A DECADE+ OF STORYTELLING POWERED BY THE BEST WRITERS ON THE PLANET

BE PART OF THE LEGACY

TAMPA BAY • FEBRUARY 23-24 2026

This FINAL encore experience will be unlike any other. Because like everything we do, it's been "reimagined" from beginning to end. It's not a virtual or hybrid event. It's not a conference. It's not a seminar, a workshop, a meeting, or a symposium. And it's not your typical run-of-the-mill everyday event crammed with stages, keynote speeches, team-building exercises, PowerPoint presentations, and all the other conventional humdrum. Because it's up close & personal by design. Where conversation trumps presentation. And where authentic connection runs deep.

Cybersecurity –What Teenagers Need To Know

File 20180817 165934 1ezs1f3.jpg?ixlib=rb 1.1

Everyone’s using technology – but they’re not all as safe as they could be.
Akhenaton Images/Shutterstock.com

Sanjay Goel, University at Albany, State University of New York

Now that school is back in session, many high schoolers have new phones, new computers and new privileges for using their devices – and new responsibilities too. High schoolers today are more technology-savvy than average adults. While many people think that young people use their devices primarily for video games and social networking, the reality today is that high schoolers use technology for learning as much as for entertainment.

As the director for cybersecurity programs in the University at Albany’s School of Business, I regularly encounter high school students through the camps I run or as interns in my research lab. My first task is to describe the potential threats for them. I tell students that hackers and cybercriminals are constantly looking for vulnerable targets to attack and steal information from. Teenagers must keep their devices and information secure, behave appropriately on social media and shared devices, and respect others’ digital privacy on devices and online.

Here are some ways they can protect their own – and their friends’ – cybersecurity.

Password safety

Passwords are the keys to your digital life. Make sure they are at least 10 characters long – including letters, numbers and symbols to make them harder to crack.

Don’t write passwords down. Consider using a secure password manager. Also use two-factor authentication – either a physical security key or an app delivering time-based one-time passwords, like Authy or Google Authenticator.

Don’t share passwords with friends. It’s the same as giving them the keys to your house or your car – plus the power to see everything you’ve done and even impersonate you online. For the same reasons, don’t save usernames and passwords on shared computers, and always log out when you’re finished using someone else’s device.

Another key way to protect your data is to back it up regularly to an external hard drive or a cloud storage system.

Mobile safety

The best way to protect your smartphone is to know where it is at all times. Also, set a password on it and be sure it’s set up so you can remotely wipe it if you do lose it.

Be very careful when downloading apps. Often hackers will create apps that look a lot like a genuine popular app but are instead malware that will steal your personal information.

Disable Bluetooth on your devices unless you’re actively using a Bluetooth connection. Especially in public places, it opens your phone up to being hijacked and having your data stolen.

Avoid open public Wi-Fi networks. They can easily be penetrated by hackers – or even set up and operated by data thieves – who can watch the traffic and see what you do online. Consider using a virtual private network, which encrypts everything your device transmits.

Computer safety

Get a camera cover for the webcam on your computer; an attacker can break into your computer and remotely activate it, watching your every move.

Don’t open emails from people you don’t know – and check the sender’s email address by hovering the mouse over it, to make sure someone’s not trying to pretend to be someone you do know. Especially, don’t download email attachments you’re not expecting to receive.

Don’t click on any links you don’t recognize. If you must follow a link, copy and paste the link URL to make sure it’s going to a legitimate site.

Gaming safety

Video games – on consoles, desktops and mobiles – are also potential security threats. Set strong passwords to protect your accounts from other gamers.

Only download games from legitimate sites, to make sure you don’t download malware.

Just as you would with other apps and devices, be wary of people impersonating others or trying to get you to click on misleading links or download malicious attachments.

Don’t share personal information on gaming sites, or use gamertags or other profile information that could connect your gaming persona with your real life. Frustrations in games can turn into personal conflicts – with the potential to be very scary and even dangerous.

Do your part to deescalate online conflict by not taking other gamers’ actions personally.

Social media safety

When you’re on social media, don’t befriend people you don’t actually know in real life.

To protect your privacy and to minimize the digital footprints future colleges and employers might find, don’t post – or let friends post – embarrassing pictures of yourself or any other questionable material.

Be aware of cyberbullies and online stalkers. Limit how much you reveal about your daily routines, habits or travels. And if you ever feel uncomfortable or threatened by someone online, immediately stop communicating with that person and alert a responsible adult, like a parent, teacher or school librarian.The Conversation

Sanjay Goel, Professor of Information Technology Management, University at Albany, State University of New York

This article was originally published on The Conversation. Read the original article.

THE CONVERSATION
THE CONVERSATIONhttps://theconversation.com/us
THE CONVERSATION US launched as a pilot project in October 2014. It is an independent source of news and views from the academic and research community, delivered direct to the public. Our team of professional editors work with university and research institute experts to unlock their knowledge for use by the wider public. We aim to help rebuild trust in journalism. All authors and editors sign up to our Editorial Charter. All contributors must abide by our Community Standards policy. We only allow authors to write on a subject on which they have proven expertise, which they must disclose alongside their article. Authors’ funding and potential conflicts of interest must also be disclosed. Failure to do so carries a risk of being banned from contributing to the site. The Conversation started in Melbourne Victoria and the innovative technology platform and development team is based in the university and research precinct of Carlton. Our newsroom is based in Boston but our team is part of a global newsroom able to share content across sites and around the world. The Conversation US is a non-profit educational entity.​

DO YOU HAVE THE "WRITE" STUFF? If you’re ready to share your wisdom of experience, we’re ready to share it with our massive global audience – by giving you the opportunity to become a published Contributor on our award-winning Site with (your own byline). And who knows? – it may be your first step in discovering your “hidden Hemmingway”. LEARN MORE HERE


RECIPIENT OF THE 2024 "MOST COMPREHENSIVE LIFE & CULTURE MULTIMEDIA DIGEST" AWARD

WE ARE NOW FEATURED ON

EXPLORE 360° NATION

ENJOY OUR FREE EVENTS

OUR COMMUNITIES