<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <title><![CDATA[News]]></title>
        <link><![CDATA[https://www.zontabulgaria.com/en/news]]></link>
        <description><![CDATA[]]></description>
        <atom:link xmlns:atom="http://www.w3.org/2005/Atom" href="https://www.zontabulgaria.com/en/news" type="application/rss+xml" rel="self"/>
        <language>en</language>
        <pubDate>Thu, 16 Nov 2023 08:43:11 +0000</pubDate>

                    <item>
                <title><![CDATA[Second successful edition of the Online Academy &quot;Women&#039;s rights in the changing world of work&quot;]]></title>
                <link>https://www.zontabulgaria.com/en/news/news/online-akademiya-pravata-na-zhenite</link>
                <description><![CDATA[<p style="text-align: justify;"><span style="font-family: 'Montserrat Regular Custom';">On 19 and 20 October 2023, the Online Academy "Women's Rights in the Changing World of Work" was held for the second time, entirely online. The academy is organized by Area 05, District 30, Zonta International and <a href="https://www.uni-sofia.bg/index.php/bul/universitet_t/fakulteti/stopanski_fakultet" target="_blank" rel="noopener noreferrer">the Faculty of Economics of Sofia University "St. Kliment Ohridski".</a></span></p>
<p style="text-align: justify;"> </p>
<p style="padding-left: 40px; text-align: justify;"><span style="color: #12340f; font-family: 'Montserrat Regular Custom';">The aim of the academy is to provide and develop specific skills in the area of sustainability reporting and improve knowledge on various corporate policies related to the protection of women's rights.</span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #802528; font-family: 'Montserrat Regular Custom'; font-size: 18px; font-weight: 600;">The academy includes the following topics:</span></p>
<p style="text-align: justify;"> </p>
<ul style="text-align: justify;">
<li><span style="font-family: 'Montserrat Regular Custom';">ESG - Introduction. Basic concepts and principles</span></li>
<li><span style="font-family: 'Montserrat Regular Custom';">Human rights and gender equality</span></li>
<li><span style="font-family: 'Montserrat Regular Custom';">Principles for economic empowerment and family-friendly workplace policies</span></li>
<li><span style="font-family: 'Montserrat Regular Custom';">Good practices: supporting women at work, cyber security and leadership</span></li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #12340f; font-family: 'Montserrat Regular Custom';">Each module is divided into theory and practice and aims to provide the basics and build knowledge in the area of <span style="font-weight: 600;">ESG (Environmental, Social, and corporate Governance)</span>  and the protection of women's rights, as an opportunity to apply what has been learned in the workplace , by both leaders and employees to contribute to building socially responsible business models.</span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #802528; font-family: 'Montserrat Regular Custom'; font-size: 18px; font-weight: 600;">Who is the academy suitable for?</span></p>
<p style="padding-left: 40px; text-align: justify;"> </p>
<p style="padding-left: 40px; text-align: justify;"><span style="color: #12340f; font-family: 'Montserrat Regular Custom';">The Academy is suitable for everyone looking to upgrade their skills and knowledge related to equality and women's rights (managers, business owners, sustainable development specialists, representatives of civil society organizations, etc.).</span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #802528; font-family: 'Montserrat Regular Custom'; font-size: 18px; font-weight: 600;">HORARIUM</span></p>
<p style="text-align: justify;">2 modules of 8 academic hours (16 academic hours)</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #802528; font-family: 'Montserrat Regular Custom'; font-size: 18px; font-weight: 600;">SCHEDULE</span></p>
<p style="text-align: justify;">2 days, all day, fully remote via Zoom</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #12340f; font-family: 'Montserrat Regular Custom';">This is the second edition of the academy, with the first successfully held in June 2023.</span></p>
<p style="text-align: justify;"> </p>
<p>The online academy is supported by the <a href="https://bfbhr.org/" target="_blank" rel="noopener noreferrer">Bulgarian Foundation for Business and Human Rights.</a></p>
<p> </p>]]></description>
                <author><![CDATA[bistra_zonta@abv.bg (Бистра Илиева)]]></author>
                <guid>https://www.zontabulgaria.com/en/news/news/online-akademiya-pravata-na-zhenite</guid>
                <pubDate>Thu, 16 Nov 2023 08:43:11 +0000</pubDate>
                <category><![CDATA[Новини]]></category>
                                    <enclosure url="https://static.super.website/fs/super-website/userFiles/zontabulgaria/images/a-21-onlineacademy-16989366058319.png" length="365384" type="image/png" />
                                                    <dc:description><![CDATA[ESG, sustainable development, human rights, gender equality, cybersecurity and supporting women in the workplace are just some of the topics of the academy, organized by Zonta Bulgaria and Sofia University &quot;St. Kliment Ohridski&quot;.]]></dc:description>
                            </item>
                    <item>
                <title><![CDATA[Area 05, District 30 anounces National Essay Contest&#039;s winners]]></title>
                <link>https://www.zontabulgaria.com/en/news/news/iasni-sa-pobeditelkite-v-nacionalnia-konkurs-za-ese</link>
                <description><![CDATA[<p style="text-align: justify;">On the occasion of March 8th - International Women's Day and Zonta's Yellow Rose Day, Area 05, District 30, Zonta International organized a National Essay Competition on the topic <span style="color: #802528; font-weight: 600;">"The Role of Women Leaders in Finding Solutions to Climate Change"</span>.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The competition was designed for outstanding young women aged 16 to 25 years who are active in various fields of public life and would like to present their perspectives and understanding of the role of women in the fight against climate change, as well as make concrete recommendations for women's involvement in national and/or global action against climate change.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The contest reached nearly <span style="color: #802528; font-weight: 600;">25, 000 people</span>, quite a few were interested and 7 young ladies wrote and submitted essays complying with the stated criteria.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">From 12 to 14 May at the "St. Anastasia" Hotel in Burgas, during the Second Area 05, District 30, Zonta International Board Meeting for Biennium 2022-2024 the winners of the contest were announced and awarded.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The first place was awarded to <span style="font-weight: 600; color: #802528;">Kristina Dimitrova </span>from Plovdiv, the second place was awarded to <span style="color: #802528; font-weight: 600;">Nur Mehmedali</span> from Burgas, and the third place went to <span style="color: #802528; font-weight: 600;">Alexandra Ivanova</span>, also from Burgas. </p>
<p style="text-align: justify;"><br>Kristina and Nur were present in person and not only were they able to receive their prizes, accompanied by certificates and yellow roses - the symbol of Zonta, but also to meet the Zonta members present at the meeting, who warmly welcomed them into the community of the biggest organization of women professionals.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Alexandra was unfortunately unable to attend and her award was given to Zonta Club of Bourgas's President - Mrs. Daniela Georgieva, who will make sure she recieves it at another convenient time.</p>
<p style="text-align: justify;"><br>Area 05 thanks everyone who participated in the contest and congratulates again Kristina, Nur and Alexandra for their success with wishes for many more in the future!</p>]]></description>
                <author><![CDATA[bistra_zonta@abv.bg (Бистра Илиева)]]></author>
                <guid>https://www.zontabulgaria.com/en/news/news/iasni-sa-pobeditelkite-v-nacionalnia-konkurs-za-ese</guid>
                <pubDate>Tue, 16 May 2023 11:59:30 +0000</pubDate>
                <category><![CDATA[Новини]]></category>
                                    <enclosure url="https://static.super.website/fs/super-website/userFiles/zontabulgaria/images/a-19-national-contest-winners-17001238430879.png" length="409700" type="image/png" />
                                                    <dc:description><![CDATA[The active young ladies had to write essays on the topic &quot;The role of women leaders in finding solutions to climate change&quot; and three girls claimed the first three prizes.]]></dc:description>
                            </item>
                    <item>
                <title><![CDATA[Cyberviolence against women - the pandemic we don&#039;t talk enough about]]></title>
                <link>https://www.zontabulgaria.com/en/news/cyberviolence-useful-information/kibernasilieto-nad-zhenite-pandemiyata-za-koyato-ne-govorim</link>
                <description><![CDATA[<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom'; color: #353535;">Violence has migrated to the online environment as a result of unlimited access to technology and the Internet, and women are constantly becoming its victims. By sharing a photo, video, personal chat/discussion, or just a rumor, their reputation and dignity are degraded in a fleeting moment. Not only has the COVID-19 pandemic increased domestic violence, but it has also increased online bullying. And the two are inextricably linked since it only takes minutes for online aggression to escalate into a physical assault.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom'; color: #353535;">Impersonation, hacking, spam, stalking, spying, and malicious exposure of personal conversations, images, and videos are all examples of gender-based violence on the Internet. It is critical to be sufficiently informed and familiar with them in order to recognize them and know who to contact when witnessing or experiencing violence online. Zonta Bulgaria's project <span style="color: #005f71;">"NO to cyberviolence against women and children"<span style="color: #353535;"> aims to prevent cyberviolence in all of its forms through a large-scale public awareness campaign and legislative amendments.</span></span></span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Cyberviolence</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Cyberbullying is described as online behavior that intentionally or not harms or threatens a person's physical, psychological, or emotional well-being. Cyberbullying can take several forms, including:</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<ul style="text-align: justify; line-height: 1.5;">
<li><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Written or verbal (phone calls, text messages, e-mails, chats, blogs, social media, websites etc.)</span></li>
<li><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Visual - publishing, distribution, or sharing of compromising photographs and videos</span></li>
<li><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Exclusion - deliberate removal of someone from an online group</span></li>
<li><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Theft and disclosure of personal information, as well as the use of another person's identity or account, are all examples of impersonation</span></li>
</ul>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Cyberstalking</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Cyberstalking entails a series of occurrences that, while each one may or may not be harmful on its own when taken together, undermine the victim's sense of security and create distress, fear, or anxiety. What methods are used to commit online harassment?</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<ul style="text-align: justify; line-height: 1.5;">
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Sending offensive or threatening emails, text messages (SMS), or instant messages</span></li>
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Posting offensive remarks about the victim on the internet</span></li>
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Sharing intimate photos or videos of the victim without her consent on the Internet or via mobile phone</span></li>
</ul>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom'; color: #353535;"><span style="color: #005f71;"><span style="color: #353535;">To be considered cyberstalking, these acts must take place</span> repeatedly and be perpetrated by the same person.</span></span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom';"><span style="color: #e18431; font-family: 'GT Walsheim Pro Medium Custom';">Non-consensual pornography</span><br><span style="font-family: 'GT Walsheim Pro Regular Custom';">Sharing sexually explicit photographs or videos without the permission of the victim. Abusers employ the following methods to carry out their actions:</span><br></span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<ul style="text-align: justify; line-height: 1.5;">
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Posting and distributing sexually explicit photographs or videos online without the victim's consent</span></li>
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;"><span style="color: #005f71;">Revenge porn</span> - cases where people (mainly men) publish sexually explicit content of their partners (mainly women) as an act of revenge after a breakup. They often publish the victim's contact information, including phone number, email address, Facebook profile, and home address, along with the materials for the purpose of humiliation and revenge, which results in women being bombarded with harassment, humiliation, and threatening messages from strangers.</span></li>
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;"><span style="color: #005f71;">Creep shots or upskirting</span> - sharing and distributing sexually explicit photographs/videos obtained without the victim's consent </span></li>
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;"><span style="color: #005f71;">Creating and distributing deepfakes</span> - images, videos, or audio recordings of a person saying or doing things he has never said or done in real life. The fact that the person did not actually do the crimes still affects his reputation, as the recordings or images that have been transmitted appear to be authentic.</span></li>
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Recording and distributing sexual activities committed without the victim's consent (e.g., rape) </span></li>
</ul>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Exploitation, coercion, and online threats (grooming or sextortion)</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';"><span style="color: #353535;">S</span><span style="color: #353535;">exually threatening or forcing victims to engage in sexual activity online, or blackmailing them with sexual content </span></span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<ul style="text-align: justify; line-height: 1.5;">
<li><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Oblique Custom'; font-size: var(--p-font-size); font-weight: var(--p-font-weight); letter-spacing: var(--p-letter-spacing);">Pressuring the victim to</span><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;"> disclose sexual photographs or engage in sexual activities online or offline</span></li>
<li><span style="font-family: 'GT Walsheim Pro Regular Oblique Custom'; color: #353535;">Threatening to disseminate sexual content (pictures, videos, or rumors) as a form of threats or extortion (so-called sextortion)</span></li>
<li><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Oblique Custom';">Threats of physical sexual harassment on the internet (e.g. threats of rape)</span></li>
<li><span style="font-family: 'GT Walsheim Pro Regular Custom'; color: #353535;">Persuading others into committing sexual violence via the internet</span></li>
<li><span style="font-family: 'GT Walsheim Pro Regular Custom'; color: #353535;">Encouraging someone to engage in sexual activity and then sharing evidence of it</span></li>
</ul>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="color: #e18431; font-family: 'GT Walsheim Pro Medium Custom';">Unwanted sexualization</span></p>
<p style="text-align: justify; line-height: 1.5;">Receiving inappropriate sexual demands, comments, or content. This can include a variety of behaviors, such as:</p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<ul style="line-height: 1.5;">
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Oblique Custom'; font-size: var(--p-font-size); font-weight: var(--p-font-weight); letter-spacing: var(--p-letter-spacing);">Sexualized comments (e.g. on photos)</span></li>
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Oblique Custom';">Pressuring victims to participate in viral sexualized campaigns</span></li>
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Oblique Custom';">Sending sexual content (photos, emojis, texts) without the victim's consent</span></li>
<li style="text-align: justify;"><span style="font-family: 'GT Walsheim Pro Regular Custom'; color: #353535;">Unwanted sexual interference or requests for sexual services</span></li>
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Custom';">Sexualized jokes</span></li>
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Custom';">Peer assessment of attractiveness / sexual activity</span></li>
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Custom';">Changing victim's image for the purpose of sexualization</span></li>
</ul>
<p style="line-height: 1.5;"> </p>
<p style="line-height: 1.5;"><span style="color: #e18431; font-family: 'GT Walsheim Pro Medium Custom';">Unsolicited pornography</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Custom';"><span style="color: #005f71;"><span style="color: #353535;"><span style="color: #005f71;"><span style="color: #353535;">Unwanted pornography is one of the most common and harmful types of cyberbullying that women are facing. In these cases, offenders send random and unsolicited emails or text containing sexual photographs or videos, infamously <span style="color: #005f71;">referred to as dick pics</span>. According to statistics, <span style="color: #005f71;">90 percent of the time</span>, women obtain such images from men without their consent. The victims claim that this was a traumatic experience for them. Unwanted pornography on the internet is frequently dismissed, yet specialists believe it is closely linked to the same offline behavior known as <span style="color: #005f71;">exhibitionism.</span></span></span></span></span></span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="color: #e18431; font-family: 'GT Walsheim Pro Medium Custom';">Slut-shaming</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Custom';">Criticizing people online, most often women and girls, who are thought to break sexuality-related expectations of behavior and appearance e.g. breaking the dress code by clothing in ways that are viewed as sexually provocative; requesting access to birth control; premarital, adulterous, casual, or indiscriminate sex or prostitution are examples of <span style="color: #005f71;">slut-shaming</span>. Unfortunately, slut-shaming often includes accusations of victims of rape or other forms of sexual violence.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="color: #e18431; font-family: 'GT Walsheim Pro Medium Custom';">Cyberviolence by former/current partners</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Custom';">This form of cyberbullying includes the following acts: </span></p>
<ul style="line-height: 1.5;">
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Oblique Custom';">Using technology to monitor and regulate the partner's behavior and actions</span></li>
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Oblique Custom';">Using the partner's password to gain access to his or her email or social media accounts without permission</span></li>
<li style="text-align: justify;"><span style="color: #353535; font-family: 'GT Walsheim Pro Regular Oblique Custom';">Installing tracking devices or software to spy on the partner's location, or using digital media to inflict emotional violence and verbal threats during or after the relationship has ended</span></li>
</ul>
<p> </p>
<p><span style="color: #005f71; font-family: 'GT Walsheim Pro Medium Custom';">Why is cyberviolence against women becoming more common?</span></p>
<p style="text-align: justify;">It is simple to remain anonymous on the Internet, which is one of the most important prerequisites for committing crimes; it is much easier for perpetrators to go unpunished in the digital world. Constantly expanding technologies and their widespread availability also contribute to the rise in incidents; a person can be viewed or tracked by another person even if they have little or no technical skills. Photos, slander, rumors, and other misogynistic content are extremely inexpensive and easy to distribute. The ability to communicate with anyone on the globe broadens the range of potential victims while decreasing the possibility of criminals being identified and punished.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #005f71; font-family: GT Walsheim Pro Medium Custom;">The impacts of cyberviolence on the victims</span></p>
<p style="text-align: justify;">According to studies, victims of cyberviolence experience emotional distress, depression symptoms, low self-esteem, and higher levels of social anxiety than those who have not encountered it. Sadly, suicide is a common outcome for women who have been subjected to cyber violence and shaming. Whatever content a person publishes on the Internet becomes a permanent part of his online and, in certain situations, offline identity. Cyberbullying may have a severe effect on victims' emotional and physical health, as well as their social and personal relationships. Even after recovery, the memories and traumas of what happened in many cases last for a lifetime.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="color: #005f71;">Prevention <span style="color: #353535;">is crucial, and it can only be accomplished by raising awareness from a young age. As a result, Zonta Bulgaria's project involves a large-scale public awareness campaign, as well as a series of educational sessions for students, teachers, employees of businesses and non-governmental organizations, and parents.</span></span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>]]></description>
                <author><![CDATA[bistra_zonta@abv.bg (Бистра Илиева)]]></author>
                <guid>https://www.zontabulgaria.com/en/news/cyberviolence-useful-information/kibernasilieto-nad-zhenite-pandemiyata-za-koyato-ne-govorim</guid>
                <pubDate>Tue, 22 Feb 2022 11:21:43 +0000</pubDate>
                <category><![CDATA[Полезна информация]]></category>
                                    <enclosure url="https://static.super.website/fs/super-website/userFiles/zontabulgaria/images/a-17-woman-cyberviolence.jpg" length="831750" type="image/png" />
                                                    <dc:description><![CDATA[Not only has the COVID-19 pandemic increased domestic violence, but it has also increased virtual violence. Women&#039;s cyberbullying is on the rise, and it comes in a variety of forms. The consequences for the victims are severe and prevention is critical.]]></dc:description>
                            </item>
                    <item>
                <title><![CDATA[5 expert advice for staying safe on the internet]]></title>
                <link>https://www.zontabulgaria.com/en/news/cyberviolence-useful-information/kak-da-se-zashtitim-v-internet</link>
                <description><![CDATA[<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Malware is constantly infiltrating users' computers. Modern viruses are meant to be difficult to detect and remove, with the primary goal of stealing users' personal information secretly and permanently. Passwords, documents, photographs, and personal discussions in various communication channels, social networks, and other sources are among the collected information. This makes personal information easily accessible to thieves, who can subsequently sell it on the "Black market" at incredibly low prices to anyone who can use it to harm others in the future.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Start by choosing a good email</span></p>
<p style="text-align: justify; line-height: 1.5;">Spam is one of the most significant problems in the digital world, which is why choosing the appropriate email is so important for minimizing the problems it causes and avoiding the risk of being scammed or infecting your operating system. <span style="color: #005f71;">Gmail </span>(Google Inc.), <span style="color: #005f71;">Yahoo! Mail</span> (Yahoo! Inc.), and <span style="color: #005f71;">Windows Live Hotmail</span> (Developer: Microsoft Corp.) are some of the most popular options in this market.</p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Be wary of emails from unknown senders</span></p>
<p style="text-align: justify;">Emails from unknown senders should be treated with caution. Users often receive them in their email, and frequently, they include an attachment that, if downloaded and run, can infect the entire system. Never open a mail from an unknown sender. When working with e-mail attachments, proceed with caution and pay special attention to files ending in<span style="color: #005f71;"> .exe, .com, .bat, or .pif.</span></p>
<p style="text-align: justify;"><span style="color: #005f71;">VirusTotal </span>can prove useful when checking for suspicious files and links. This is a web-based system that sends a file or link to over 40 antivirus companies, which scan it for harmful code and return the results in a convenient format within minutes.</p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Be careful while surfing the web</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Malware can traditionally be found on websites that provide unlicensed software and those that extract pornographic material. However, this does not imply that they are the only such sources, or that a formerly clean website has not since become "black". While searching for information on Google, you are extremely likely to stumble across similar pages.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Some of the most popular site inspection programs are <span style="color: #005f71;">Web of Trust</span> (WOT), <span style="color: #005f71;">SiteAdvisor Software</span> (Developer: McAfee Inc.), and <span style="color: #005f71;">Norton Safe Web</span> (Developer: Symantec Corp.). You can use them to personally inspect any selected website and obtain reliable information about it in seconds, which will help you determine whether or not to trust it. WOT and SiteAdvisor both feature browser-specific solutions, which is a benefit. For example, there is a Firefox add-on which indicates whether a site is secure or not while browsing on Google.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Don't neglect Windows updates</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Many users make this mistake which often leads to problems at some point. Microsoft generates and delivers monthly updates that are available to users, but they frequently ignore them. Fixes for the operating system's vulnerability, as well as improvements to Windows and program performance, are included in the upgrades. The user can pick which updates to install and which not to, but the operating system's security must be downloaded and installed at any cost. It is critical to have the most recent service pack and updates in order to be as secure as possible.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Regularly update the software you use.</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Few people are aware that the software they use, particularly Adobe Reader and the Java Runtime Environment, also have their weaknesses. Because they are so frequently utilized, they become a natural target for hackers. Other programs are also targeted, including web browsers (such as<span style="color: #005f71;"> Internet Explorer </span>and <span style="color: #005f71;">Mozilla Firefox</span>), instant messaging software (such as <span style="color: #005f71;">Skype</span>), and other apps. You can never be too careful, so make sure to check for and update any programs you use on a regular basis. This is just as vital as keeping your operating system up to date.</span></p>]]></description>
                <author><![CDATA[bistra_zonta@abv.bg (Бистра Илиева)]]></author>
                <guid>https://www.zontabulgaria.com/en/news/cyberviolence-useful-information/kak-da-se-zashtitim-v-internet</guid>
                <pubDate>Fri, 04 Feb 2022 14:49:36 +0000</pubDate>
                <category><![CDATA[Полезна информация]]></category>
                                    <enclosure url="https://static.super.website/fs/super-website/userFiles/zontabulgaria/images/a-16-secure-account.png" length="1393558" type="image/png" />
                                                    <dc:description><![CDATA[Useful tips for dealing with attackers on the Internet. In order to avoid them it is critical to be aware of the hazards of the digital world in the first place.]]></dc:description>
                            </item>
                    <item>
                <title><![CDATA[Keeping children safe on the internet - tips for parents]]></title>
                <link>https://www.zontabulgaria.com/en/news/cyberviolence-useful-information/sigurnost-v-internet-suveti-za-roditeli</link>
                <description><![CDATA[<p style="text-align: justify;">The increased interest in the Internet among the younger generation seeking personal and social fulfillment in the information age can undoubtedly be explained. However, it is critical to remain cautious since there are risks - many children and teenagers are unaware of the dangers of using the Internet being captivated by entertainment, particularly in chat rooms.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Everyday life, however, provides examples of many forms of cyberviolence. Unfortunately, criminal users obtain no less access to the network than others. They expertly exploit the Internet for criminal purposes such as sexual assault, fraud, and human trafficking against children and teenagers, relying on their juvenile naivety and lack of knowledge about potential threats.</p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Raising awareness of this alarming trend among both children and parents is one of the most important objectives of Zonta Bulgaria's project <span style="color: #005f71;">"NO to cyberviolence against women and children".</span> This includes following the basic guidelines for accessing the Internet and discussing them with family members on a regular basis.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Experts provide some recommendations to parents on how to protect their children and themselves from cyberviolence.</span></p>
<p style="text-align: justify; line-height: 1.5;"><br><span style="color: #e18431; font-family: 'GT Walsheim Pro Medium Custom';">Introduce the Internet's dangers to your children</span></p>
<p style="text-align: justify;">Remind them that you should never trust someone you meet online, whether in a chat room or elsewhere. Demonstrate to them how some people tend to impersonate others (adults with bad intentions pretend to be children).</p>
<p style="text-align: justify;">Dating sites are particularly hazardous! They're one of the most popular tools for pedophiles on the hunt for youngsters. Limit your kids' access to them and make sure they're aware of the dangers.</p>
<p style="text-align: justify;">Teach your children to be cautious!</p>
<p style="text-align: justify; line-height: 1.5;"><br><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Use the internet as a family</span></span></p>
<p style="text-align: justify; line-height: 1.5;">Always be interested in what your children are doing online and who they are interacting with. Discuss the websites they visit with them; the people they communicate with via email, chat rooms, games, or social media (Facebook, Instagram, Tiktok, Snapchat, and so on); and be engaged in the games they play.</p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Limit the access</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Limit the amount of time your children will be allowed to access the Internet and arrange it to align with when you will be at home.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Make it clear that meetings with strangers are prohibited, and explain why</span></p>
<p style="text-align: justify; line-height: 1.5;">Allowing your children to attend gatherings/meetings organized by someone they met on the internet is never a good idea. If the presence at such a meeting is required, make sure you accompany them.</p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Keep a close eye on things</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">If you come across content or messages on the internet that offends, shocks, or upsets you or anybody else - leave the page/conversation and report it to the authorities. They will be able to take the required actions to stop all criminal conduct in this manner.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Protect your data and information</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Make your password as tough to guess as possible when creating it. Never use personal information such as names, phone numbers, nicknames, dates of birth, PIN codes, social security numbers and etc. Use various usernames and passwords for different programs and sites to protect your other accounts if a password gets compromised. If the system you're entering into allows it it's always a good idea to mix uppercase and lowercase letters, as well as add numbers and characters when generating a password <span style="font-family: 'GT Walsheim Pro Regular Custom';">(e.g., /?! # @ $ percentage &amp; * - +; "; etc.). Always</span> use a password that is distinct from your username.</span></p>
<p style="text-align: justify; line-height: 1.5;"> </p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Medium Custom'; color: #e18431;">Filter information</span></p>
<p style="text-align: justify; line-height: 1.5;"><span style="font-family: 'GT Walsheim Pro Regular Custom';">Installing software that filters information so that it is appropriate for children and teenagers is a good idea. These are available in both Google Play for Android devices and the App Store for iOS devices. Google Family Link, ESET Parental Control, Parental Control Kroha, Parental Control App Kidslox and etc. are examples of such tools.</span></p>]]></description>
                <author><![CDATA[bistra_zonta@abv.bg (Бистра Илиева)]]></author>
                <guid>https://www.zontabulgaria.com/en/news/cyberviolence-useful-information/sigurnost-v-internet-suveti-za-roditeli</guid>
                <pubDate>Fri, 04 Feb 2022 14:17:36 +0000</pubDate>
                <category><![CDATA[Полезна информация]]></category>
                                    <enclosure url="https://static.super.website/fs/super-website/userFiles/zontabulgaria/images/a-13-parent-child-internet.png" length="881781" type="image/png" />
                                                    <dc:description><![CDATA[Parents must teach their children how to use Internet safely and to be aware of cyberviolence. Learn more about the Zonta Bulgaria&#039;s project &quot;NO to cyberviolence against women and children&quot;.]]></dc:description>
                            </item>
            </channel>
</rss>
