The Five Greatest Internet
Dangers Teenagers Face

  •  
    Complete form for a free eBook
     
  • First Name
    Last Name
    Email
  •  
    Your email will not be shared
     

Archive for 'Internet Dangers' Category

Prevent Sexting

Apr 2nd, 2012 by David Kent Jones | 0

Sexting is the act of sending sexually explicit messages or photographs by mobile phone or over the Internet. Teenagers wanting to be accepted by their boyfriend or girlfriend may send him or her a suggestive or even pornographic image. The problem is this image usually gets shared with others and once it has spread online, it can [...]

Read full post...

Who Would You Let into Your Child’s Room?

Jan 31st, 2010 by David Kent Jones | 0

Would you let just anyone that showed up at your front door into your son’s room?  Dangerous criminals?  Prostitutes?  This French Internet safety video shows that by allowing your children free access to the Internet, you are doing just this. Imagine if a pedophile showed up at your front door and told your young daughter [...]

Read full post...

Cyberbullying Hurts

Aug 2nd, 2009 by David Kent Jones | 0

The following commercial by the Ad Council shows how much cyberbullying can hurt. It’s amazing what teenagers will type online that they would never say in person.

Read full post...

Be the Cyber Czar of Your Homeland Security

May 29th, 2009 by David Kent Jones | 0

President Obama’s announcement today of planning to appoint a new head of White House cyber security, should make us think about how secure the networks are in our homes.  Obama said, “Cyberspace is real, and so is the risk that comes with it.” Here are a few quick tips to protect your homes from cyber [...]

Read full post...

A Cell Phone with Internet Is Like a Loaded Gun

Feb 23rd, 2009 by David Kent Jones | 0

Giving a teenager a cell phone with Internet is very dangerous.  It is like a loaded gun.  They can access the Internet any time from any where without any supervision to view pornography, order drugs, order weapons, view scenes of explicit real-life violence and be targeted by predators.  As a parent you will be out [...]

Read full post...

The Dangers of Public Wi-Fi

Feb 14th, 2009 by David Kent Jones | 0

What dangers are there in borrowing a wireless Internet connection? Network cables are becoming a thing of the past.  Nearly every laptop that is sold now has wi-fi capabilities built in.  Almost everywhere you go, you can see wireless connections available from your laptop’s wireless utility.  Maybe you even borrow your neighbor’s wi-fi signal.  All [...]

Read full post...

The Five Second Rule

Jan 30th, 2009 by David Kent Jones | 0

After moving from California to Utah a couple of years ago, I noticed two differences in how Utahans drive in general compared to Californians.  First of all, more people in Utah wave with just one finger.  I suppose Californians would do the same if they weren’t afraid of being shot. Second, there is an unofficial [...]

Read full post...

File Sharing Lawsuits, Truth or Urban Legend?

Dec 27th, 2008 by David Kent Jones | 0

The lawsuits are real enough.  Just ask the Tenenbaums, a family in Rhode Island that have been fighting a million dollar lawsuit with Capitol Records for years.  Six other companies have also sued them, all for seven songs that their teenage son allegedly downloaded.  The Tenenbaums were recently interviewed in the Rhode Island News.  According [...]

Read full post...

Recession Vigilance

Dec 21st, 2008 by David Kent Jones | 0

Everyone seems concerned about the economy.  The focus is on stock market losses, bailouts and housing slumps.  It is easy during these financially stressful times to become distracted and let our guard down when it comes to protecting our children online. When parents fight over money, struggle with unemployment and agonize over lost investments, children [...]

Read full post...

AutoComplete Can Be Auto Fraud

Dec 16th, 2008 by David Kent Jones | 0

The AutoComplete option in Windows Explorer can lead to automatic fraud.  AutoComplete remembers login names, passwords and even credit card numbers.   This leaves your computer vulnerable to a number of problems: 1- Other computer users besides you can access your bank accounts or email. 2- Other computer users besides you can use your credit card [...]

Read full post...