Wednesday, July 3, 2019

You Should Consider This Before Sharing Your Vacation Photos

Best way to share photos online privately

Summer is filled with memories for both young and old. These should not only be perpetuated on the mobile, many also choose to share freshly with the summer holidays on social media.

It can be fun, but there are also some things to consider before sharing pictures of children and young people on the internet. 

It is both about what is actually allowed - and about a good portion of common sense!

We have talked to social media expert Astrid Valen-Utvik in the communication agency Valen-Utvik about what she thinks you should keep in mind before posting the summer memories:

1. Think about who you want to share with

We as parents should think well that the picture we share with only a few hundred followers on, for example, Instagram, can quickly be shared and thus disappear outside our control.

Valen-Utvik recommends that you reflect on where the pictures are shared and which pictures you want to share.

- If you want even more control over your content, you can have a closed profile on Instagram or Facebook. On Facebook, you can also set your account settings so that photos are shared only with friends, or selected friends. Some make a messenger group or a separate Facebook group when they have children. It makes it possible to share photos and videos of the newborns with only the closest family and friends.

- The ability to have relatively good control is present, but we as parents must know about this - and be conscious enough to use the opportunities we have available.

2. Ask for permission

Although the children are not of age, they are entitled to their own privacy. If the children are old enough, you should ask permission to share pictures of them in their own channels. 

- I have three children myself, at 11, 13 and 15, and yes, I share pictures of them in social media. Now that they are so big, I always ask before I share pictures of them and respect their decision.

Valen-Utvik started a blog when the elders were born and shared pictures of everyday life along the way. This was around 2004, and her reach was not that great. As the consequences increased, she reduced the profiling of the children.

- I hardly mention them by name, and show more pictures of situations and moods. There are not necessarily pictures where they look straight into the camera. I continue to share some small glimpses here and there, but I don't want the amount of I parts of the kids to become their digital profile and digital footprint, she says.

- I want the children themselves to be able to decide and influence it.

3. Everything doesn't have to be shared

"It can't be that dangerous, then?" Still, images are used in completely different ways than intended.

- That's why I wouldn't share pictures of my kids in very light clothing, no matter how small and cute they have been. An image of children crying or angry, children who are naked, children who are vulnerable in some way - at least I will not share myself.

But it is not only in the darkest hooks of the internet that images can be abused, but also in commercial settings.

- We have seen examples of images uploaded by unsuspecting parents being used in advertising on Facebook. It may be for services or products the parents have never even heard of. We also have examples of images stolen from social media, and then used as advertising posters outdoors in foreign countries, says Valen-Utvik.

- Photos can certainly be misused in many other ways too, but the most important thing is this: Even if you have uploaded images to social media, it is still your intellectual work and only you decide how to use them. If you find that someone has used your image without approval, I recommend that you grab it.

Checklist before sharing photos:

The Data Inspectorate has prepared a checklist of things to consider before sharing photos of children online:

  1. Legality : Never share pictures of other people's children without the consent of their superiors.
  2. Image Type : Think about the content and use filter or inferior resolution whenever possible, making the pictures less interesting to others.
  3. Quantity : Share the fewest possible pictures.
  4. Channel usage : Be aware of how to share the pictures. Everything must not be open. Use privacy settings and create closed groups.
  5. Delete regularly : Take a spring cleaning and periodically previous photos you have published.
  6. Always ask the children : Use questions like "Do you think it's okay to share this picture with my family or friends?" Then you make it understandable to them. Respect the answer.

Friday, June 28, 2019

This Simple Grip Can Stop The Hackers | Secure Bitcoin Wallet

Two-step verification protects your accounts online, and is much easier than you think.

Are you afraid of being hacked online? Then the mobile you always carry with you can be the key to your security - literally.

How to prevent being hacked on your computer iphone and Android mobiles ?

The key word here is  two-step verification , a very simple approach that can greatly reduce the risk of others accessing the services you use the most online.

how to protect against criminal or unethical hackers

Huge damage

Whether it is e-mail, online banking, social media or other digital services, there are virtually no limits to how big the damage can be if wrong people get access to one (or more!) Of those accounts.

Just imagine if anyone should access your email. If they have control over this, they can effectively reset the passwords on any other service you use so they can effectively block you from your entire digital life.

Which includes everything from contacts, calendars, pictures stored in the cloud, Facebook networks, backups and so on

No longer just password

This can happen, for example, by using the same, weak passwords on many different websites, or that services are attacked so that users' private data ends up in the wrong hands.

And that's exactly where the two-step verification comes in: As the name suggests, this technique ensures that you need to take an extra step to verify your identity, beyond password entry (which  should be unique and strong anyway ).

Although someone else would get your password, they will not be able to log in without the other link, which in almost all cases involves your mobile.

Easy via mobile

Virtually the vast majority of major players you use online today, support two-step verification via the mobile phone. This can be done by sending you an SMS with a unique code, or that you download this code via a separate app - not unlike the process you probably already know from BankID.

Precisely because most of today's mobile phones are so well secured with personal codes, chances are that you are the one who confirms your identity via the mobile phone - and not someone unauthorized.

Several methods

This is also a process that over the years has become much easier, while an increasing number of online actors support and facilitate the extra security chain. Mostly, you also only need to double-check every 30 days so that it does not become a too cumbersome process on a daily basis.

Apple has its own system for this double verification. After activating the feature on your Apple ID (see fact box), each time you try to log in to a new device, you will need to enter a code served on the screen for an iPhone or iPad, for example.

Most of all, Google may have come. They have recently introduced a method where you can easily verify your identity at the touch of a button.

When you try to sign in to a Google service, just press the "yes" button that pops up on your mobile screen through the Google app.

This one is pre-installed on Android phones and can  be downloaded to the iPhone .

how to protect against unethical hackers

Own code app

At the same time, Google has a free app, Google Authenticator, that supports an open standard for security codes. 

With this app, you can serve unique and time-limited one-time codes from both Google and all other standard-supporting actors - including Facebook, Outlook, Skype, Dropbox, LastPass and many more.

Download Google Authenticator for Android or iPhone . There are also other options, such as Authy , which also allow you to back up all your cloud settings - which Google Authenticator does not do.

To enable two-step verification on your mobile:
Two-step verification is about adding an extra layer of protection to your online accounts beyond the classic password.

As a rule, this happens by having to enter a code that you get on your mobile screen. The process is also called 2-step verification, two-factor authentication and a variety of other variants.

To enable two-step verification on an iPhone with iOS 10.3 or later:

  • Go to  Settings> [your name]> Password and security
  • Select  Turn on two factor authentication
  • Press  Continue
  • You will then be asked to enter the mobile number you want to receive verification codes (possibly an automated call)
  • Press  Next and you will receive a code
  • Enter this code to verify your mobile number, and then turn on the  Factor Authentication
  • Read more at Apple

To enable two-step verification on Android:

  • Go to  Settings> Google
  • Touch  Login and Security (under "Security", if applicable, in the Google Account selection)
  • Select  2-step verification and follow the on-screen instructions. You may need to sign in to your Google Account again
  • Read more at Google
This is how to protect yourself from hackers 2019

Popular Posts