Tag Archives: featured1

How to protect your children from cyber-bullying

PandaSecurity-ciberbullying-parental-control

As a new school year begins, many schools sadly will be setting out to tackle one of the most serious problems now spreading across classrooms: cyber-bullying. While new technologies have opened a whole new world of possibilities for children and adults alike, they have also opened the door to a new type of bullying, where bullies use phones and computers to send photos and threats to their victims.

Recent studies show that in fact, most bullying is now perpetrated online – according to  Professor Jose Antonio Casa of the University of Cordoba, eight out of ten cases of school bullying are committed in this way. As such it is natural for parents to want to ensure that their children don’t suffer from this scourge, and fortunately, there are ways to fight back.

Firstly, there are some obvious key steps. Understanding what constitutes cyber-bullying by attending talks provided by schools is an initial step that parents can take in order to identify the threat and fight back.

It is also important to keep an eye out for possible changes in behavior that could indicate that something is amiss and of course, to let your children know that you are there to give them the support they need, especially if something happens to them.

In addition to these first steps (and others such as getting to know the language that young people use today), there are also technological solutions to help combat cyber-bullying.

Use Parental Control tools

In general, it is practically essential to use parental control tools to protect your children. The reason is to be aware of what kids are writing on the devices they use and to monitor their activity on computers, tablets and smartphones. Whilst you can achieve this by literally looking over their shoulder, it is far easier to take a technological approach.

Panda Protection Service includes a range of tools to protect kids from cyber-bullying as well as the other threats they face on the Internet. In addition to blocking inappropriate content, the service lets users ensure that photos and other files remain private. Moreover, it doesn’t just monitor Web browsers on numerous devices (computers, tablets, smartphones…), it can also control the apps downloaded onto all mobile devices.

 

The post How to protect your children from cyber-bullying appeared first on Panda Security Mediacenter.

Post-vacation Security Tips for your Business

password panda securityExcept for the few of us who choose to visit faraway places at other times of the year, for the majority of us, our vacation time is coming to end. Whether we are refreshed or nostalgic for our summertime getaway, let’s make sure to take into account our IT security while we get back on track.

Memory, Oh Memory

Recent research has proven that the last weeks of summer are an especially sensitive time of the year for some vacation side effects. Many of us are so relaxed we can’t even remember our passwords!

In that case, it’s easy to restore passwords, but we also have to be very careful while doing so. 77% of people who forget their passwords deliberately choose easier ones to replace their former passwords. Of course they do this to avoid another memory lapse, but they must also remember that this makes their password much less effective and lowers their security—in addition to the IT security at their workplace.

Check Out Your Well-Traveled Devices

When a laptop or mobile device leaves their usual space, they can be exposed to a higher number of threats because cybercriminals can connect to these devices (with or without your knowledge) while you’re accessing Wi-Fi networks at hotels, cafeterias and other public spots.

If you have been careful while using these access points it doesn’t mean something will happen. However, during the times of BYOD (Bring Your Own Device), all you have to do is review the devices that access the company network (laptops, mobile phones, tablets etc.) at the end of the summer. We hope you don’t have an unpleasant surprise waiting for you.

Recycling and Good Practices

The best time to revise routines or implement better practices is right after vacation time. This is also an ideal time to conduct an employee training, if your business permits it, in order to update workers on the latest threats. With proper training, your workers will be less likely of biting the “phishing” hook that comes after them.

September Novelties

While the weather is cooling down in the month of September, the technology sector is also getting ready for the hottest presentations of the year. Tech giants like Apple and Google always announce their newest updates and innovations. Companies await security developments regarding the new terminals and operating systems and as soon as the new versions are released, they are reviewed and updated. If your devices are obsolete and no longer support the upgrades, this is a great time to renew them.

Keep these tips in mind without forgetting to take precautions that we must bear in mind throughout the year, as is to have a good  cybersecurity solution that allows us to enjoy a  safe surfing on our corporate network.

The post Post-vacation Security Tips for your Business appeared first on Panda Security Mediacenter.

What you should know about Windows 10

windows 10 panda securityIt is reaching the end of its first year and now companies are asking, is it the right moment to update to Windows 10?Now that it’s becoming somewhat mature, should businesses take the plunge and invest time and money to upgrade their software? The general opinion is that yes, companies should upgrade. After all, it takes far less time and resources to plan the transition than to deal with it after problems emerge due to outdated software.

January 2020 may be far away, but that is when Windows 7 will be discontinued, and businesses need a lot of time—months or even years—to complete this type of transition. There are also some companies that have chosen to continue using Windows 8, an operating system which has brought more sorrow than glory to the corporate sector.

In addition to the added benefits offered in Windows 10, the tech company has also tried to fix the Windows 8 problems and has also introduced new elements that are designed to attract more businesses which is a huge market that Microsoft can’t afford to lose to its competitors: Apple Mac and Google Chromebook.

The main focus for Windows 10 is to reinforce security. Some of the improvements include biometric identification support (Hello), improvements for mobile device management (MDM) and a centralized verification center through Azure Active Directory (this prevents unnecessary password duplication).

Panda Security’s antivirus solutions work perfectly with Windows 10

But perhaps the most talked about and significant aspect for businesses is the new update cycle. With the 10th version of their operating system, Microsoft has gotten rid of something that is typical in other companies: constant updates. Until now, security patches were published once a month (the famous “Patch Tuesday”) and most of the improvements were concentrated in large blocks called “Service packs”.

The wait until 2020 is long and not in-rhythm with the current digital economy, but with this new system, Windows 10 will be able to install updates immediately (as long as the people in charge decide so).

The post What you should know about Windows 10 appeared first on Panda Security Mediacenter.