Tom’s Tek Tips, Child Cybersecurity Edition: Sharing of Personal Information and Photos

In the final part of the special Cyber Security Child Safety mini-series, Tom and Samantha delve into the crucial topic of safely sharing personal information and photos online. With advanced artificial intelligence that can replicate voices and videos, recognizing malicious actors has become challenging. This episode emphasizes the necessity of sharing information only when one is absolutely certain of the recipient’s identity, with a focus on children’s online safety. Learn about the dangers of revealing personal information through seemingly harmless photos or through gaming chats, and the importance of verifying the identity of anyone asking for such information. Secure online communication is a skill everyone, especially children, needs to master.

Recent Episodes

Generative AI has moved past being a shiny demo and into the messy reality of enterprise operations—where data lives in different systems, customers expect instant answers, and security teams (rightfully) say “prove it.” In energy services specifically, even small efficiency gains matter: many retail energy providers operate on thin margins, and operational blind spots—billing…

Energy billing is one of those things most people only think about when something goes wrong—an unusually high charge, a missing bill, a surprise shutoff notice, or a rate plan that suddenly doesn’t make sense. With smart meters, more complex pricing options, and different rules in regulated vs. deregulated markets, even a small breakdown…

CG Infinity’s Salesforce Practice is built on deep, day-to-day engagement with the organizations it serves. Rather than operating as an external vendor, the team embeds itself with clients—working closely, consistently, and collaboratively—so decisions are informed by real context, trust, and shared accountability. This approach ensures Salesforce solutions are shaped not just by requirements, but…