If you don’t maintain the health of your device then you should expect that your device will at some point in the future become compromised in some way, shape or form. What type of compromises may occur? How often? What can you do? Let’s answer these in order…Tags: #NCSAM, Crime, cyber security, data, Facebook, family, friends, internet, internet safety, iPad, iPhone, IPod, location based services, malware, mobile, national cyber security awareness month, online safety, PEW, privacy, safety, security, sexting, smartphone, sms, texting, videoNews, Online Safety, Safety & Security
Last updated byat .
In David Schwimmer’s TRUST, the teenage character Annie finds herself the subject of great deal of unwanted and undeserved attention by her high school classmates in a manner in which constituted to all would be unacceptable and falls within the realm of cyberbullying (as the bullying occurred using online media). We all have encountered instances where those who did not conform or who had experienced something not of the ordinary come under undo scrutiny and are isolated for the experience by their peers. The scrutiny often times manifests itself into ridicule, sarcasm or insults as those who are observing from afar attempt to differentiate and exclude themselves from the experience.