to School Checklist: Ensuring Your Kids – Online Safety first appeared on iDefend.

]]>
Child studying online school laptop
Get your kids ready for the new school year with these essential online safety tips for parents. Learn how to protect your children from digital dangers, set up secure online habits, and create a safer internet experience at home. From privacy settings to cyberbullying prevention, this guide has everything you need to keep your kids safe online as they head back to school.

In this article

As the new school year kicks off, the importance of safeguarding your child’s online safety cannot be overstated. With the increasing reliance on digital learning platforms and the pervasive use of social media, children are more vulnerable to online risks than ever before. From cyberbullying to the unintentional sharing of personal information, the digital world presents a range of challenges that parents need to address proactively.

Why These Tips Matter

To help you navigate these challenges, we’ve compiled eight essential back-to-school online safety tips designed to keep your kids safe. These strategies cover everything from setting up secure privacy settings on social media accounts to educating your children on the importance of responsible online behavior.

By implementing these tips, you can create a secure digital environment that not only protects your children but also encourages them to use the internet responsibly. Ensuring that your child is equipped with the knowledge and tools to stay safe online is crucial as they head into the new school year.

Our Top 8 Tips for Kids’ Online Safety

1. Keep devices in common areas

To enhance online safety, it’s important to keep all internet-connected devices in common areas of the home, such as the family room or kitchen. By avoiding the use of devices in private spaces like bedrooms, you significantly reduce the chances of children engaging in risky online behaviors without supervision.

When devices are used in visible areas, parents can more easily monitor their child’s internet activity, ensuring they stay safe and make responsible choices. Establishing a shared computer station in a central location not only allows for easier supervision but also encourages open communication about online experiences. This setup fosters a safer digital environment where parents can guide their children in navigating the internet wisely.

2. Use privacy settings to protect social media accounts

Ensure your child’s social media accounts are private. Every platform offers different privacy settings, so it’s crucial to adjust each one to limit who can see your child’s information and posts. Regularly review these settings—at least once a month—to maintain account security. Setting a calendar reminder to check privacy settings is a simple yet powerful way to protect your child’s online presence.

3. Think before you post: teach responsible online behavior

Encourage your children to think carefully before posting anything online. Once something is shared, it can be difficult to remove and may remain accessible forever. Remind them to consider why they’re sharing and whether they’d be comfortable with a wide audience seeing it. If they don’t want something widely circulated online, they shouldn’t post or send it.

For teenagers, it’s crucial to emphasize the importance of never sending anything in a group message, to a friend, or a crush that they wouldn’t want everyone to see. Remind them that once something is sent, particularly explicit photos, it can easily spiral out of control. The recipient might share it with others, leading to widespread exposure that could have serious consequences. Stress that once something is online, it’s virtually impossible to remove it completely. Encourage them to think twice before sharing anything that could potentially harm their reputation or safety.

4. Friend only people you know in real life (IRL)

Teach your children to accept friend requests only from people they know in real life (IRL). Even if they share multiple mutual friends with someone, they should be cautious. This rule also applies to private messages; they should never respond to DMs from strangers. This online safety tip is essential to prevent interactions with potentially dangerous individuals, like predators, who might be posing as someone else.

5. Avoid sharing personal information online

Ensure your kids understand the dangers of sharing personal information online. They should never post their last name, school name, or location. GPS and location services can reveal their exact whereabouts, making them vulnerable to predators. Posting about being home alone or traveling with family can also expose your home and possessions to potential risks. Teach them to be mindful about what they share to protect themselves and your family.

At the same time, many parents are eager to share the excitement of their child’s first day back, often posting photos on social media of their little one holding a sign proudly displaying the grade they’re entering. While sharing these milestones can be tempting, it’s important to recognize the potential risks involved in posting such detailed information online.

Posting images that include your child’s full name, grade, school name, or even the name of their teacher can unintentionally expose them to dangers. This information can be easily accessed by strangers, potentially putting your child at risk. It’s essential to be mindful of what you share online, as seemingly harmless details can be pieced together by those with malicious intent.

While it’s wonderful to capture these special moments, consider keeping these photos private, sharing them only with close family and friends through more secure means, or without the identifying details. By taking these precautions, you can celebrate your child’s milestones while also prioritizing their safety.

6. Keep passwords private

It’s essential to teach children the importance of never sharing their passwords with anyone other than their parents. Passwords are the first line of defense against unauthorized access to personal information, so understanding their significance is crucial. As a guardian, you have the right and responsibility to periodically check their social media accounts, text messages, and other apps to ensure they’re engaging in safe online practices.

By keeping passwords secure and private, you help protect your child’s personal information from being compromised. This not only prevents unauthorized access but also safeguards against potential cyber threats such as hacking or identity theft. Encouraging your children to create strong, unique passwords and to change them regularly further enhances their online security. Reinforce that maintaining password confidentiality is a key step in staying safe online, and assure them that your involvement is to ensure their protection and well-being.

7. Never meet someone you met online

It’s vital to make it unequivocally clear to your children that they should never agree to meet anyone in person whom they’ve only interacted with online. Even if the person appears friendly or trustworthy, it’s crucial to understand that online personas can be misleading. People may not always be who they claim to be, and meeting someone from the internet in person can pose significant risks.

Reiterate that online interactions are not always reflective of real-life intentions or identities. Encourage your children to be cautious and to trust their instincts. If they ever receive a request to meet someone they’ve met online, they should immediately inform a trusted adult—whether it’s a parent, guardian, or teacher. This step is crucial for their safety, as it allows adults to assess the situation and take appropriate actions to protect them. Stress the importance of open communication and ensure that your child feels comfortable coming to you with any concerns or unusual requests they encounter online.

8. Report cyberbullying – don’t engage

Teach your children to recognize cyberbullying and avoid engaging with it. If they receive mean texts or witness cyberbullying, they should not respond or participate. Instead, they should tell a trusted adult immediately. Reporting the behavior helps stop the bullying and ensures their own emotional safety.

Empowering Parents with Online Safety Tips

As children return to school and increasingly interact with digital devices, the need for parental vigilance in safeguarding their online experiences has never been greater. The digital landscape is full of potential risks, from cyberbullying to exposure to inappropriate content, and it’s vital for parents to take proactive measures to protect their kids.

By implementing these eight essential online safety tips, you can equip your children with the tools and knowledge they need to navigate the digital world safely and responsibly. Whether it’s setting up secure privacy settings, teaching them the importance of careful online communication, or monitoring their device usage, these strategies will help create a safer online environment. As a parent, your involvement is key to ensuring that your child can enjoy the benefits of the digital world while minimizing the risks.

Getting Expert Help to Safeguard Your Family

Creating an online safety plan for your family, setting up effective parental controls, and combating cyberbullying can be more challenging and take more time than you’d like. iDefend makes it easier than ever for parents to cultivate healthy digital habits in the home and protect kids against all types of cyber risks, including cyberbullying.

Our team of advisors work with you to create a personalized protection plan for your family’s unique needs. Expert guidance, practical tips, and monitoring solutions empower you to take control of your family’s online safety and healthy balance with technology. We’re the experts so you don’t have to be.

Learn more and get protected today with iDefend. Try it risk free and save 30%.

The post Parents – Back to School Checklist: Ensuring Your Kids – Online Safety first appeared on iDefend.

]]>
Amid privacy concerns, Apple’s new AI is coming soon to an iPhone near you. https://www.idefendhome.com/blog/onlineprivacy/openaiapple/ Fri, 14 Jun 2024 17:02:46 +0000 https://www.idefendhome.com/?p=4742 Your next iPhone may know more about you than you do. What is Apple's new AI capable of, and how does Apple reassure its customers that their private life is safe and secure?

The post Amid privacy concerns, Apple’s new AI is coming soon to an iPhone near you. first appeared on iDefend.

]]>
appleai
Your next iPhone may know more about you than you do. What is Apple's new AI capable of, and how does Apple reassure its customers that their private life is safe and secure?

In this article

Artificial intelligence (AI) has taken the tech world by storm. With Microsoft, Google, Amazon, Facebook, Snapchat, and others all integrating a form of AI into their systems, Apple found themselves lagging behind. Now, with Apple’s recent AI announcement, they’ve officially entered the race in a big way. Apple’s home-grown AI, it’s partnership with OpenAI, and its integration with Apple iPhones, computers and other devices is groundbreaking. But it also gives rise to massive personal privacy concerns.

What is Apple’s AI capable of, and how does Apple reassure its customers that their private information is safe and secure? While security and privacy have always been a selling point for Apple products, what will they do with unprecedented access to an unlimited flow of surveillance and collection of personal information from the devices you use every day?

Your privacy… going, going, gone?

Apple promotes its new AI (called Apple Intelligence) as “personal intelligence built into your devices to help you write, express yourself, and get things done effortlessly, every day. All while setting a brand-new standard for privacy in AI.” It’s the first real application of AI as a personal assistant – built into devices you use every day. Naturally, and rightly so, watchdogs for personal privacy and security are alarmed at the risks with this emerging technology.

The cause for concern with the new Apple Intelligence is not just the amount of detail they will learn about you, but who has access to that data. Your phone, and Apple, will potentially know more about you than you do.

Apple Intelligence will be able to scan and interpret all your photos, making it easy to find a photo of concert tickets, driver’s license, recipes, and vacation spots with a simple request. It will be able to identify and recognize your children, spouse, and friends in your photos along with their role in your life. There are concerns about access to photos, videos, and voice where deep-fake videos and voice cloning have popped up across social media and are now used by scammers and online predators.

Siri will be supercharged due to the power OpenAI utilizes. With personal context and access to everyday life activities, Siri will use OpenAI to access calendar events, messages, and other apps to pull together information for your benefit. If you have an appointment for a meeting in the office, and then a piano recital for your daughter an hour after, Siri will plan each out accordingly and access Apple Maps to notify you when you need to leave to get to your next event on time.

If you ask when your mom’s flight is going to land, Siri will pull up the information and notify you exactly when the flight takes off and lands with the information gathered in the email. Then Siri can remind you when it is time to leave to pick her up while also taking live traffic into account. If you forgot what dinner plans you made with your mom, Siri will access your messages and pull up the text to remind you of where and when the dinner reservation is taking place.

As useful as the tools will be, the obvious question here is, if the AI can see and interpret your photos, emails, texts, calendars, and everything else, who has access to all your private information and daily activity? Can you trust them – or the other companies they affiliate with such as OpenAI? Will the government be able to get access to all this data anytime they want?

Clearly, questions about security and privacy remain. We are literally hitting just the tip of the iceberg with what Apple Intelligence will learn about us, and what it will do for us.

Voices of concern

Some of the benefits of this AI integration into your personal life might sound pretty good right now, but there is always a cost associated with such groundbreaking technology. If you’re worried about your privacy and security, you’re not alone. In fact most of the tech world is voicing their concerns about this Apple-AI integration.

Elon Musk has openly stated, “It’s patently absurd that Apple isn’t smart enough to make their own AI yet is somehow capable of ensuring that OpenAI will protect your security and privacy! Apple has no clue what’s actually going on once they hand your data over to Open AI. They’re selling you down the river.” Musk has also gone so far as to consider a ban of Apple devices from his businesses as a security measure with the announced Apple-OpenAI partnership.

Musk voiced concern that Microsoft, which owns half of OpenAI, has disbanded its ethics oversight division. “There is no regulatory oversight of AI, which is a major problem. I’ve been calling for AI safety regulation for over a decade!” Regulation may be the only hope of keeping our information private, but with AI being so new to our world, that may be years out. Of course, it’s highly likely government regulators won’t fully understand this and may cause more harm than good.

Sam Altman, CEO of OpenAI, stated that AI is, “the greatest technology humanity has yet developed” and this uncharted territory is thrilling yet should be carefully walked. Altman continued, “I’m particularly worried that these models could be used for large-scale disinformation. I think people should be happy that we are a little bit scared of this.”

Apple says its AI will “usher in a new era of privacy”. The company says it will ask you for permission to use your private data before both Apple and OpenAI will have access to it, but once you give permission, your information is fair game. Apple claims that data from Apple Intelligence will “mostly stay on your device itself. If it needs to go to the cloud (and access ChatGPT), it will be on Apple’s secure server, not stored by OpenAI.”

Security professionals will be watching closely to see how this and other concerns will play out.

Recommendations

Apple Intelligence is deeply integrated into iOS 18, iPadOS 18, and macOS Sequoia that is due to be released in Fall 2024. It will only be available on iPhone 15 Pro, iPhone 15 Pro Max, and newer iPhone models, plus iPad and Mac computers with M1 and later.

At this point, consider waiting to upgrade to iOS 18 with Apple Intelligence (If you have an iPhone 15 or newer). If you end up having to buy a new iPhone, you may want to consider buying an older model. If you must have the newest iPhone when it’s released later this year, or next year, consider turning off specific Apple Intelligence features you aren’t comfortable with, or disable it altogether.

For the next couple of years while all this new AI technology unfolds, be cautious and don’t give up your privacy rights. Realize that AI is not going away, and that all smart devices including Android will eventually have built-in AI. Be careful about giving Apple or any other tech company permission to use AI to monitor, track, and use you or your family’s personal information.

Whether we like it or not, AI will increasingly play a larger role in our lives. As it unfolds, we must continue to do everything we can to protect our privacy, our freedom, and not allow big tech or government to access, monitor, or control our digital lives.

 

Protecting your family’s online privacy is critical – iDefend can help

Everyone needs a personalized protection and support service for the digital age. iDefend protects your online privacy from data traffickers, scammers, predators, and unwanted surveillance.

Learn more and get protected today with iDefend. Try it risk free and save 30%.

The post Amid privacy concerns, Apple’s new AI is coming soon to an iPhone near you. first appeared on iDefend.

]]>
Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes https://www.idefendhome.com/blog/familysafety/snapchatai/ Mon, 22 Apr 2024 20:39:02 +0000 https://www.idefendhome.com/?p=5618 Snapchat, known for its disappearing messages and creative filters, has evolved over the years to slowly incorporate advanced AI features.

The post Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes first appeared on iDefend.

]]>
pexels-shvets-production-7194009
Snapchat, known for its disappearing messages and creative filters, has evolved over the years to slowly incorporate advanced AI features.

In this article

In the digital landscape of today, social media platforms have become integral parts of our daily lives. While these innovations offer convenience and entertainment, they also raise significant concerns, especially when it comes to the safety and well-being of teenagers.

Among these concerns is the omnipresence of Snapchat’s AI, which can be accessed at any time, and the potential dangers it might pose.

Chatbot

One of the most striking aspects of Snapchat’s AI is its chatbot, an interactive feature that allows users to ask questions, seek advice, and engage in conversations. For teenagers, this seemingly harmless function can present a myriad of risks. The allure of a “digital friend” that is always available to chat might lead teens to seek guidance from the AI on sensitive or personal matters.

Whether it’s questions about relationships and sex, mental health, or even more troubling subjects like self-harm, the AI provides immediate answers without the nuance and empathy of a human response.

Teenagers are impressionable

The danger here lies in the misconception that this AI is a reliable source of information and support. Teenagers, who are still developing their critical thinking skills, might take the AI’s responses at face value without questioning its accuracy or understanding its limitations. This can lead to misinformation, misguided decisions, and a lack of human connection when they might need it most.

Privacy Concerns

Furthermore, the constant presence of the Snapchat AI raises privacy concerns. Every interaction with the chatbot is recorded and stored, contributing to the vast data pool that fuels Snapchat’s algorithms.

This data can be used to create targeted advertisements, personalize user experiences, and even predict behaviors. For teenagers, whose online behaviors are still evolving, this data collection can have long-lasting consequences.

You Can’t Remove It

Another alarming aspect is the inability to remove the AI from the app. Unlike traditional chatbots or apps where users can opt out or disable features, Snapchat’s AI is deeply integrated into the platform. The only way to remove it is by subscribing to Snapchat+, the premium version of the app.

This creates a dilemma for parents and teens alike. As a parent, if you don’t want your child to interact with the AI, there is no way to actually hide or get rid of it, giving your child unlimited access.

What to Do as a Parent

As parents navigate the complexities of raising teens in the digital age, understanding these dangers is crucial. Initiating conversations about online safety, critical thinking, and the limitations of AI can empower teens to make informed decisions. Encouraging them to seek human support when needed, whether from trusted adults or professional resources, can provide a balance to the allure of the always-available AI friend.

While Snapchat’s AI offers convenience and entertainment, its potential dangers should not be underestimated. From providing questionable advice to collecting vast amounts of personal data, the implications for teenagers are significant. As we move forward in this digital era, it is essential for parents, educators, and society as a whole to remain vigilant, informed, and proactive in safeguarding the well-being of our teens in the digital realm.

The post Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes first appeared on iDefend.

]]>
The Dangers of TikTok Trends https://www.idefendhome.com/blog/familysafety/tiktoktrends/ Wed, 10 Apr 2024 19:26:17 +0000 https://www.idefendhome.com/?p=5570 Eating TIDE pods, licking unbought ice cream for unsuspecting shoppers, or high schoolers destroying school bathrooms. All of these have become extremely popular trends on Tiktok and other social media outlets, yet these can prove to be incredibly dangerous and even cause death, and for what? To go viral and have millions of people see you at a simple swipe of a finger.

The post The Dangers of TikTok Trends first appeared on iDefend.

]]>
tiktok-dangers
Eating TIDE pods, licking unbought ice cream for unsuspecting shoppers, or high schoolers destroying school bathrooms. All of these have become extremely popular trends on Tiktok and other social media outlets, yet these can prove to be incredibly dangerous and even cause death, and for what? To go viral and have millions of people see you at a simple swipe of a finger.

In this article

Tiktok is a media source phenomena to put it lightly. When it was released back in 2016, within a few months the app had over 100 million active users, all watching videos that were a minute or less. This is unprecedented, and the following years have seen this app explode in popularity.

In January of 2023, for example, it had a staggering 104 Million App Downloads. That’s more than 3.3 Million downloads a day. Teens and adults alike can post videos in a matter of minutes for all the world to see, all with the hopes of going viral.

How TikTok Works

Tiktok works by having the user watch videos. The more that you watch a video the more the creator makes while Tiktok generates avenues through ads and selling your data (but that’s another topic for another time.) When someone creates a video, Tiktok releases the video to a small audience to see if the video gets a number of hits, or reactions. Once it meets the requirements, the algorithm then releases it to a bigger audience and so on until a viral effect is reached.

And anyone 13 or over can create videos to be uploaded on Tiktok, giving them hope to one day go viral and be popular among the community. These trends can be a dance, some kind of physical challenge, or mouthing the words to movie lines. With that, there have been some dangerous trends that have reached a viral effect and encouraged others to participate in the hopes that they will go viral as well.

Recent and Past Viral Trends

Below are some of the viral Tiktok trends in the past few years.

The Benadryl Challenge

The Benadryl Challenge saw teens and adults trying to take an excessive amount of benadryl in order to cause themselves to hallucinate. Unfortunately, it caused multiple hospital cases and even the death of a 15 year old girl.

“Benadryl in large doses can cause seizures and cardiac arrests. If young people are being encouraged to take it in large doses on TikTok, this is very dangerous.” David Juurlink, MD, of University of Toronto in Canada said.

The Penny Challenge

The Penny Challenge had teens partially unplug a charge port for an iphone and then stick a penny between the two prongs. This would then create a huge spark that would leave a scourge mark around the outlet and wall. Sometimes doing so would cause house fires, but nearly every time, at the very least, it caused damages.

The Sleeping Chicken Challenge

The Sleeping Chicken Challenge was where a man uploaded himself cooking his chicken with an entire bottle of Nyquil. The heat would dissolve most of the liquid, giving you a very concentrated amount of Nyquil to ingest. The man was then shown eating the chicken he had prepared and the trend shot to millions of views in a matter of hours.

Blackout Challenge

The most recent trend was the “Blackout Challenge” where teens filmed themselves holding their breath or having another squeeze their neck until they lost consciousness. This dangerous trend resulted in multiple deaths including a 10-year-old girl who died in the US December of 2022 after reportedly attempting the challenge.

TikTok Doesn’t Care About Kid’s Safety

Each of these trends happened within the last two years, and the scariest part is that Tiktok did nothing to take down or stop the videos. Once the videos get a certain number of hits, Tiktok will, in fact, send the video out to more people to get more views and generate more revenue for them. The more views these videos get, the more money Tiktok makes. They, in no way, care about the safety of your kids.

There was another video that went viral where a New Jersey teenage girl was getting beat up by her peers outside of her classroom. The bullies then posted the video on Tiktok and ended up getting millions of views in a day. The bullied teen saw how many had seen it, and after the bullies continued to harass her over her phone, she ended up committing suicide. She was only 14 years old.

Social Media Has a Dangerous Side

Social Media does little to protect minors in the world today. As long as they can make an easy dollar, they will allow nearly anything to be posted. With that, Tiktok also has a flood of “soft” pornography that creators post to lead you to their Only Fans accounts. By clicking a link, you can see their Instagram, Twitter, and Only Fans, giving your teen easy access to pornography. Twitter also allows fully nude photos to be posted, and is used as a way to convince viewers to purchase their Only Fans subscription.

Tiktok is a gateway to a world of information and fun, but it can come at a great cost. You will have zero control over what your teen watches and views as anything can come up as a recommended video. Be mindful of the trends, and if you decide for your teen to have a Tiktok, be sure to have rules and guidelines while they are online. To have them participate in these trends can not only cause permanent harm to their bodies, but may also result in death.

The post The Dangers of TikTok Trends first appeared on iDefend.

]]>
Hashtag What? Understanding TikTok Lingo https://www.idefendhome.com/blog/familysafety/tiktoklingo/ Fri, 05 Apr 2024 19:44:42 +0000 https://www.idefendhome.com/?p=5582 As a parent, it can be difficult to keep up with all the modern slang, social media lingo, and words your kids are using. Here's some for TikTok that may help you out.

The post Hashtag What? Understanding TikTok Lingo first appeared on iDefend.

]]>
tiktok-lingo (1)
As a parent, it can be difficult to keep up with all the modern slang, social media lingo, and words your kids are using. Here's some for TikTok that may help you out.

In this article

TikTok is one of the most popular social media apps today. Its fast-paced, short content is enticing, addictive, and easily becomes consuming. While it can be used safely, there are plenty of dangers to be aware of.

Knowing and understanding the lingo used by the app will enable you to have more informed conversations with your teen.

The Lingo

  • “For You” feed. The For You feed is curated to fit each user’s interests and behavior. As kids interact with the platform — watching videos, searching for keywords, and exploring new hashtags — the algorithm mimics their preferences and serves customized content.
  • “Following” feed. Just like it sounds, the Following feed displays the TikTok accounts that are following your child. It’s a good idea to ensure this list only contains friends or people your child knows.
  • Challenge page. Challenges encourage users to record themselves doing something humorous, vulnerable, or difficult and share these videos — persuading other users to do the same. Most challenges are tame, but others promote harmful behaviors or could cause serious injuries.
  • Discover page. The Discover page is where kids find new and exciting content. Trending hashtags, videos, creators, and sponsored content congregate on this tab.
  • In-feed ads. Unlike ads on other video apps, TikTok ads are nondescript. In-feed ads look just like regular TikTok videos, and automatically play as users scroll through their feeds. For example, advertisers might feature well-known influencers to promote popular video games or beauty products.
  • QR code or TikCode. TikTok gives every user a unique TikCode to make it easier to follow each other. Instead of manually typing in a person’s handle, kids can swap profiles by pulling up their TikCodes and asking friends to scan them like they would a QR code.
  • Duet and Stitch. Duets are two TikTok videos playing in a split-screen format using the same audio. Stitch offers another way for users to add their own flair to someone else’s content. You can clip and “stitch” together scenes from another person’s video to make an entirely new video. Stitch is only available for TikTok users who are 16 years of age or older.
  • TikTok Live. Similar to Facebook or Instagram Live, TikTok Live lets users interact in real time. Creators use this feature to communicate with their followers. Brands may use Live for sales or giveaways. Live is only available for users over the age of 18.
  • Reactions. Within TikTok, users can record their own videos of themselves watching another person’s video. The idea is to show their spontaneous reactions to a video — whether it’s surprise, laughter, or shock.
  • Hashtags. TikTok hashtags operate the same way as those on other social media apps. Using hashtags, users can discover trending content from accounts and users whom they haven’t yet followed.

The post Hashtag What? Understanding TikTok Lingo first appeared on iDefend.

]]>
Snap What? Understanding Snapchat Lingo https://www.idefendhome.com/blog/familysafety/snapchatlingo/ Sun, 17 Mar 2024 19:51:33 +0000 https://www.idefendhome.com/?p=5593 As a parent, it can be difficult to keep up with all the modern slang, social media lingo, and whatever those words are your kids are using. Here's some for Snapchat that may help you out.

The post Snap What? Understanding Snapchat Lingo first appeared on iDefend.

]]>
pexels-thought-catalog-317580-2228569
As a parent, it can be difficult to keep up with all the modern slang, social media lingo, and whatever those words are your kids are using. Here's some for Snapchat that may help you out.

In this article

Snapchat has grown and expanded into a staple app for teens and adults everywhere. The ability to communicate with your friends and family through photos and videos that disappear has become a staple app.

Fun filters, posting to your story, and watching a quick discover story has become a highlight for those who use the app, but with Snapchat comes its own lingo.

So what do these terms mean?

The Lingo

  • Snap. Each message you send, text, picture or video, is a snap
  • Story. When you snap a video or photo you can decide to post it to your friends and even to the public for all to view. Stories are publicly visible for 24 hours, then disappear. There are no limits to the amount of stories you can post
  • Memories. Stories which are automatically saved. Snapchat will show you certain stories on the anniversary of when you posted them. Snapchat can also make short videos showing you the memories if multiple videos and pictures were posted on that day.
  • Snapcode. A scannable code that can be used to quickly add friends to a Snapchat profile. Looks like a QR code.
  • Snapstreak. This term refers to the length of time that two people have snapped each other consistently for consecutive days. It’s extremely popular for friends to compete and see how long they can maintain their streak without missing a day and breaking it.
  • Geofilter. Like filters, you can use a geofilter to decorate snaps and share your location (popular at large, public events).
  • Snap Map. With this feature, you can share your location and look around a map to see where other people are located.
  • Discover. Media content created by celebrities, entertainment outlets, and random strangers. While many of these content providers are legitimate, you can’t truly predict what might pop up. Alcohol ads, offensive language, or nudity/sexual talking points could pop up just as easily as the New York Times. Content is typically promotional in nature and is frequently mature in subject matter.

The post Snap What? Understanding Snapchat Lingo first appeared on iDefend.

]]>
What To Do If Your Email Gets Hacked https://www.idefendhome.com/blog/onlineprivacy/emailgetshacked/ Mon, 05 Feb 2024 23:10:08 +0000 https://www.idefendhome.com/?p=5688 It can happen to anyone, but if you're lucky you can avoid it. Worried you've been hacked? Here's what you can do.

The post What To Do If Your Email Gets Hacked first appeared on iDefend.

]]>
pexels-tdcat-193003
It can happen to anyone, but if you're lucky you can avoid it. Worried you've been hacked? Here's what you can do.

In this article

Email has been around for a few decades now, and practically everyone has one, even if they use it infrequently. Chances are, if you’ve had your address for a few years, you’ve started to see scams, ads, and plenty more unwanted content showing up in your inbox.

You’ve probably also heard of emails getting hacked, and you may have even seen a few of these before—you get a message from your “friend” telling you they need a random amount of money, ASAP, and you’re their only hope. But what if you’re on the other end, and someone else on your contact list gets an email from “you” requesting a similar favor. What do you do then?

Email security

First off, let’s address some basic email security habits that everyone should have. If you haven’t been hacked and there’s something here you’re not doing, consider this your wake up call.

  1. Have a strong password. In today’s digital world, running about with weak and simple passwords is like leaving your car unlocked with your cash-stuffed wallet inside. If you want to anonymously test the strength of your passwords or need help coming up with stronger passwords, check out our guide to passwords.
  2. Consider two-factor authentications (2FA). Another step beyond having a password is setting up 2FA. This means you have to provide a special, one-time code in addition to your password in order to log into and access your email. It may not be right for every use case, but it’s generally a good idea. This can also be known as Multi-factor Authentication (MFA).
  3. Create “better” security questions. You’ve probably had to set up some security questions before: “What street did you grow up on?”, “What’s your mother’s maiden name?”. While these are a nice idea and their original intent was to help a user lock down their account—after all, who else would know these answers besides, well, you? The problem is that since the advent of social media, it’s often pretty easy for a hacker to either guess or do a couple minutes of research to find the answers to these secure questions. A “better” way to answer these questions is by choosing an answer that is meaningful to you but may not even have anything to do with the question itself. For example, answering “What’s your favorite drink?” with “Harry Potter”.
  4. Don’t open unexpected emails. The final tip is crucial to preventing not only your email from getting hacked, but infecting your computer or phone with viruses. Even if you have a rock-solid password, 2FA enabled, and an active virus shield, the moment you click on a strange email, follow the links inside, or try to open an attachment on it, none of that prior protection matters. The best thing you can do is to never even open these emails and instead delete or mark them as spam.

What happens when your email is hacked?

If your email hasn’t been compromised that you know of, but want to know some of the warning signs to watch for, or are simply curious and want to take a couple minutes to learn more about it, this next section is for you.

Typically, the main reason a scammer or hacker wants access to your email address is to use it to try and spread malware or propagate scams to your contact list. Once they have access to your account, they will immediately begin using it to send out malicious emails to every saved address in your contacts. The thinking is that a person is more likely to click on and entertain a suspicious email if it’s coming from their “friend”.

The sad truth is that many people don’t take the time to consider who is actually sending the emails they click on. A lot of users will notice their friend’s email address and assume they are the one who’s sent them a request for a gift card, wire transfer, or link to a compromising video. It’s always better to check with that person (if you actually know them well enough to receive unsolicited emails from them), and verify if they actually did send you that. Otherwise, this should raise a huge red flag.

How does your Email get Hacked?

While it’s technically possible that a hacker could head over to gmail.com, type in a random address and then guess a password, this just isn’t an efficient way for a scammer to operate. More commonly, they will acquire these email addresses either from a hacked website, newsletter, or other kinds of compromised databases.

Once they’ve obtained a list of, say, a few thousand email addresses this way, a hacker might decide to use these themself or put them up for sale on the dark web for other scammers to purchase. Just the addresses themselves without a password aren’t terribly valuable, and so most people who collect these lists are looking to start spamming malicious emails in the hopes that a fraction of the recipients open up and fall for the traps they’ve laid within.

What’s more dangerous, however, is if someone does get both your email address and the password. At this point, unless you’re lucky, they’ll immediately change the password and you’ll find yourself locked out of your account. If this happens, it’s too late to protect your account proactively and you’ll instead need to take some steps to try and recover your account.

What to do if your Email gets Hacked

If you’re lucky and the hacker didn’t change your password but you’ve received reports of people getting scammy emails from your address, you should immediately call your iDefend Advisor team at 801-724-6211.

If you’ve found yourself on the receiving end of a hacked email account, following these steps is the best way to reclaim your data and get back up and running again.

  1. Report the hacking to your email provider. Most of the major providers have a way to do this from the sign-in screen.
  2. Scan your computer/phone for viruses and malware. If you have [our service], one of our techs will have your back on this one.
  3. Change your security questions and make them better. Better questions equal better security. If you’ve ever done one of those social media posts about “your first car, your high school mascot, etc.” you may have unknowingly given out answers to your security questions. Try using answers only you would know and never share them.
  4. Change your password and make it stronger. If you use this same password or email to log into other websites, you should also change it there.
  5. Let friends and family know you got hacked. If you suspect any malicious or scammy emails have been sent from your account, letting people know you got hacked and not to open anything weird from you is a good idea.
  6. Check your email settings. Pay especially close attention to the automatic forwarding settings to make sure nobody else is snooping in your inbox.
  7. Activate monitoring. If you’re worried that any of your sensitive personal data might be compromised (things like personal IDs, SSN, DOB), having active dark web monitoring and identity theft protection in place will give you peace of mind.
  8. Pay attention to any 2FA you’ve set up. As stated above, if you start seeing texts on your phone or messages through another email account with access and verification codes you didn’t request, report it to your email provider right away.

Final Thoughts

Nobody wants to wake up to a hacked email account, but unfortunately identity theft, hacking, and scams have risen exponentially over the last few years. For most of us, identity theft, ransomware, and hacking is no longer only something we’ll hear about on the news, or that doesn’t happen to us.

Having active protection in place is no longer something only business owners and global corporations need to be concerned with, as more and more individuals, families, and small businesses are falling prey to cybercrime daily. We believe that everyone deserves the peace of mind that comes with knowing your information is safeguarded, and you have steps in place for the day that identity theft comes knocking at your door.

The post What To Do If Your Email Gets Hacked first appeared on iDefend.

]]>
Welcome to 2024: Navigating Cybersecurity During the New Year https://www.idefendhome.com/blog/familysafety/welcome-to-2024-navigating-cybersecurity-in-the-digital-age/ Mon, 05 Feb 2024 20:27:08 +0000 https://www.idefendhome.com/?p=3543 Welcome to 2024! With this new year comes a crucial opportunity to reflect on the lessons learned from the cyber threats of last year.

The post Welcome to 2024: Navigating Cybersecurity During the New Year first appeared on iDefend.

]]>
Caucasian,Parents,With,Kids,On,Couch,Using,Gadget.,Young,Man
Welcome to 2024! With this new year comes a crucial opportunity to reflect on the lessons learned from the cyber threats of last year.

In this article

As we embark upon another journey around the sun, we find ourselves with possibilities and challenges alike. With 2024 comes a crucial opportunity to reflect on the lessons learned from the cyber threats of last year.

The Cyberattacks of 2023

In 2023, the world witnessed an unprecedented surge in cyberattacks, underscoring the ever-present dangers lurking in the digital realm. From brazen ransomware assaults targeting critical infrastructure to insidious phishing schemes preying on unsuspecting individuals, the breadth and sophistication of cyber threats reached alarming heights.

No one was exempt

No entity, whether large or small, corporate or governmental, was immune to the relentless onslaught.

Looking Ahead

As we peer into the horizon of 2024, it is imperative that we remain vigilant and proactive in safeguarding our digital personal information.

Be aware of new tech

With emerging technologies such as artificial intelligence, quantum computing, and the Internet of Things continuing to proliferate, the threat landscape is poised to become even more complex and treacherous.

Our Team Has Your Back

Through monthly updates and insights, we will navigate the ever-changing landscape of digital threats and opportunities, ensuring that you are equipped with the knowledge and tools needed to thrive in the digital age. We look forward to navigating 2024 with you and to discover together all this year has to offer.

The post Welcome to 2024: Navigating Cybersecurity During the New Year first appeared on iDefend.

]]>
Sextortion: A Parent’s Worst Nightmare Coming Soon to a Smartphone Near You https://www.idefendhome.com/blog/familysafety/sextortion/ Tue, 23 Jan 2024 20:12:11 +0000 https://www.idefendhome.com/?p=5603 What starts out as a flirtatious text can quickly turn into a whirlwind of trouble for your child.

The post Sextortion: A Parent’s Worst Nightmare Coming Soon to a Smartphone Near You first appeared on iDefend.

]]>
sextortion
What starts out as a flirtatious text can quickly turn into a whirlwind of trouble for your child.

In this article

Predators and scammers will text your teen to try to develop a relationship by sending flirtatious and fun texts. They will say anything to help develop a relationship and connection all to set the trap.

The moment your child takes and sends the explicit pictures, it is far too late, the trap has been sprung and the scammer is prepared to take full advantage.

Panic is the Natural Response

Your child starts to panic. The person they trusted is suddenly threatening to release the pictures on your child’s social media. The person pulls names of friends and family members saying that they will personally message them the pictures and show them what they’ve done. Sometimes going so far to locate your child’s school threatening to post there to all of your peers, but then they’ll give your teen a way out.

If your child pays $500, then nothing will happen. No pics will be sent, and all of this can go away. The stress that your child is feeling is overwhelming, there’s a way out, but $500 is a lot of money. Thoughts of hopelessness, fear, anxiety and depression creep in as they’ve locked themselves in a corner with no way out and zero relief on the horizon.

Sextortion is Humiliating

To open up about it to a parent can be humiliating, and other thoughts of ways out can start to creep in. Teens that reported sextortion cases found that 1 in 3 teens had engaged in self-harm, threatened suicide or attempted suicide as a result of the sextortion.

It’s difficult when teenagers are constantly searching for gratification and acceptance. With that, hormones can play a major part and cloud judgment. They are learning all the new and exciting things becoming an adult holds, and to explore all of that is a thrilling adventure, but such choices can have major consequences that can affect years to come.

Sextortion is Avoidable

The sad part is that sextortion is 100% avoidable. With social media, your teen can instantly connect with anyone they would like, not knowing if they are real or fake. Everyday millions of messages are sent out to strangers to try to connect with them for a multitude of reasons, and predators will always search for a way in.

What you can do as a parent

So what can you do to ensure that your child never falls victim to this trap? Firstly, be sure to have open conversations with them about these kinds of threats. Educate yourself and them on the dangers of the world, and what people will do to take advantage. Recommend to them that they never message and text strangers they don’t know.

Most of all, especially with people they know, never send out explicit messages, pictures, or videos. Nothing good will ever come of that, and there are also legal actions that can be taken against your child for sending such pictures.

How and When Does it Happen?

Sextortion most commonly occurred via phone/tablet messaging apps, social networking sites and video chats. 56% of reports indicated that only one messenger platform was involved, yet 42% used multiple platforms. The offender would intentionally and systematically move the communication with the teen from one platform to another such as Facebook, Snapchat and text messages.

When your child sends the pictures or videos, 80% of predators will threaten blackmail on the same day. However, 20% of the reported cases indicated prolonged waiting periods before any threats of blackmail were made with the acquired content. In some cases, years later. With such blackmail and payouts victims lost more than $13.6 million in the 18,000 sextortion-related complaints in 2021.

Warning Signs & Predator Tactics

Those who your teen is talking to are rarely who they claim to be. Keep in mind that the teenage girl they believe they are speaking to may very well be a middle aged man. There are certain tactics to keep in mind that the predator may use such as:

  • Reciprocation, the offender promises to provide sexual content in return for your child providing the same. “I’ll show you, if you show me.”
  • Developing a bond by establishing a friendship/romantic relationship.
  • Secretly recording sexually explicit videos of the child during video chats.
  • Physically threatening to hurt or sexually assault the child or family members.
  • Using multiple online identities against a given child, such as the person blackmailing for sexual content as well as pretending to be a supportive friend or a sympathetic victim of the same offender.
  • Pretending to be younger and/or a female.
  • Threatening to commit suicide if the child does not provide sexual content.
  • Creating a fake profile as the child and threatening to post sexual content of the child.
  • Saving sexually explicit conversations with the child and threatening to post them online.

There is Hope

You and your family never need to become a victim of sextortion. Take the steps necessary and educate your child on the threats that exist around them. The online presence of predators and bullies are very real, but as we take the proper steps to prepare and protect our children, we can have peace of mind when facing the dangers of the world.

The post Sextortion: A Parent’s Worst Nightmare Coming Soon to a Smartphone Near You first appeared on iDefend.

]]>
5 Tips for Social Media Safety https://www.idefendhome.com/blog/onlineprivacy/5tipssocialmedia/ Fri, 08 Dec 2023 22:49:21 +0000 https://www.idefendhome.com/?p=5736 These days, it's almost impossible to spend a day on social media without encountering some potential security issues: scams, privacy leaks, and fake follower requests just to name a few.

The post 5 Tips for Social Media Safety first appeared on iDefend.

]]>
pexels-cottonbro-5053835
These days, it's almost impossible to spend a day on social media without encountering some potential security issues: scams, privacy leaks, and fake follower requests just to name a few.

In this article

Social media is a powerful tool which allows us to connect to the lives of those around us without the need to be near. With that comes the ability to instant message, share photos and videos, as well as view what others have chosen to share.

You may not have enough information for someone to completely steal your identity, but if your profile isn’t properly protected you can allow for phishing attempts among other threats to take place.

Here are five tips for better safety:

1. Be aware of social media scams

Scam artists work to build a profile of you. When your Social Media account is allowed for anyone, including those not of your friends or followers, to openly view you, you allow for them to gain a view into your life. Those potential thieves can look in and view person videos and photos that you have uploaded. This allows them to discover ways in which they can advertise to your needs to trick you to freely give out your information for them to steal your identity.

Take for example that you recently had a birthday party. You posted pictures, tagging friends and family, as well as a few videos to commemorate your special day. The fact is that when your account is open for the world to see, they can look in and see what your home is like, who’s in your family and friends circle, as well as who you are as a person.

Still, there are some vital steps you can take which will allow you to better protect yourself.

2. Ensure your account is fully private

When new friends wish to add you, they can search for your name/username and pull up a variety of accounts until they see the corresponding picture of you. When they click on the link to your profile, they will be given a preview of your account, and the chance to send a request. Now how much you decide to show on your profiles is entirely in your control.

Under your setting section there is a tab labeled privacy. Under that you will be able to pick and choose what you want to show. It is recommended that you hide all information, including social posts. Your profile picture will still be shown, but past profile pictures, among other information will be protected and hidden until you accept that friend request.

If you want to view how your profile looks when others click on you, simply open an incognito window, and post your profile link. This will allow you to see exactly what they see before they send a request.

Tip: Do not list family members on your Social Media Account. Doing so can in fact give thieves information into common security questions, such as your mother’s maiden name. Photos also can reveal the color of your first car, first pet name, and so forth.

3. Know what happens to your information

There are a few items to keep in mind as well outside of what scam artists may be looking for. Social Media websites can also compromise your information and send it to advertisers to help them plot out ads that peak your interest. One thing you can do to help combat this is to keep your location data private. When you’re on your account with your phone, usually the app will be tracking your location and whereabouts. They can also see what you are searching for, what you are clicking on so that they can better populate their web address with ads. To keep it private, go into the settings on your phone, and find the app. Once you do, you can pick the location tracking, and turn it on to, never allow.

Consider using a VPN

Another option would be to install a VPN on your phone and computers. This would ensure that everything that you do is hidden, and that your IP isn’t exposed as well. Your information, searches and clicks on the web stays with you, and isn’t released to outside sources.

Don’t give away too much in your “About” section

Your About section on your profile can carry with it multiple points of valuable information. The nice part is, is that you can simply go in and delete it all together. Information like where you currently work, past places you’ve lived, and family and relationships, can give a perpetrator all the information they need to scam you.

While a scam artist is searching through your profile, one dangerous section is in your contacts. The most common personal information exposed on the dark web is email and phone numbers, and your Social Media profile has direct access to both. Luckily, you can go into your ‘About’ section and mask or delete that information so you will not be the victim of SPAM or Phishing attempts.

4. Only accept requests from those you know

Fake accounts are abundant, and in a matter of minutes someone can look up pictures of someone, upload them to a profile, and make it appear legitimate under a fake name. Once that is done, they can send requests to anyone they would like, to try to gain the ability to view profiles. The most important thing to remember with this is to only accept requests from those you know in person.

There is a dangerous scam that can sometimes occur where your friend’s account is copied and you receive a request to refriend them. Sometimes you can even receive a message explaining how the error occurred and why the need to friend them again. The smart thing to do is verify with the friend directly through some other source, ex. Via Phone, and confirm if that truly is the case.

5. Watch out for common attacks

One of the most important things to remember is to trust yourself when you believe it is questionable. If a friend that you haven’t spoken to in a while randomly sends you a message like, “This video is so funny! Check out this link:” Then there is a chance that your friend’s account has been hacked. Never click on the link. Doing so causes for your account to be compromised with theirs, which can be dangerous because you won’t know what kind of information they were able to gather while in your account.

When in doubt, change your password

If this does end up happening to you, immediately change your password as soon as possible. It is a good rule of thumb to change your password every couple of months to something unique and to only this account. If your password and email is compromised, then each account which uses the same username and password can be accessed as well.

Avoid “Click-bait”

Another hazardous “Click-Bait” which can also compromise your information is the Quizzes or ‘Find Out Tests’. When you want to discover ‘Which Animal Best Fits Your Personality’ you click on a link which transports you to an outside source. There you are prompted to allow access to certain information, and need to click ‘Accept’ or ‘Allow Access’. Each time you allow access to your account you allow for that service to receive anything they would like. You gave them access, yet have no idea what they took, or will use it for.

The post 5 Tips for Social Media Safety first appeared on iDefend.

]]>