identity theft

share

 

Cyberbullying refers to the act of threatening, intimidating, harassing or causing embarrassment to someone on the internet. In Brunei, it’s common for people to express anger or frustration through social media such as Facebook, Twitter or Instagram. If these online posts are directed at a specific person, it could lead to cyberbullying. Most cyberbullies are motivated by anger, revenge or frustration. Some do it for their own entertainment or to get a reaction. 

 

Talk to your child about cyberbullying 

share

 

Online games are easily available for download or to play through game consoles, computers and mobile devices. While games can be entertaining, you should be aware of the potential dangers to children. 

 

Risks of online gaming 

  • Cyberbullying & online grooming 

Multiplayer online games often include a chat feature which enables players to interact through text or voice chat while playing the game. This feature can be abused and lead to cyberbullying, grooming or sexual harassment. 

share

 

There’s nothing wrong with sharing photos of your children online with friends and family. However, if parents don’t manage privacy settings, the photos and videos can be viewed by anybody, including online predators, identity thieves and the rest of the world. 

 

Things to consider before sharing photos or info about children 

share

 

Your personal information is valuable and should be kept private. By maintaining your privacy, you are reducing the risk of having your identity stolen by a fraudster. 

 

share

 

If you have an old computer you want to get rid of, it’s important to remove all your personal data first. When you think about it, it’s not just computers that contain personal information – devices such as smartphones, tablets, pen drives, and even game consoles contain personal data. Many people replace their mobile devices as often as every year, without securely removing data first. 

 

share

 

In a computer security context, shoulder surfing is a commonly used technique of stealing information simply by using observation, such as looking over someone’s shoulder. Most people are careless and ignorant of their surroundings while in public places such as Wi-Fi hotspots, airplanes and airport lounges. By observing what you are browsing, such as business plans, client details or any sensitive data, that information can easily be stolen or used against you. 

 

What kind of information can be stolen by shoulder surfing? 

Pages