Category: Internet Security

TikTok and Online Security | Is TikTok Safe for Kids?

Is TikTok Safe for Kids?

You might have recently heard about some of the scandalous accusations that have been aimed at TikTok. Their accused lack of respect for peoples’ privacy and for online security has led to people wondering if they are spying and even seen calls for the app to be banned in the USA.

In this guide, we’re looking at some of the reasons why people are so suspicious of TikTok and going in depth on whether or not you should trust this social media giant.

What is TikTok?

TikTok is a social media company that is similar in some respects to other visual platforms like Vine and Instagram. It focuses on short, snappy videos. There are effects you can add as well as songs and soundtracks, and these make a lot of the videos perfect for sharing. There are TikTok celebs in the same way that there are YouTube celebs as the younger generation especially become infatuated with the platform.

The TikTok Controversy: Is TikTok Safe?

People suspect that they are less than honest for a few different reasons. The Chinese company that owns TikTok has been accused of working with the Chinese government and the CCP in order to spy on Americans and other nationalities using the app.

Also, TikTok has had a chequered past where 42 million user profiles were exposed in a massive data leak, and because it is quite an open platform it can be abused by some scammers.

Why would TikTok want to steal peoples’ information?

It is hard to know the exact motives, but the accusations of links to spy groups suggest that they could wield some very powerful information. If the TikTok security was breached (something that a lot of people are concerned about) then this information, and the huge amount of data that the app requests to store when you use it, could be utilized for those with sinister intentions.

One of the things that has made people suspicious is the fact that TikTok records so much, including your location and even your device’s keystrokes.

Identity Theft Facts

Did you know that cybersecurity statistics show that nearly 1 in 3 DATA breach victims (30.5%) also suffered from identity fraud In 2013 – up from 22.5% in 2012. And this was years ago, Identity theft has been on the rise ever since, before TikTok was even on the scene. This type of theft is becoming more viable, and more easy to implement for certain criminals and this means that it is growing. Identity theft could well overtake physical forms of theft. People can use your details to borrow money or even to commit crimes, so it is important to be really cautious about what information you make available.

Identity theft can seem like something a bit abstract and like it is not relevant to you, but over 60% of those hit by scams say they have no idea how it happened to them. You can never be too careful as it can happen to anyone out there.

How to protect yourself and your children from Identity Theft

If you are at all worried then you should remember that you don’t have to get a TikTok account, and even if your children are desperate to have one, you might want to discourage this use of social media wherever possible. Though it doesn’t seem fun, it is worth actually reading the privacy policy and terms and conditions of the app. If you aren’t comfortable, steer clear.

If you do create an account, ensure that it is a private account, and see if your device will allow you to stop apps and third parties tracking your use of the device while you use the apps as this can be a way to prevent identity theft and stop loads of details about you and your life from being collected. 

How Safe is TikTok for Kids and Teens?

TikTok Safety and Online Security

As with any social media platform, there are certain risks associated with the app that parents should be aware of. One risk includes the potential for exposure to inappropriate content. While it’s true that the app’s official guidelines prohibit illegal or inappropriate content to be shared, it’s worth noting that there aren’t real people managing this process. Instead, TikTok relies on digital algorithms to automatically filter out content that violates the app’s official guidelines. The reality of this is that some illicit content will inevitably fly under the radar and end up on users’ screens.  

Another area of concern is the potential for communication with strangers. With over one billion users on the app, the risk of contact with strangers shouldn’t be ignored. Teens aged 16+ that create an account will have their profile set to public by default, and their account activity is visible to anyone. While accounts made by children between the ages of 13 and 15 are automatically set to private, it’s not hard to bypass this restriction—all they have to do is enter a false birth date when they register for an account. 

While there are many parental controls parents can activate to mitigate many of these risks and create a safer experience for their children who use the app, it’s still important to be educated on the potential dangers that come with any social media platform. Knowing what privacy settings you can manage and taking time to set technology boundaries with your kids are some of the best ways you can ensure your kids are protected on TikTok.

Cyberbullying on TikTok

TikTok has taken steps to combat this issue by implementing reporting mechanisms, content moderation, and algorithmic changes to promote positive interactions. However, parents should be diligent to recognize the signs of cyberbullying to protect their children.

One of the main reasons why cyberbullying thrives on TikTok is the ability to hide behind a screen. Users can create anonymous accounts or use pseudonyms, making it difficult to identify the perpetrators. This anonymity emboldens cyberbullies, allowing them to engage in hurtful behavior that not only affects the victims’ mental and emotional well-being, but it also creates an environment where bullying can persist unchecked.

Because of the viral nature of TikTok’s content, well meaning videos that gain popularity can quickly attract negative attention, leading to a barrage of hurtful comments, insults, and even threats. The comments section, where users can interact and leave their thoughts, can easily become a breeding ground for cyberbullying.

What Will Happen To TikTok?

Nobody has specific proof that TikTok is being used to spy on people or to steal identities. In the world of politics there is plenty of debate about the app and its use as people realize just how much power the owners of the app, ByteDance, who first acquired musically then transformed it into TikTok, could have if they really are tapping into that personal data.

If the claims are valid then it is probably a good idea to come off the app, but also to protect yourself in other ways. You can use identity monitoring services to try and establish whether data about you has leaked or become available on the black market. If some of the claims that have been made about TikTok and the Chinese government links then there is every chance that there will be some really drastic measures taken very soon.

The Future of Tiktok

TikTok seems to be tightening up some of its security.  The recent bad PR has led to the app trying to build confidence from consumers that they are not trying to steal data from people or collude with parties who are less than trustworthy.  It still remains to be seen how safe TikTok can be for kids.

The app could be removed from app stores if it is not up to scratch in terms of its privacy policies, so there are real threats to whether it will continue to exist within the western hemisphere. The threat of this will surely lead to the app becoming more watertight and giving users a lot more security controls. If not, the days of cute cat videos on TikTok could be numbered.

Share This Article

How to Protect My Family’s Finances from Hackers

Protect My Family’s Finances from Hackers

With the rise of technology, online security is more important than ever. Hackers are always developing new ways of compromising banking accounts. You do not want to be a victim of these cybercriminals, and most especially, you do not want your loved ones to fall in the trap. Thus,are there ways to make sure yours and your family’s finances are safe online?

There are many things you can do to protect your family from hackers. You can install the best antivirus, use a VPN to hide your IP, create strong passwords, and avoid clicking on bad links, etc. Read the entire guide to learn more.

Install the Best Antivirus

One of the effective ways of protecting your finances online is by installing good antimalware. A good antivirus will protect you from all malware created by hackers such as Trojans, Viruses, ransomware, adware, spyware, to name just a few.

The best antivirus comes with extra features to keep your online accounts safe from scams and other cybercriminals. Here are the features to look out for when buying one;

  • Malware protection; a good antivirus program should offer protection against new and advanced forms of malware. Cybercriminals use this malware to steal your banking details such as passwords and usernames.

This protection will improve your device’s native security system. When your devices and online accounts are protected, it will be less likely that your credit card numbers will be exposed to hackers.

  • Ransomware protection; ransomware is a type of malware that encrypts a victim’s files. The best antivirus will prevent your data from being held ransom.
  • Phishing protection; it is so easy to click on a link that disguises as your bank. A good anti malware will warn you when you are about to enter into a fake site.

On a fake website, hackers entice you into entering sensitive information such as credit card details, email addresses and passwords. Hackers use this information to steal your money. With a good antivirus, hackers will not be able to steal this data.

You will also be warned if you receive fraudulent emails that look as if they are from a friend, a company or financial institutions.

Parental control features; since many kids are spending more time online, they need an antivirus that can keep them safe from predators, addictive apps, and hackers.  A good antimalware program has parental control features that can filter out offensive content, block tracking apps and give the exact location of your kids for proper monitoring.

Use a VPN to hide your IP address

Get a good VPN. It will increase your security on private and public internet connections making it hard for cybercriminals to steal your financial information.

With a VPN, your details, like your location revealed by your IP address, are hidden, so you can securely access websites, apps, entertainment and more. It offers online privacy. Your internet provider, tracking website and internet browsers cannot be able to tell what you are doing online or able to disclose your sensitive information.

With this program, you can share any file without worrying a hacker might know its content.

Use 2-Factor Authentication to Protect your Financial Accounts

One of the best ways of protecting your family from hackers is by using 2-factor authentication to secure their online accounts.  Usernames and passwords are no longer sufficient since hackers can guess them.

With multi-factor authentication or 2-factor authentication, you will be required to verify your identity either by use of a call, text, or a code being sent to your phone number.  This provides an extra layer of security to your online accounts.

This technology can use your fingerprint, voice, and facial recognition so as to verify your identity.  Many banking institutions are using this technology since it best secures your information online.

Create strong passwords

If you want your family to stay safe online, encourage them to create strong passwords for their online accounts. Strong passwords are hard to crack.  A strong password that can beat hackers has the following characteristics;

  • Has 15 characters or even more
  • Has a mix of numbers, letters, and characters. Don’t forget to include too uppercase and lowercase letters
  • Avoid easy passwords such as 123, admin
  • Avoid using your names, phone numbers and your birth date as your password. Do not use passwords that you have used before or use for your other online accounts.

Remember, the best passwords will thwart brute force and make your accounts hard to break.

Educating Kids

The more your kids know about online safety the better they will be equipped to deal doing their part.  They will more easily understand the dangers of financial hacking when they first respect the value of money.  You can also start simply by teaching kids how to use online finances responsibly.


Read more about family finances:
5 Creative Ways to Save For Your Children’s Future

Share This Article

How to Report an Email as Phishing

Report Email Phishing

Hopefully when you received a phishing email regarding one of your online accounts you didn’t click the link and try to login. This is how hackers attempt to gain access to your account without you knowing. If you did login, immediately close your browser. Then, re-open it and go to the proper sign page through your browser and change your password.

We all get phishing attempts via email but we can do more than just educate ourselves on how to prevent being tricked. Before you delete the phishing email report it to the proper website that the phishing email is trying to access. These same companies have cyber security people that you can forward the email to.  Simultaneously you can report all phishing attempts to the Anti-Phishing Working Group at [email protected]

When concerned about possible virus infection of your computer perform a malware scan. To clarify, most phishing attempts are not created to infect and take over your computer.  Rather, the goal of phishing is to learn your account login details so they can steal your personal information.

Below are some of the more common companies that identity thieves try to mimic. These are just examples and there are many others.  If you don’t see the contact information below for the company you are looking for, simply Google it safely at the top of our website. For example, if the phishing attempt is in regards to PayPal, Google “Report PayPal Phishing”.  Often, you will find an email address posted that you can forward the phishing email to.

Report as Phishing to These Companies

In addition to forwarding phishing emails to appropriate companies and to the Anti-Phishing Working Group, you can also report the phishing link to Google but be careful. Don’t open the link in a browser, simple right click the link and select copy hyperlink. Cut and paste that link into the Google submission form and submit. Then, delete the phishing email. 

Here are a few examples of the top companies whose account holders are the top targets.  These companies want you to forward phishing emails to them so they can prevent future fishing attacks.

PayPal

PayPal is a top target of phishing because it gives thieves direct access to your money. If if you don’t currently have funds in your PayPal account, people with access can make payments out of a bank account or credit card that you have linked to. Report PayPal phishing attempts to [email protected] which can also be accessed on their PayPal suspicious activity.

If you have clicked a bad link or are worried about whether your account has been compromised change your password immediately. Learn more about how PayPal deals with account fraud.

DocuSign

Often, phishing links for DocuSign will go to Google Docs.  This may appear legitimate because it is using the Google domain but really it is someone with a Google account hosting a bad doc to gain your personal information.  Be proactive and report suspicious emails to DocuSign’s security team at [email protected]. If you feel the security of your account is at risk, contact DocuSign customer support.

Below are some tips to help spot the difference between real and spoof DocuSign emails: 

All URLs to view or sign DocuSign documents will contain “docusign.net/” and will always start with https.  All legitimate DocuSign envelopes include a unique security code at the bottom of notification emails. If you do not see this code, don’t click on any links or open any attachments within the email.

For the latest DocuSign security and system performance information, visit the DocuSign Trust Center

Report Facebook Phishing

Facebook is one of the largest website in the world with over 2.7 billion active users.  They have taken great strides to protect against phishing and promote that they take seriously all phishing reports when you forward the email to [email protected].   They have also set up security tools to prevent outsiders from signing into your account.  Like many online accounts they recommend and offer ‘two factor authentication’.  They will also email you of suspicious login attempts when you set up to receive unrecognized login notifications.

Netflix

Because Netflix is such a popular streaming service these days, it’s one of the more popular targets for phishing. Netflix states that they will never ask you to click a link to enter personal information about your account. Even if you are not sure the email you receive is a phishing attempt, report it to Netflix by forwarding the email to [email protected]. If you want to check your account to see if something is wrong with your billing, for example, go to Netflix.com directly or via a bookmark you’ve already saved to log into your account.

Here is a classic phishing email that Netflix would never send to you.

Dear user, We’re having some trouble with your current billing information. We’ll try again, but in the meantime you may want to update your payment details.

Most phishing emails feature proper links to the company at the bottom of the email, such as the Netflix support page or contact page. This is to trick you into thinking it’s legit. However, the link in the middle of the email goes to a different website.

Banks and Credit Card Companies

You may only have one bank account and one credit card. So when you receive an email from a bank that you don’t have an account with, it’s easy to ignore. You may even be thinking, why would they send this to me? Well, cyberthieves use spam internet servers to sent the phishing email to millions of people because they know at a percentage of those on the list will have an account with a particular bank.

This is why you will sometimes get an email that looks like it’s from your bank. Don’t worry, the scam artist probably doesn’t know you have an account with a certain bank. You are simply one of millions of people on a list.

Chase is one of the top banks that phishing emails try to mimic.  But really, there are too many banks and credit card companies to list, so it’s wise to be wary of any email from your bank.  Any information you need to know about your bank account will be within your account, so just go to your regular bookmark in your browser to login or to go Google and search for your bank.  You never have to worry if you always go directly to your bank to see if there are any important notifications for you.  Or just call you bank. 

To report a phishing email to your specific bank, search for your financial institution on Google by typing in your bank name followed by the keywords ‘report phishing email’.

Report as Phishing to Apple

Apple is a big one.  Your user name and password gives phishing attempts access to your iCloud account where all of your files are stored, including your contacts and pictures.  If you see any email that looks suspicious report it to Apple by forwarding the email to [email protected]Apple will never ask you to verify your identity using your password.  They also recommend to protect your Apple ID by using two-factor authentication.  This security measure is available with many online accounts where a code is sent to you via text or email to complete your login.  This means that even if hackers gain access to your user name and password and try to log in, you will get a notification, but unless they have access to your phone, they can’t gain access.

Courier Companies and Shipping Outlets

Couriers include companies like Fed Ex, UPS, DHL Express, Purolator, and USPS.  Shipping may also come from online stores who use couriers, such as Amazon and Target.  The email may say something line “We are having trouble delivering your shipment!”  If you are expecting a shipment, you will immediately be concerned.  If you are not expecting a shipment you may wonder why you are receiving a product when you didn’t order anything. This is probably a phishing email, but even if it isn’t look closely at the email.  It’s always best not click any links and simply go to your account directly through your browser.  If you don’t have an account with a specific store, such as Walmart, then you know it is more than likely a phishing email.  Report it to the company concerned then delete the email.

Amazon

Many people have an Amazon account.  You may get an email from Amazon asking for your to login to correct a problem.  This is more than likely phishing.  Do not login using the link in the mail. Go directly to your Amazon account from your browser to see if there are any issues.  Amazon also uses couriers and the same safety rules apply.  Amazon usually notifies online shoppers that a real shipment has been delivered to their door, but they will never put a link in that email and ask you to check on your shipment.  Forward all suspicious emails to Amazon at [email protected]

Additional Contacts to Report Phishing

If you have scrolled down to this bottom of this email looking for a company that is not listed above, below are are few safe links or email addresses to report a phishing attempt to that company. Reporting phishing is important so that collectively, we can work to shut down the hackers and scammers who are trying to steal personal information from millions of account holders around the world.

A Quick Review of What to Do When you Receive a Suspected Phishing email.

  • Don’t click any link to login to your account.  Go directly to your account via your browser bookmark or by searching for it on Google.  If you don’t have an account related to the email, it’s probably a phishing attempt and you have nothing to worry about.
  • Before deleting the phishing email, forward the email to the company the identity thieves are pretending to be.
  • Report the phishing link to Google but be careful how you copy the link to paste it on Google’s reporting page. Never click the link.  Instead, right click on the link to copy the hyperlink. Then delete the email.
  • When you forward a phishing email to any company, cc the email to the Anti-Phishing Working Group at [email protected]

Here are additional emails not written about above that you can report phishing emails to:

Report Email as Phishing to Gmail

This image below shows you how to report amy phishing attempt that is sent to your Gmail. To access this, you need to be signed into the web version of your gmail account. Reporting these emails will help reduce phishing and spam emails to your Gmail, but you should also report emails to the company being spoofed.

To report phishing to Gmail follow the steps below.  1) On an open email, select the drop down menu on the top right. 2) Select Report Phishing.Report Email Phishing to Gmail

About Google Account Security:  Since Google accounts only have one login to multiple website, including YouTube and the multiple apps within Google for Education, consider setting up Two Factor Authentication to protect your account.

Additional Resources

Make sure your computer is not infected with Malware because you clicked a phishing email, scan your computer and protect against future attacks.

Learn more about Phishing and the new ways hackers use to steal peoples personal information.  Read about Smishing (Text) and Vishing (Phone) Scams.

Share This Article

10 Tips for Safe and Efficient File Sharing

File Sharing Safety

File sharing is the process in which digital media is shared among devices. The art of file sharing is not a new thing as it began in 1967 when Alan Shugart invented the floppy disk. This technology has evolved over the years from people being able to share a single file to multiple ones by one click of a button.

Currently, there are no limits on the number of files that you can share. The process involved is both simple and straightforward.

Making Use of Safe Technological Tools

In recent years, there have been advancements in technology that now allows you to zip files and share them. There are companies that pioneer in the provision of tools for compressing, zipping, and achieving files. The beauty of using such tools is that they will reduce the size of the document without tampering with the format and appearance. They also have an option to input security measures so that files can only be accessed by authorized people alone.

But, what are the benefits of file sharing? When done safely, it:

  • It is affordable which allows teams to have access to relevant information at a low cost.
  • The process is efficient as the technology available allows you to share files promptly.
  • Based on the service that you are using, files shared can be accessed from any location.
  • It fosters collaboration especially if you are using cloud computing that allows users to edit the information online.

Currently, there are numerous ways in which you could share files safely.  It’s simply one more way to protect you, your computer and your family online.

Below are 10 tips on how to share files safely and efficiently:

1. Avoid emails

Emails may be convenient but they are not the best when sharing documents with confidential information. These platforms are prone to hacking which could result in confidential files landing in the hands of authorized personnel.

2. Update your security software

Often people forget to update their software which leaves them vulnerable. Hackers know this and tend to take advantage of systems that are not updated.

3. Encrypt with passwords

Technology has made it possible for people to incorporate passwords on files that they do want people with prying eyes to see. To ensure that a document is not easily accessible, you need to encrypt it with a complicated password that has upper and lower cases as well as symbols and numbers. When you leverage encryption, you will significantly reduce the penetrating power of various cyberattacks.

4. Change passwords often

It is recommended that you change your passwords often preferably every month. Because it can be difficult to remember to make these changes, you need to note down the dates when passwords need to be changed.

5. Use secure connection

Remote workers are among the people who are fond of sharing information among themselves. Suppose you work away from the office, you need to ensure that your connection is secure before sharing any files. Be extra careful if you are using a public WiFi.

6. Refrain from suspicious downloads

The rule is that whenever you are sharing files using digital platforms is that you never download files that you do not trust. Hackers can incorporate viruses, spyware, and adware on files to gain access to your system. Thus, you should never open downloads that you do not trust.

7. Double-check inbox emails

Working from home will have you receiving a ton of emails from various stakeholders, customers, and colleagues. It is always safe to check the sender of the email several times before opening any attachments that come with it. Sometimes a sender may appear legitimate, your job is to look keenly so that you protect your files and digital devices.

8. Utilize safe file-sharing programs

There exist programs that you can use to share files with colleagues. Among them are Enigmail., pCloud, Resilio., SpiderOak., and Signal. These programs should have features such as web editing, remote file access, and file locking as well as mobile access.

9. Refrain from clicking links

Do not make it a habit of clicking links that come with files that you receive. If you are in doubt, you should hover around the link a couple of times before clicking it. When your gut tells you that you should click a link, you need to listen to it.

10. Avoid USB drives

Flash disks and external hard drives are not the best tools to share files with them. Given their size, they are bound to get lost and are easy to steal as well. Suppose, they fall in the wrong hands, you lose valuable data.

Conclusion

File sharing is one of the most important technologies we have. It enables teams to work together onsite and remotely. However, this process is prone to the risk of hacking hence the need to share files securely.

Share This Article
Google Safe Search Explore the Safe Search Engine - Google for Kids