Top Ten Tips to Online Safety, a resource portal for information on Bullying and Cyber Bullying, has releases an article containing the top 10 tips on how to reach online safety. Though aimed at parents and beginners, the enterprise should take note of the tips and integrate it into company policy as well.

The article contains information from tech experts directed to parents to help them keep the children safe online. The tips include keeping the PC/Laptop safe from Malware, downloading free software to drive by downloads. It also instructs users to carefully read the privacy policies of websites and to watch out for chatting with strangers and giving out passwords even to friends/partners.


Macartan Mulligan, Co-Founder of, said, “To create a safe online environment for your child, you must learn how to work well with internet safety tools.” He adds “This guide can help out parents who aren’t tech-savvy to achieve the maximum level of internet safety.” He adds, “The settings on your pc and browser can be your best friend or your worst enemy, it all boils down to taking the time to understanding the computer related lingo and use it to your advantage.”

He added, that parents and teachers should make a point to educate the younger generations about the sad outcome of bullying online and off line. According to Mulligan, it is quite imperative to press for more firm laws condemning all acts of bullying, cyber bullying and harassment.

The top 10 tips for online safety are:

  1. Malware
  2. Antivirus and firewall programs
  3. Free software
  4. Drive-by downloads
  5. Go private
  6. Read the Privacy Policy
  7. Links within email
  8. Online chat
  9. Passwords
  10. Encryption

This release coincides with Global information security consultancy, MWR InfoSecurity warning, that most firms do not have efficient security processes in place to respond to phishing emails, which are often the precursor to specific attacks where a company can be seriously hacked. “Spear-phishing attacks against organisations are nothing new, but they are rising steeply in both frequency and complexity,” said Guillermo Lafuente, a Senior Security Consultant at MWR specialising in Social Engineering attacks.

“These attacks start with an innocent looking email that appears to come from a trustworthy source but have evolved to the extent that often neither the individual nor the organisation are even aware that an incident has occurred until it is too late and confidential data has been stolen.”

He added: “They are mainly designed to deceive employees, who are still seen as the ‘weakest link’, but we noticed that many companies do not have efficient internal incident response procedures in place to alert their staff about the threat.” MWR has identified a number of key processes that should be functional for an organisation to be able to resist these external threats, including the length of time before a phishing email is recorded as an incident and having effective out-bound email filters implemented to prevent the leakage of sensitive data.