Winning the Cyber Security Game
In this lesson students discuss their online experiences and learn how to minimize the potential risks that may be associated with them.
In this lesson students discuss their online experiences and learn how to minimize the potential risks that may be associated with them.
My three kids all know the password to my phone.
It’s because I rely on them to play secretary for me when I’m driving. If the phone rings or there is a bing of a text, 99% of the time it’s a member of my immediate family trying to get in touch with something relatively pressing.
Recently, my nephew, age 12, received a letter in the mail. It was addressed to him personally, by name. Inside was a photocopied article about the powers of a new virility medicine, complete with the usual graphic promises for pleasuring the ladies. The article mentioned a specific “doctor” by name, but other than that, there was no contact information or order form or any other action request. It appeared to just be spam but in paper form.