Digital Citizenship

Digital Citizens

We have officially reached a point in history where we have an entire generation of people who have grown up using digital media. From their first moments of life, they have been introduced to technology, that provides them access and connectivity to the entire world. We see little ones in strollers playing with cell phones and iPad’s before they can even walk and talk. This new generation is already consuming and creating content at astronomical rates. However, it is important to note, and studies have shown that digital media consumption is addicting, both physically and psychologically. Participating in social media produces the same neurological response as using an addictive substance. Specifically, when a person receives a notification that a post has received attention, such as a ‘like’ or a ‘mention’, the brain naturally receives a rush of dopamine causing the person pleasure and a sense of satisfaction. This exact same response can be compared to individuals using addictive drugs (Hilliard, 2019).

In our day and age, many adults suffer from media addiction; however, young people suffer this addiction at a much higher rate, as they have been exposed to digital media content since birth. We are providing young persons with access to a world of information and people without providing them with the tools, guidelines, and education about how to use the Internet safely. Our goal in this article is to provide a framework for parents and young persons, in order to understand our role as a digital citizen and how we best to navigate content, with a focus on practicing good cyber hygiene.

Key Considerations When Building Out Your Insider Risk Program

Is Insider Risk something new, or something we need to look at in a new way? Traditionally we have put in place measures to protect the perimeter, to control access into our buildings or our systems. Why did we do this? We saw the biggest risks and threats coming from external sources. In a “less connected” world this made perfect sense. We housed our assets and managed accordingly. However, the world has changed. We are more inter-connected than ever, and in many ways, we’ve optimized against the external threats. We have become experts in “perimeter” protection. We cannot rest and let down on the perimeter, however, the perimeter being the primary focus has left us vulnerable in many ways. This paper discusses how we design our internal controls, both in physical and system realms, as we evolve our understanding on where risks really exist, and how we believe people might behave. Employees stealing physical or confidential information from their company and/or place of work is not new, however, the complexity of the environment that we protect is no longer simple, and the stakes are high. Our reputation, our credibility, and in some cases the financial viability of these organizations are at stake.

Read Complete White Paper…