{"id":20976,"date":"2024-02-06T10:12:31","date_gmt":"2024-02-06T15:12:31","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=20976"},"modified":"2024-06-03T14:21:19","modified_gmt":"2024-06-03T18:21:19","slug":"a-safer-internet-whose-responsibility-is-it","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/uk\/a-safer-internet-whose-responsibility-is-it\/","title":{"rendered":"\u0411\u0435\u0437\u043f\u0435\u0447\u043d\u0438\u0439 \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442 - \u0447\u0438\u044f \u0446\u0435 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u0430\u043b\u044c\u043d\u0456\u0441\u0442\u044c?"},"content":{"rendered":"\n<p>Safer Internet Day 2024 is here! Don\u2019t miss our international collaborative webinar on online safety alongside <a href=\"https:\/\/www.cyberlite.org\/\" target=\"_blank\" rel=\"noopener\">Cyberlite<\/a>, <a href=\"https:\/\/www.ictc-ctic.ca\/\" target=\"_blank\" rel=\"noopener\">The Information and Communications Technology Council (ICTC)<\/a>, <a href=\"https:\/\/www.cyberlegends.com\/\" target=\"_blank\" rel=\"noopener\">Cyber Legends<\/a>, and <a href=\"https:\/\/knowledgeflow.org\/\">KnowledgeFlow<\/a> Founder and cybersecurity expert; <a href=\"https:\/\/www.linkedin.com\/in\/claudiu-popa\/\" target=\"_blank\" rel=\"noopener\">Claudiu Popa<\/a>.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_a8f327-9b, .wp-block-kadence-advancedheading.kt-adv-heading20976_a8f327-9b[data-kb-block=\"kb-adv-heading20976_a8f327-9b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_a8f327-9b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_a8f327-9b[data-kb-block=\"kb-adv-heading20976_a8f327-9b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_a8f327-9b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_a8f327-9b[data-kb-block=\"kb-adv-heading20976_a8f327-9b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20976_a8f327-9b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_a8f327-9b\">What Is Safer Internet Day?<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_4af23a-c1, .wp-block-kadence-advancedheading.kt-adv-heading20976_4af23a-c1[data-kb-block=\"kb-adv-heading20976_4af23a-c1\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_4af23a-c1 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_4af23a-c1[data-kb-block=\"kb-adv-heading20976_4af23a-c1\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_4af23a-c1 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_4af23a-c1[data-kb-block=\"kb-adv-heading20976_4af23a-c1\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20976_4af23a-c1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_4af23a-c1\">Safer Internet Day promotes the safe and positive use of digital technology, especially for children and young people. Beginning as an EU-funded \u2018SafeBorders\u2019 project in 2004, Safer Internet Day (SID) is now celebrated across 200 countries and territories worldwide!<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_5b015a-0f, .wp-block-kadence-advancedheading.kt-adv-heading20976_5b015a-0f[data-kb-block=\"kb-adv-heading20976_5b015a-0f\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_5b015a-0f mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_5b015a-0f[data-kb-block=\"kb-adv-heading20976_5b015a-0f\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_5b015a-0f img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_5b015a-0f[data-kb-block=\"kb-adv-heading20976_5b015a-0f\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20976_5b015a-0f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_5b015a-0f\">SID prioritizes protection and empowerment being equally important regarding the digital wellbeing of youth. This focus on empowerment equips our youth with the knowledge and tools they need to engage in a positive online experience all year long.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_a43686-52, .wp-block-kadence-advancedheading.kt-adv-heading20976_a43686-52[data-kb-block=\"kb-adv-heading20976_a43686-52\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_a43686-52 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_a43686-52[data-kb-block=\"kb-adv-heading20976_a43686-52\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_a43686-52 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_a43686-52[data-kb-block=\"kb-adv-heading20976_a43686-52\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20976_a43686-52 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_a43686-52\">Raising Awareness<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_c0902c-d2, .wp-block-kadence-advancedheading.kt-adv-heading20976_c0902c-d2[data-kb-block=\"kb-adv-heading20976_c0902c-d2\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_c0902c-d2 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_c0902c-d2[data-kb-block=\"kb-adv-heading20976_c0902c-d2\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_c0902c-d2 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_c0902c-d2[data-kb-block=\"kb-adv-heading20976_c0902c-d2\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20976_c0902c-d2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_c0902c-d2\">Each year, emerging online issues and current concerns are highlighted to raise awareness and start important conversations. Key topics include:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items20976_f915b3-56:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20976_f915b3-56 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20976_f915b3-56 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20976_f915b3-56 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items20976_f915b3-56 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20976_f915b3-56 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-20976_14d78a-88 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_14d78a-88 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Cyberbullying<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_93079d-a9 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_93079d-a9 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Social networking<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_f25f59-63 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_f25f59-63 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Digital identity<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_07fd07-e6 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_07fd07-e6 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Creating and engaging with positive online content<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_904e57-94, .wp-block-kadence-advancedheading.kt-adv-heading20976_904e57-94[data-kb-block=\"kb-adv-heading20976_904e57-94\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_904e57-94 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_904e57-94[data-kb-block=\"kb-adv-heading20976_904e57-94\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_904e57-94 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_904e57-94[data-kb-block=\"kb-adv-heading20976_904e57-94\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20976_904e57-94 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_904e57-94\">this year&#8217;s topics<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_19a4a9-ea, .wp-block-kadence-advancedheading.kt-adv-heading20976_19a4a9-ea[data-kb-block=\"kb-adv-heading20976_19a4a9-ea\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_19a4a9-ea mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_19a4a9-ea[data-kb-block=\"kb-adv-heading20976_19a4a9-ea\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_19a4a9-ea img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_19a4a9-ea[data-kb-block=\"kb-adv-heading20976_19a4a9-ea\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading20976_19a4a9-ea wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_19a4a9-ea\">Want to be empowered online? Our 8 Cybersafety Discussion Topics for Safer Internet day 2024<\/h3>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items20976_161346-b5:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20976_161346-b5 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20976_161346-b5 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items20976_161346-b5 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items20976_161346-b5 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20976_161346-b5 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-20976_914cd1-ab .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_914cd1-ab kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">The critical roles educators and parents play in ensuring the cyber safety of children<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_0be3e5-61 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_0be3e5-61 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Risks children face online today<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_6964d8-ea .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_6964d8-ea kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">How parents and educators can adapt their strategies to address these evolving threats<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_59a06e-ab .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_59a06e-ab kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Cyber safety education within the Canadian education system<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_2c4741-a8 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_2c4741-a8 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">How cybersafety education is viewed and implemented in Singapore<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_f57e1f-ac .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_f57e1f-ac kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">How to leverage technology to protect children online<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_28ec77-50 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_28ec77-50 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Practical tips for parents to safeguard their children online, regardless of their level of tech expertise.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-20976_60f7fb-6d .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20976_60f7fb-6d kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Questions from the community<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_680054-86, .wp-block-kadence-advancedheading.kt-adv-heading20976_680054-86[data-kb-block=\"kb-adv-heading20976_680054-86\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_680054-86 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_680054-86[data-kb-block=\"kb-adv-heading20976_680054-86\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_680054-86 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_680054-86[data-kb-block=\"kb-adv-heading20976_680054-86\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20976_680054-86 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_680054-86\">Watch The Webinar Here<\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Whose responsibility is it? #SID2024: with KnowledgeFlow, Cyberlite, ICTC and Cyber Legends.\" width=\"720\" height=\"405\" src=\"https:\/\/www.youtube.com\/embed\/TOlcdjfst9w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20976_2ff5a2-e9, .wp-block-kadence-advancedheading.kt-adv-heading20976_2ff5a2-e9[data-kb-block=\"kb-adv-heading20976_2ff5a2-e9\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20976_2ff5a2-e9 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20976_2ff5a2-e9[data-kb-block=\"kb-adv-heading20976_2ff5a2-e9\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20976_2ff5a2-e9 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20976_2ff5a2-e9[data-kb-block=\"kb-adv-heading20976_2ff5a2-e9\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading20976_2ff5a2-e9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20976_2ff5a2-e9\">Explore our hundreds of FREE resources<\/h2>\n\n\n<style>.kb-posts-id-20976_585769-cc .entry.loop-entry .entry-header .entry-title{font-size:var(--global-kb-font-size-md, 1.25rem);}.kb-posts-id-20976_585769-cc .kb-post-list-item{display:grid;}<\/style><ul class=\"wp-block-kadence-posts kb-posts kadence-posts-list kb-posts-id-20976_585769-cc content-wrap grid-cols kb-posts-style-boxed grid-sm-col-2 grid-lg-col-3 item-image-style-above\"><li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-36675 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheet resource-type-tip-sheets topic-artifical-intelligence topic-online-safety-for-children-and-parents\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-inherit\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/ai-tools-shouldnt-replace-thinking\/\" aria-label=\"AI Can Help, But It Shouldn\u2019t Replace Thinking\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"tipsheet resource image banner\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-300x300.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-100x100.png 100w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h3 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/ai-tools-shouldnt-replace-thinking\/\" rel=\"bookmark\">AI Can Help, But It Shouldn\u2019t Replace Thinking<\/a><\/h3>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2026-03-31T14:59:13-04:00\">31 \u0411\u0435\u0440\u0435\u0437\u043d\u044f, 2026<\/time><time class=\"updated\" datetime=\"2026-04-02T15:22:32-04:00\">2 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>AI tools can make tasks faster and easier. They can help generate ideas, answer questions, and support&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/ai-tools-shouldnt-replace-thinking\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> AI Can Help, But It Shouldn\u2019t Replace Thinking<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-36619 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheet resource-type-tip-sheets topic-online-safety-for-children-and-parents\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-inherit\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/updates-fix-more-than-just-bugs\/\" aria-label=\"Updates Fix More Than Just Bugs\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"tipsheet resource image banner\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-300x300.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-100x100.png 100w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h3 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/updates-fix-more-than-just-bugs\/\" rel=\"bookmark\">Updates Fix More Than Just Bugs<\/a><\/h3>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2026-03-31T10:30:52-04:00\">31 \u0411\u0435\u0440\u0435\u0437\u043d\u044f, 2026<\/time><time class=\"updated\" datetime=\"2026-04-02T15:23:44-04:00\">2 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Updating your devices and apps does more than improve performance. Many updates include important security fixes that&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/updates-fix-more-than-just-bugs\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Updates Fix More Than Just Bugs<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-36615 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheet resource-type-tip-sheets topic-online-safety-for-children-and-parents\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-inherit\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/online-challenges-can-spread-quickly\/\" aria-label=\"Online Challenges Can Spread Quickly\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"tipsheet resource image banner\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-300x300.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-100x100.png 100w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h3 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/online-challenges-can-spread-quickly\/\" rel=\"bookmark\">Online Challenges Can Spread Quickly<\/a><\/h3>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2026-03-30T16:29:05-04:00\">30 \u0411\u0435\u0440\u0435\u0437\u043d\u044f, 2026<\/time><time class=\"updated\" datetime=\"2026-04-02T15:24:02-04:00\">2 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Online challenges can gain attention very quickly. What starts as a trend can spread across platforms in&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/online-challenges-can-spread-quickly\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Online Challenges Can Spread Quickly<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-36611 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheet resource-type-tip-sheets topic-device-security topic-online-safety-for-children-and-parents\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-inherit\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/setting-digital-boundaries-is-important\/\" aria-label=\"Setting Digital Boundaries Is Important\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"tipsheet resource image banner\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-300x300.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-100x100.png 100w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h3 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/setting-digital-boundaries-is-important\/\" rel=\"bookmark\">Setting Digital Boundaries Is Important<\/a><\/h3>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2026-03-30T15:52:53-04:00\">30 \u0411\u0435\u0440\u0435\u0437\u043d\u044f, 2026<\/time><time class=\"updated\" datetime=\"2026-04-02T15:25:16-04:00\">2 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Being online is part of everyday life, but it is important to set limits. From how much&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/setting-digital-boundaries-is-important\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Setting Digital Boundaries Is Important<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-36607 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheet resource-type-tip-sheets topic-device-security topic-online-privacy-and-security topic-online-safety-for-children-and-parents\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-inherit\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/shared-devices-can-expose-information\/\" aria-label=\"Shared Devices Can Expose Private Information\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"tipsheet resource image banner\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-300x300.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-100x100.png 100w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h3 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/shared-devices-can-expose-information\/\" rel=\"bookmark\">Shared Devices Can Expose Private Information<\/a><\/h3>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2026-03-30T15:44:59-04:00\">30 \u0411\u0435\u0440\u0435\u0437\u043d\u044f, 2026<\/time><time class=\"updated\" datetime=\"2026-04-02T15:25:53-04:00\">2 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>shared devices can make tasks easier, but it can also create privacy risks. Whether it is a&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/shared-devices-can-expose-information\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Shared Devices Can Expose Private Information<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-36602 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheet resource-type-tip-sheets topic-artifical-intelligence topic-online-safety-for-children-and-parents\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-inherit\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/deepfake-technology-is-becoming-more-common\/\" aria-label=\"Deepfake Technology Is Becoming More Common\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"tipsheet resource image banner\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-150x150.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-300x300.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/Tip-Sheet-100x100.png 100w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h3 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/deepfake-technology-is-becoming-more-common\/\" rel=\"bookmark\">Deepfake Technology Is Becoming More Common<\/a><\/h3>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2026-03-30T14:40:51-04:00\">30 \u0411\u0435\u0440\u0435\u0437\u043d\u044f, 2026<\/time><time class=\"updated\" datetime=\"2026-04-02T15:26:13-04:00\">2 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Not everything you see online is real. Deepfake technology can create realistic images, videos, or audio that&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/deepfake-technology-is-becoming-more-common\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Deepfake Technology Is Becoming More Common<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>\u0414\u0435\u043d\u044c \u0431\u0435\u0437\u043f\u0435\u0447\u043d\u043e\u0433\u043e \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0443 2024 \u0432\u0436\u0435 \u0442\u0443\u0442! \u041f\u0435\u0440\u0435\u0433\u043b\u044f\u043d\u044c\u0442\u0435 \u043d\u0430\u0448 \u0441\u043f\u0456\u043b\u044c\u043d\u0438\u0439 \u0432\u0435\u0431\u0456\u043d\u0430\u0440, \u043f\u0440\u0438\u0441\u0432\u044f\u0447\u0435\u043d\u0438\u0439 \u043e\u0431\u0433\u043e\u0432\u043e\u0440\u0435\u043d\u043d\u044e \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0432 \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0456 \u0440\u0430\u0437\u043e\u043c \u0437 Cyberlite, \u0420\u0430\u0434\u043e\u044e \u0437 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 (ICTC), Cyber Legends \u0442\u0430 \u0437\u0430\u0441\u043d\u043e\u0432\u043d\u0438\u043a\u043e\u043c KnowledgeFlow \u0456 \u0435\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u043c \u0437 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u041a\u043b\u0430\u0443\u0434\u0456\u0443 \u041f\u043e\u043f\u0430. <\/p>","protected":false},"author":8,"featured_media":20981,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"below","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[537,531,532,388,382,534,535,364,533],"class_list":["post-20976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes","tag-awareness","tag-education","tag-international","tag-online-safety","tag-parents","tag-privacy","tag-safety","tag-teachers","tag-youth"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":537,"label":"Awareness"},{"value":531,"label":"Education"},{"value":532,"label":"International"},{"value":388,"label":"online safety"},{"value":382,"label":"parents"},{"value":534,"label":"Privacy"},{"value":535,"label":"Safety"},{"value":364,"label":"teachers"},{"value":533,"label":"Youth"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/02\/safer-internet-day-blog-featured-image-1-1024x538.png",1024,538,true],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/uk\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","cat_ID":516,"category_count":78,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":537,"name":"Awareness","slug":"awareness","term_group":0,"term_taxonomy_id":537,"taxonomy":"post_tag","description":"","parent":0,"count":68,"filter":"raw"},{"term_id":531,"name":"Education","slug":"education","term_group":0,"term_taxonomy_id":531,"taxonomy":"post_tag","description":"","parent":0,"count":48,"filter":"raw"},{"term_id":532,"name":"International","slug":"international","term_group":0,"term_taxonomy_id":532,"taxonomy":"post_tag","description":"","parent":0,"count":27,"filter":"raw"},{"term_id":388,"name":"online safety","slug":"online-safety","term_group":0,"term_taxonomy_id":388,"taxonomy":"post_tag","description":"","parent":0,"count":63,"filter":"raw"},{"term_id":382,"name":"parents","slug":"parents","term_group":0,"term_taxonomy_id":382,"taxonomy":"post_tag","description":"","parent":0,"count":20,"filter":"raw"},{"term_id":534,"name":"Privacy","slug":"privacy","term_group":0,"term_taxonomy_id":534,"taxonomy":"post_tag","description":"","parent":0,"count":32,"filter":"raw"},{"term_id":535,"name":"Safety","slug":"safety","term_group":0,"term_taxonomy_id":535,"taxonomy":"post_tag","description":"","parent":0,"count":30,"filter":"raw"},{"term_id":364,"name":"teachers","slug":"teachers","term_group":0,"term_taxonomy_id":366,"taxonomy":"post_tag","description":"","parent":0,"count":18,"filter":"raw"},{"term_id":533,"name":"Youth","slug":"youth","term_group":0,"term_taxonomy_id":533,"taxonomy":"post_tag","description":"","parent":0,"count":22,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts\/20976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/comments?post=20976"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts\/20976\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media\/20981"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media?parent=20976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/categories?post=20976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/tags?post=20976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}