{"id":73185,"date":"2015-02-13T09:19:58","date_gmt":"2015-02-13T14:19:58","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=73185"},"modified":"2017-04-07T20:19:07","modified_gmt":"2017-04-08T01:19:07","slug":"4-tips-stay-safe-online","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2015\/02\/4-tips-stay-safe-online\/","title":{"rendered":"4 tips to stay safe online"},"content":{"rendered":"

In recognition of Safer internet Day, which was celebrated earlier this week, here are some recommended tips \u2013 reminders \u2013 of safe practices that should be adopted.<\/em><\/p>\n

On the second day, in the second week, in the second month of the year, the world celebrates Safer Internet Day, which in 2015 fell on10 February. Under the theme this year of \u201cLet\u2019s create a better Internet together<\/em>\u201d, Safe Internet Day aims to \u201cpromote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world<\/em>\u201d (Source: Safe Internet Day<\/a>).<\/p>\n

Here at ICT Pulse, we have been, and continue to be, strong advocates for safe and responsible Internet use generally, and more so among children, and have published a number of articles on this topic over the years. Below are a few of the tips we have given over the years, which we hope are taken to heart.<\/p>\n

1.\u00a0 Limit the personal information you publish online<\/strong>. As we continue to get even more immersed in our social networks, it is critical that we become even more vigilant about what we are actually sharing about our personal lives, and the extent to which we might be exposing ourselves and our families to a whole host of dangers, based on the information we volunteer. Unless we are exceedingly cautious, our social networks tend to consist of more than just our families and close friends. Also, depending on our security settings, individuals who are not part of our network may still be able to access a considerable amount of information on our life that could be used to our detriment.<\/strong><\/p>\n

2.\u00a0 Decline or block unwanted or unknown contacts<\/strong>. Again, on social networks in particular, we can be lulled into a false sense of security, and almost without thinking, accept requests to connect from person we do not know. To be clear: bogus accounts are rife on networks such as Facebook and Twitter. Hence it is imperative be mindful about who exactly you allow into your space.<\/strong><\/p>\n

3.\u00a0 Do not be afraid to set rules and boundaries with your children. <\/strong>For many who have children in their care, allowing them to use the Internet can be seen as a way of keeping them occupied and out of trouble. However, in the same way you might establish certain rules and guidelines for your child, should they need to go to a major city by him- or herself, a similar mind-set ought to be adopted with regard to the Internet.<\/p>\n

4.\u00a0 Supervise computer use.<\/strong> As a follow up to the previous point, and having set certain rules and boundaries for Internet use for your children, it is still necessary to supervise their activity. In addition, to physical oversight, it might also be appropriate to activate applications that limit the websites a child can access.<\/p>\n

 <\/p>\n

Image credit:\u00a0 Cool Images<\/a><\/em><\/p>\n

__________<\/p>\n","protected":false},"excerpt":{"rendered":"

In recognition of Safer internet Day, which was celebrated earlier this week, here are some recommended tips \u2013 reminders \u2013 of safe practices that should be adopted. On the second […]<\/p>\n","protected":false},"author":2,"featured_media":73186,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[7,27,11,6,33],"tags":[105,38,34],"class_list":["post-73185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-broadband","category-computing","category-ict-tech","category-internet","category-lists","tag-cybercrimecybersecurity","tag-data-protection","tag-lists-2","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2015\/02\/Safer_Internet_Day_Logo-by-CoolImages4Free.jpg?fit=799%2C510&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-j2p","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/73185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=73185"}],"version-history":[{"count":2,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/73185\/revisions"}],"predecessor-version":[{"id":97110,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/73185\/revisions\/97110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/73186"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=73185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=73185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=73185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}