Tom’s Tek Tips, Child Cybersecurity Edition: Sharing of Personal Information and Photos

January 1, 2023

In the final part of the special Cyber Security Child Safety mini-series, Tom and Samantha delve into the crucial topic of safely sharing personal information and photos online. With advanced artificial intelligence that can replicate voices and videos, recognizing malicious actors has become challenging. This episode emphasizes the necessity of sharing information only when one is absolutely certain of the recipient’s identity, with a focus on children’s online safety. Learn about the dangers of revealing personal information through seemingly harmless photos or through gaming chats, and the importance of verifying the identity of anyone asking for such information. Secure online communication is a skill everyone, especially children, needs to master.

Recent Episodes

View episode

Hy-Tek Intralogistics, a leader in supply chain and distribution technology, showcased its state-of-the-art technology at Modex 2024, which took place between March 11 and 14 in Atlanta, Georgia. The trade show served as an ideal platform for Hy-Tek to showcase its advanced IntraOne platform, a robust set of technologies aimed at optimizing supply chain…

Ellendale AI Data Center
View episode

Applied Digital is making remarkable strides in the field of artificial intelligence, as demonstrated by the latest progress update on its Ellendale AI Data Center in North Dakota. This state-of-the-art facility embodies the perfect blend of advanced technology and strategic design, establishing a new benchmark in data infrastructure specifically designed for AI. The Ellendale…

Lauren Castellano of Securitas Security Services, talks tech innovation
View episode

Tech innovation is evolving at a pace today, which is nothing short of revolutionary. This spans from AI to machine learning, and the advancements are transforming a number of industries around the  world. But particularly, security services are experiencing a significant shift. The integration of cutting-edge technology is redefining how security is managed, making…