Why Parents need to defend their homes against the deep waters of the Internet 0 309

  • According to a survey published by Youth Dynamix, a specialist Youth and Family Research Agency, over 18% of Kenyan Youth own a smartphone.
  • 79% of the Youth Wallet Share is specially allocated to airtime. Essentially, what this statistic points out is that if a parent gives their children a sum of KES 4,000 each month then KES 3,160 could go exclusively to internet usage and voice calls.
  • A staggering 35% of all Internet downloads are related to pornography.

Floaters

Nearly every parent in Kenya remembers the first time they took any of their children out for swimming. No one has done any particular research on this subject matter but any attentive person will soon realize that it is a cold, hard fact.

I embarked to ask parents why this memory was so vivid and their response was equally as fascinating. Majority of the parents to whom I posed this question to uniformly attribute the clarity of those beautiful first strokes of their children to the immense risk that swimming posed on their little ones and what their eventual success meant for their future.

“When I put the floaters on him and placed him in the water, I thought that he may sink but he got in and just started kicking away! I knew he would be a great swimmer! I’ve never been prouder!”

Most parents were not so lucky, their children required constant practice and training in order to successfully land those first strokes. Crucially and, most notably, during that first swim, over 97% of these parents all had their children wear floaters.

Proper use of the Internet could create innovative, socially adept leaders out of children. However, there exist numerous risks with the use of the Internet among the youth.

Much like teaching your child swimming, each parent must understand that there is a duty of care which they have to adhere to once they purchase any internet-enabled device, such as a mobile phone and tablet and allow their children to use it.

The Youth Spend on Internet Usage

The cybersecurity community finds internet use among children and the youth most interesting.

After delving into statistics about youth and their internet use, we found some pretty insightful things about how the youth access and interact with digital technology in Kenya.

According to a survey published by Youth Dynamix, a specialist Youth and Family Research Agency, over 18% of Kenyan Youth own a smartphone.

Further, the primary function of a smartphone has diversified wildly. Not only is a smartphone utilized for voice calls and internet access but also for their day to day financial transactions.

The Youth’s reliance on digital technology does not stop there. Findings from the research firm, Youth Dynamix pointed out that about 79% of the Youth Wallet Share is specially allocated to airtime.

Essentially, what this statistic points out is that if a parent gives their children a sum of KES 4,000 each month then KES 3,160 could go exclusively to internet usage and voice calls.

It is of note that data usage is much more prevalent than voice calls among the youth demographic.

Internet use is a social norm

I do not intend to load this article with complex statistic-based data, however, the more one looks at the numbers, the more apparent the reality of constant internet use among the Youth in our country becomes.

Constant use may ultimately mean constant exposure to the vices and obscenities of an open and unchecked information pool where pornography and other forms of putrid content fester.

A statistic that should raise Kenyan parents’ eyebrows is based on a recent survey which pointed out that a staggering 35% of all Internet downloads are related to pornography.

A staggering 35% of all Internet downloads are related to pornography. Click to Tweet

Moreover, cyberterrorism has led to the growth and development of radicalization among impressionable children.

Modern recruitment campaigns from terrorist organizations often necessitate the protection and monitoring of children’s cyberactivity, otherwise the virtues and positive social cues which parents take years to teach their children is often replaced by dark, nihilistic ideas which could lead to dire consequences not just within the home, but for the State as well.

What is it that you have done to safeguard your child from the dangers of the Internet?

A valid counter argument will always be that the Internet is a treasure trove of knowledge and innovation, that the network effects present within the Web can bring out the best out of our young population; that constantly being on the Internet is not always a bad thing.

The latter may be true, but perhaps it is time for parents and guardians to ask themselves what exactly they have done to validate these fruitful notions.

What roles do parents play in ensuring the safe and righteous use of digital devices such as smartphones, tablets and laptops after their purchase? Why aren’t parents more involved in the manner which their children use the Internet? How can parents ensure that the Internet is used to add value to the education of their children?

In conclusion

In conclusion, Millennials (the youth born between 1980-1995) and Generation Z (the youth born between 1996-2010) rarely (if ever) forget their first mobile phone, first tablet or first laptop.

Don’t take my word for it?

We recommend that you ask them, and while you are at it discuss how parental control and guidance over internet use can mutually benefit the home and the family.

Refuse to let your children drown in the vast pool of information that is the Internet, it is time to gently put the floaters on, mums and dads. It is time to put the floaters on.

Previous ArticleNext Article

Mobile World Congress: Introducing 5G 0 358

Year after year Mobile World Congress (MWC) takes place in Barcelona, Spain. It is an event that brings together almost every vendor related to the mobile industry to show off their shiny new gadgets, apps and services in our ever-increasingly-connected world.

One of the hot topics surrounding this world at MWC 2018 was 5G — the next generation of mobile connectivity.

What is 5G and how will it affect us?

If we look back at previous incarnations of mobile networks, 1G, 2G and so on, there have been major changes to the technology. The next generation, 5G, delivers greater speed and lower latency, but also has the advantage of being able to connect many more devices concurrently. This is one of the reasons why MWC has gone from being just a show promoting smartphone manufacturers and operators to a gathering of companies showing off connected world devices that could benefit from being connected to a 5G network.

The reality is that none of the existing technologies will disappear anytime soon, in fact the speed that can be achieved on the existing network are up to 1.2Gbps. So, asking the sales representatives in a phone shop about a new 5G handset will probably have them wondering what you’re talking about.

The existing infrastructure for 4G relies on cell towers/masts, typically with reasonable distances between them, whereas 5G is based on smaller, more frequent cells. The smaller cells help deliver the additional bandwidth and lower latency as the network becomes more distributed. The speeds are reportedly able to deliver 20Gbps with just 1ms latency.

Any new networks require licenses, funding and significant effort to introduce them. In the US, AT&T claims it will be the first company with a 5G network, that will cover 12 cities by the end of 2018 and aimed at the mobile phone market. Verizon is taking a different approach and intends on implementing 5G to compete with existing home internet service providers, and with the speed and capacity available on a 5G network this could be a very competitive offering.

Many exhibition halls at MWC had devices designed for the smart city, driverless cars, smart bandages that track your healing, through to virtual reality gaming.

While faster speed is a result of the improved technologies, it is the low latency and capacity that will enable these technologies to deliver a world where just about everything could be connected. The need for capacity is compounded once the connected devices start talking to each other. For example, the future driverless car may be able to communicate with other cars, traffic monitoring, or sensors on the roads and take actions based on the environment around it.

While some 5G smartphone handsets may start to appear on shelves in 2018, we should expect the main vendors to start offering them in 2019.

The rollout of 5G is moving quicker in some regions than others, as already discussed, carriers in the US see competitive advantage and have already announced their plans. Other countries that have openly stated their commitment to early adoption of 5G are China, Japan, South Korea, Australia and Norway, and I am sure this list will grow. In Europe, commitment from both regulators and financiers for the new networks is slower. This could be seen as a competitive disadvantage, or you could view this as sensibly waiting to allow others to experience the difficulties of early adopter first.

As with any new technology there are security considerations. Providers of services will need to combat the expected evolution of advanced malware that will accompany the new 5G infrastructure and implement threat prevention services and solutions that deliver security through layers, including machine learning, to deal with the increased network performance and capacity. Threat intelligence and pro-active security measures are essential components for any device or service being developed to utilize 5G, secure by design.

It is important to remember that understanding the psychology and mindset of the cybercriminal is also important, and for this, deep research by experts in the security field will help the industry predict where the attackers may see the next opportunity. So, while 5G will move us quicker, the benefit of added speed will have a cost and means that for the time being the human component in maintaining safer technology remains crucial.

Smart, Smarter… Dumbest… 0 325

Technological evolution: who hasn’t heard of this yet? It brings happiness into our lives, more convenience and less cumbersome usage, more and more possibilities for the user… Why make life (more) difficult when it can be made so (much more) convenient?

Just look at a communication device that you cannot ignore anymore, even if you wanted to: the smart phone. For the younger generation, it’s as if a cybernetic system is prosthetically attached to their arms; resisting it is futile! And they want their phones to become smarter and smarter, taking over more and more functions of their daily lives.

Now this is, of course, heaven for manufacturers: they can all battle to find new unique money-making features to add… or to make one that already exists much better. Likewise for the developers of dedicated apps (think, for example mobile banking). Innovation to make our daily lives “easier and easier”, basically a one-click life.

With the technology evolving at an ever faster pace, and an increasing focus on being the first to have the latest selling point, thoughts of security tend to be secondary, at best. This creates more possibilities for hackers, those that want to steal information, eavesdrop, etc. As these new features are introduced more and more often, and with more and more haste, in the smarter phones, so the probability of zero-day exploits becomes higher.

It seems that with the speed of technological evolution, the “urge” of people to use new features as soon as possible – even though they may not even exist right now and while these tasks can already be done in ‘the old way’ – is unstoppable. And at the same time we complain about data leakage, data loss, lack of privacy and insecure operating systems.

Maybe it is time to press pause and make it all secure, or more secure, dial back on the technological potential technological possibilities – making devices more controllable. There is definitely a demand for that, too. Just last week the Dutch Government announced that officials must switch to dumb(er) phones, deliberately equipped with low-tech specifications, making it harder for hackers to intercept them. The new phones only can be used for calls or SMS; they lack the ability to install apps or connect to the internet (I still remember those (brick) phones from the late 90’s!). While the prime-minister and some ministers already use such a device, others will have to “abandon” their current mobile phones when travelling to specific countries or regions and will be issued with such a low-tech phone and urged to leave their regular phone at home. This should make communication secure, or at least less insecure’, since the replacement mobile phone has been prepared, checked and certified by the Dutch Secret Service. A great step back, getting rid of security by obscurity, and prioritizing safety over features.

The example of the Dutch Government is not an isolated incident, it seems to become a trend. Earlier this year, the White House banned personal cell phones from the West Wing, citing security concerns. Staff will be able to continue to carry out their business on government-issued devices.

But of course it is not only the device that needs to be more secure. You, the user of the device, have to be aware of security issues too, such as not taking a personal phone with you on business trips, but also making and receiving calls with your secure phone in a secure environment, making sure that there are no cameras or listening devices, and no windows conveniently nearby so that lip-readers can do their job. And then making sure you whisper as the walls in the hotel may be thin, and… Oh wait… Remote laser vibration sensors can decode the audio! Best to go into the hotel room bathroom, close the door (they tend to have some soundproofing), turn on the shower and stand quite close to it while calling… Am I getting paranoid?

By all means, let’s not get too James Bond-ishly paranoid. For politicians, top managers of large multinationals dealing with sensitive information that could affect stock markets, those who deal with (trade) secrets and intellectual property: this may be an issue and they should take the necessary precautions. But revert completely to using only a dumb phone, even for normal calls asking, for example, how grandmother is doing?

Just remember that in the past, listening in on calls made on the analog telephone system with no encryption was really easy. Technology brought us a long way ahead, but perhaps a bit too fast. A small step back, made by securing the current “standard”, is more feasible than complete eradication of what has been created and accepted as a normal part of our daily lives. Such a complete reversion would not even be considered acceptable anymore if we were to disallow commonly-used devices.

Are you going to tell your teenage and pre-teenage children that a hot-off-the-press-release model smartphone with the newest features is now prohibited, and an old phone that can only call/text is all that’s available? They will be angry, feel ashamed of their old-fashioned parents, and will not go out anymore as they refuse to have their friends see them with such a simplistic, dumb phone. As they will not be able to interact with their friends anymore, because social media apps do not exist for their dumb phone (and since they won’t leave the house anymore), they will have to talk to you again.

Wait a minute??? Kids that start to talk to their parents again… But that’s a good thing! Where can I get one of these phones?!