Tom’s Tek Tips, Child Cybersecurity Edition: Sharing of Personal Information and Photos

In the final part of the special Cyber Security Child Safety mini-series, Tom and Samantha delve into the crucial topic of safely sharing personal information and photos online. With advanced artificial intelligence that can replicate voices and videos, recognizing malicious actors has become challenging. This episode emphasizes the necessity of sharing information only when one is absolutely certain of the recipient’s identity, with a focus on children’s online safety. Learn about the dangers of revealing personal information through seemingly harmless photos or through gaming chats, and the importance of verifying the identity of anyone asking for such information. Secure online communication is a skill everyone, especially children, needs to master.

Recent Episodes

In Ellendale, the sound of laughter, cheers, and the thwack of pickleball paddles marked more than just a summer afternoon—it marked a testament to what a united community can accomplish. The unveiling of the new pickleball courts, a project made possible through collaboration between the town, local sponsors, and Applied Digital, wasn’t just about…

As AI adoption accelerates at an unprecedented pace—ChatGPT alone sees 2.5 billion daily prompts just two and a half years after launch—digital infrastructure is racing to keep up. At the center of this transformation are purpose-built data centers, evolving from air-cooled Bitcoin facilities to liquid-cooled “AI factories” designed to power the next generation of…

AI infrastructure is evolving at breakneck speed, and the real challenge is no longer just designing next-generation data centers—it’s executing them at scale. As demand for AI-ready facilities grows, operators must adapt to immense increases in power density, new cooling technologies, and unconventional deployment locations. Power density requirements for AI workloads are pushing the…