Ways to quickly make smartphones more secure, identifying red flags, checking for malicious apps, password best practices & prevention strategies.
Topics covered: Location tracking, spyware, tracking devices, IoT, social engineering, signs an account might be compromised and more.
Defining technology-enabled abuse; common red flags; examples of how it manifests among targets of domestic violence, sexual violence, stalking, elder abuse and human trafficking.
Deepfakes, Voice Cloning, Spoofing (faking someone’s phone number, hacking, etc.
Responding to threats, tech oriented solutions, deepfake pornography, take downs of unauthorized images or videos and more.
Steps to prioritize and incorporate a victim’s digital/online safety into traditional safety planning measures.