SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
THE BACK TO SCHOOL
SMARTPHONE GUIDE
By Lookout, Inc.
IT’S THE START OF A
NEW SCHOOL YEAR
While you probably
have backpacks and
lunches covered,
sending your kid to
school with a smartphone
is a trickier matter.
HOW DO YOU
KNOW WHEN
THEY’RE READY?
ASK YOURSELF
THESE QUESTIONS:
1
Does your child need the phone
to stay connected with you or for
emergency situations?
2
Does your child understand and
respect the time and usage limits
you have placed on other things
like television and video games?
3
Does your child understand what
types of apps are okay to download
and how to surf the Internet safely?
4
Does your child know how to use
the phone safely and appropriately?
!
Do they know whom and whom not to
communicate with? What they should and
shouldn’t share online? What sorts of words
and pictures NOT to send?
According to a previous Lookout study, parents are split on the issue:
22% of parents think
age 10 is the most
appropriate age
14% think 13 is the most
appropriate age
14% think 16 is the most
appropriate age
 Tweet @Lookout
#PhoneAt10 #PhoneAt13 #PhoneAt16
What age do you think is appropriate?
If you decide a smartphone is
right for your family, keep your
children safe with these tips:
****
This is your first line of defense against
unwanted prying eyes. The last thing you want
is a thief getting a hold of your kid’s personal
photos, texts, and emails.
SET A PASSCODE

With all the new apps kids hear about from their
peers, it’s important to check privacy settings and
have a malware scanning app before your child
downloads anything to your phone.
DOWNLOAD CONFIDENTLY

Once you connect to an unprotected network,
anyone using that network can see your data. When
using public WiFi, advise your child to avoid making
online purchases or providing personal info.
BE SMART IN PUBLIC

1 in10 smartphone owners fall victim to phone theft
and 2 in 5 of these people have their phone stolen
out of a personal belonging like backpacks or
messenger bags. Remind your child to keep their
school bag with them at all times and close zippers
when going to and from classrooms.
WATCH FOR PICKPOCKETS
Lookout’s Theft Alerts feature will automatically
alert you when your child’s phone may have been
stolen and email you a photo of the thief, allowing
you to alert teachers and administrators right away
as to who might have taken the device.
TO CATCH A THIEF,
TAKE A THEFTIE
For more mobile security tips, follow

Mais conteúdo relacionado

Mais procurados

Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017Scott Burnett
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Scott Burnett
 
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee_UK
 
How to find stolen laptop
How to find stolen laptopHow to find stolen laptop
How to find stolen laptopsellalaptop.com
 
how to catch a cheater app for android
how to catch a cheater app for androidhow to catch a cheater app for android
how to catch a cheater app for androidSally_Savard
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersNetLockSmith
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2FatimaAmin26
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentationscriptalias
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet Lingua Net
 
5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone AddictionHowtonia
 

Mais procurados (19)

Computer safety
Computer safetyComputer safety
Computer safety
 
Final project CTS 125-800
Final project CTS 125-800Final project CTS 125-800
Final project CTS 125-800
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
 
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
 
How to find stolen laptop
How to find stolen laptopHow to find stolen laptop
How to find stolen laptop
 
how to catch a cheater app for android
how to catch a cheater app for androidhow to catch a cheater app for android
how to catch a cheater app for android
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentation
 
Freedom of Speech
Freedom of Speech Freedom of Speech
Freedom of Speech
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet
 
5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction
 

Destaque

3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol PresentationAkhil Agrawal
 
9 password security
9   password security9   password security
9 password securitydrewz lin
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and YouChris Stone
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorAllan Denot
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Mobile Learning Ideas and Options
Mobile Learning Ideas and OptionsMobile Learning Ideas and Options
Mobile Learning Ideas and OptionsJongpil Cheon
 
Smartphone industry analysis
Smartphone industry analysisSmartphone industry analysis
Smartphone industry analysisRishi Banshiwal
 

Destaque (18)

3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol Presentation
 
9 password security
9   password security9   password security
9 password security
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
 
Windows operating systems
Windows operating systemsWindows operating systems
Windows operating systems
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and You
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google Authenticator
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Mobile Learning Ideas and Options
Mobile Learning Ideas and OptionsMobile Learning Ideas and Options
Mobile Learning Ideas and Options
 
Smartphone industry analysis
Smartphone industry analysisSmartphone industry analysis
Smartphone industry analysis
 
GSM fundamentals (Huawei)
GSM fundamentals (Huawei)GSM fundamentals (Huawei)
GSM fundamentals (Huawei)
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Semelhante a The Back to School Smartphone Guide

Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Fall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentationFall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentationRuth Doering
 
Educ 320 standard 1
Educ 320 standard 1Educ 320 standard 1
Educ 320 standard 1jscott615
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
 
Mobile Phone Safety Guide for Parents
Mobile Phone Safety Guide for ParentsMobile Phone Safety Guide for Parents
Mobile Phone Safety Guide for Parentsmobilephonesafety
 
Mobile Phones Safety Guide for Parents [eBook]
Mobile Phones Safety Guide for Parents [eBook]Mobile Phones Safety Guide for Parents [eBook]
Mobile Phones Safety Guide for Parents [eBook]Family Orbit
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from VodaphoneKatherine Lyddon
 
Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Selva Orejón
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.Your eKavach
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their educationngarcia0620
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their educationatapia1044
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their educationatapia1044
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital ParentYour eKavach
 

Semelhante a The Back to School Smartphone Guide (20)

Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Fall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentationFall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentation
 
Educ 320 standard 1
Educ 320 standard 1Educ 320 standard 1
Educ 320 standard 1
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
 
Mobile Phone Safety Guide for Parents
Mobile Phone Safety Guide for ParentsMobile Phone Safety Guide for Parents
Mobile Phone Safety Guide for Parents
 
Mobile Phones Safety Guide for Parents [eBook]
Mobile Phones Safety Guide for Parents [eBook]Mobile Phones Safety Guide for Parents [eBook]
Mobile Phones Safety Guide for Parents [eBook]
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Smartphone Safety - tips for parents
Smartphone Safety - tips for parentsSmartphone Safety - tips for parents
Smartphone Safety - tips for parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
 
Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol:
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their education
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their education
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their education
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
 

Mais de Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise ProductsLookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for GoodLookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 
Dragon Lady
Dragon LadyDragon Lady
Dragon LadyLookout
 
History of Lookout
History of LookoutHistory of Lookout
History of LookoutLookout
 

Mais de Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

The Back to School Smartphone Guide

  • 1. THE BACK TO SCHOOL SMARTPHONE GUIDE By Lookout, Inc.
  • 2. IT’S THE START OF A NEW SCHOOL YEAR
  • 3. While you probably have backpacks and lunches covered, sending your kid to school with a smartphone is a trickier matter.
  • 4. HOW DO YOU KNOW WHEN THEY’RE READY?
  • 6. 1 Does your child need the phone to stay connected with you or for emergency situations?
  • 7. 2 Does your child understand and respect the time and usage limits you have placed on other things like television and video games?
  • 8. 3 Does your child understand what types of apps are okay to download and how to surf the Internet safely?
  • 9. 4 Does your child know how to use the phone safely and appropriately? ! Do they know whom and whom not to communicate with? What they should and shouldn’t share online? What sorts of words and pictures NOT to send?
  • 10. According to a previous Lookout study, parents are split on the issue: 22% of parents think age 10 is the most appropriate age 14% think 13 is the most appropriate age 14% think 16 is the most appropriate age  Tweet @Lookout #PhoneAt10 #PhoneAt13 #PhoneAt16 What age do you think is appropriate?
  • 11. If you decide a smartphone is right for your family, keep your children safe with these tips:
  • 12. **** This is your first line of defense against unwanted prying eyes. The last thing you want is a thief getting a hold of your kid’s personal photos, texts, and emails. SET A PASSCODE
  • 13.  With all the new apps kids hear about from their peers, it’s important to check privacy settings and have a malware scanning app before your child downloads anything to your phone. DOWNLOAD CONFIDENTLY
  • 14.  Once you connect to an unprotected network, anyone using that network can see your data. When using public WiFi, advise your child to avoid making online purchases or providing personal info. BE SMART IN PUBLIC
  • 15.  1 in10 smartphone owners fall victim to phone theft and 2 in 5 of these people have their phone stolen out of a personal belonging like backpacks or messenger bags. Remind your child to keep their school bag with them at all times and close zippers when going to and from classrooms. WATCH FOR PICKPOCKETS
  • 16. Lookout’s Theft Alerts feature will automatically alert you when your child’s phone may have been stolen and email you a photo of the thief, allowing you to alert teachers and administrators right away as to who might have taken the device. TO CATCH A THIEF, TAKE A THEFTIE
  • 17. For more mobile security tips, follow