SafeTeensOnline ambassador Natasha Ray advocated SafeTeensOnline mission and vision at Smith College. She explained the importance of online safety and privacy and why every student should participate in the effort to raise awareness.
Mobile Phones and Sleep Deprivation among Teenagers
Most of us are sleep deprived. Yes I understand all the classes, extracurricular activities and Social activities take most of the time for teenagers. But when we take a closer look at this concern, inevitably we conclude that biggest influencer at play is the smart phone. Given the ubiquitous nature and wide range of services it can perform such as – Web access, gaming, music, social interactions and more – that’s understandable. According to PEW research study on average teenagers spend 1/3 of their life using screens and that’s roughly 8 hours a day. According to Sandiago state university study on sleep deprived American teenagers concluded that smartphone is the major cause for their condition. National Sleep Foundation recommends teenagers get between 8 and 10 hours of sleep nightly. Meanwhile, those who spent 5 hours daily on their devices had a 50 percent greater chance of not getting the adequate sleep.
In this video SafeTeensOnline Ambassador Sara talks about How to use features on the mobile phones so that Teenagers are more focused during driving, home work and particularly sleeping.
Mobile Phishing and Social Engineering
Even we lock down our devices, establish network security and encrypt our e-mails we are still vulnerable to Phishing and Social engineering attacks. Recently there is news about Phishing and Social Engineering vulnerabilities with latest Justice departments Indictments related to DNC hacks.
In our “Think before your click” How to video our ambassador Sahas Gelli talks about Social engineering. In the context of information security, Social engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.