Backpack Facts: What’s All the Flap About?

Across the country, backpack events educate parents, students, educators and school administrators, and communities about the serious health effects that backpacks that are too heavy or worn improperly have on children.

child-walking-school-shutterstock_152792399

  • More than 79 million students in the United States carry school backpacks.1 • More than 2,000 backpack-related injuries were treated at hospital emergency rooms, doctor’s offices, and clinics in 2007.
  •  It is recommended that a loaded backpack should never weigh more than 10% of the student’s total body weight (for a student weighing 100 pounds, this means that the backpack should weigh no more than 10 pounds).
  • About 55% of students carry a backpack that is heavier than the recommended guideline of 10% of the student’s total body weight.
  • In one study with American students ages 11 to 15 years, 64% reported back pain related to heavy backpacks. Twenty-one percent reported the pain lasting more than 6 months.
  • In a study on the effect of backpack education on student behavior and health, nearly 8 out of 10 middle school students who changed how they loaded and wore their backpacks reported less pain and strain in their backs, necks, and shoulders.
  • According to a study by Boston University, approximately 85% of university students self-report a discomfort and pain associated with backpack usage.
  • The way backpacks are worn affects your health. The height of the backpack should extend from approximately 2 inches below the shoulder blades to waist level or slightly above the waist. It is recommended that individuals always wear the backpack on both shoulders so the weight is evenly distributed.

The above is an excerpt from the article,’Backpack Facts: What’s All the Flap About?”  For more information please visit, www.aota.org.

Tips for Purchasing a Backpack

purchase-backpack

Think the books and school supplies that your child is carrying in a backpack slung haphazardly across one shoulder are harmless? Think again. Heavy loads carried by more than 79 million students across the U.S. can cause low back pain that often lasts through adulthood. According to the U.S. Consumer Product Safety Commission, in 2010 nearly 28,000 strains, sprains, dislocations, and fractures from backpacks were treated in hospital emergency rooms, physicians’ offices, and clinics.

“A child wearing a backpack incorrectly or that is too heavy can be contributing risk factors for discomfort, fatigue, muscle soreness, and musculoskeletal pain especially in the lower back,” says Karen Jacobs, EdD, OTR/L, CPE, clinical professor of occupational therapy at Boston University, and an expert on school ergonomics and healthy growth and development of school-age children.

The American Occupational Therapy Association (AOTA) urges parents and caregivers to consider the following when selecting a backpack this school year:

  • Appropriate size. Make sure the height of the backpack extends from approximately 2 inches below the shoulder blades to waist level, or slightly above the waist.
  • Shoulders. Backpacks should have well-padded shoulder straps that can be worn on both shoulders so when packed with books, the weight can be evenly balanced by the student.
  • Hip belt. Backpacks with a hip or chest belt take some strain off sensitive neck and shoulder muscles and improve the student’s balance.
  • Fit. Just as your child will try on clothes and shoes when back-to-school shopping, experts say it is important to try on backpacks, too. “The right fit should be your top criteria when selecting your child’s backpack,” says Jacobs. “If you order online, be sure that the seller has a return policy just in case the backpack is not quite the best fit for your child and needs to be exchanged.”

When school is back in session, check that the child’s backpack weighs no more than 10% of his or her body weight. If it weighs more, determine what supplies can stay at home or at school each day to lessen the load. If the backpack is still too heavy for the child, consider a book bag on wheels.

CLICK HERE FOR INFOGRAPHIC


The above is an excerpt from the article,”Tips for Purchasing a Backpack.”  For more information please visit, www.aota.org.

8 Cyber Security Action Items for Mobile Devices

mobilesecurefbthinkstockphotos522791918A few simple steps can to help ensure company information is protected. These include requiring all mobile devices that connect to the business network be equipped with security software and password protection; and providing general security training to make employees aware of the importance of security practices for mobile devices. More specific practices are detailed below.

  1. Use security software on all smartphonesSecurity software specifically designed for smartphones can stop hackers and prevent cyber criminals from stealing your information or spying on you when you use public networks. It can detect and remove viruses and other mobile threats before they cause you problems. It can also eliminate annoying text and multimedia spam messages
  2. Make sure all software is up to dateMobile devices must be treated like personal computers in that all software on the devices should be kept current, especially the security software. This will protect devices from new variants of malware and viruses that threaten your company’s critical information.
  3. . Encrypt the data on mobile devicesBusiness and personal information stored on mobile devices is often sensitive. Encrypting this data is another must. If a device is lost and the SIM card stolen, the thief will not be able to access the data if the proper encryption technology is loaded on the device.
  4. Have users password protect access to mobile devicesIn addition to encryption and security updates, it is important to use strong passwords to protect data stored on mobile devices. This will go a long way toward keeping a thief from accessing sensitive data if the device is lost or hacked.
  5. Urge users to be aware of their surroundings Whether entering passwords or viewing sensitive or confidential data, users should be cautious of who might be looking over their shoulder.
  6. Employ these strategies for email, texting and social networkingAvoid opening unexpected text messages from unknown senders

    – As with email, attackers can use text messages to spread malware, phishing scams and other threats among mobile device users. The same caution should be applied to opening unsolicited text messages that users have become accustomed to with email.Don’t be lured in by spammers and phishers – To shield business networks from cyber criminals, small businesses should deploy appropriate email security solutions, including spam prevention, which protect a company’s reputation and manage risks.

    Click with caution – Just like on stationary PCs, social networking on mobile devices and laptops should be conducted with care and caution. Users should not open unidentified links, chat with unknown people or visit unfamiliar sites. It doesn’t take much for a user to be tricked into compromising a device and the information on it.

  7. Set reporting procedures for lost or stolen equipmentIn the case of a loss or theft, employees and management should all know what to do next. Processes to deactivate the device and protect its information from intrusion should be in place. Products are also available for the automation of such processes, allowing small businesses to breathe easier after such incidents.
  8. Ensure all devices are wiped clean prior to disposalMost mobile devices have a reset function that allows all data to be wiped. SIM cards should also be removed and destroyed.

The above excerpt is from the “Cyber Security Planning Guide,” published by www.fcc.gov.

Top Threats Targeting Mobile Devices

target-mobile-ThinkstockPhotos-587799260-[Converted].jpgIf your company uses mobile devices to conduct company business, such as accessing company email or sensitive data, pay close attention to mobile security and the potential threats that can expose and compromise your overall business networks. This section describes the mobile threat environment and the practices that small businesses can use to help secure devices such as smartphones, tablets and Wi-Fi enabled laptops.

Many organizations are finding that employees are most productive when using mobile devices, and the benefits are too great to ignore. But while mobility can increase workplace productivity, allowing employees to bring their own mobile devices into the enterprise can create significant security and management challenges.

Data loss and data breaches caused by lost or stolen phones create big challenges, as mobile devices are now used to store confidential business information and access the corporate network. According to a December 2010 Symantec mobile security survey, 68 percent of respondents ranked loss or theft as their top mobile-device security concern, while 56 percent said mobile malware is their number two concern. It is important to remember that while the individual employee may be liable for a device, the company is still liable for the data.

Top threats targeting mobile devices

Data Loss – An employee or hacker accesses sensitive information from device or network. This can be unintentional or malicious, and is considered the biggest threat to mobile devices

Social Engineering Attacks – A cyber-criminal attempts to trick users to disclose sensitive information or install malware. Methods include phishing and targeted attacks.

Malware – Malicious software that includes traditional computer viruses, computer worms and Trojan horse programs. Specific examples include the Ikee worm, targeting iOS-based devices; and Pjapps malware that can enroll infected Android devices in a collection of hacker-controlled “zombie” devices known as a “botnet.”

 Data Integrity Threats – Attempts to corrupt or modify data in order to disrupt operations of a business for financial gain. These can also occur unintentionally.

Resource Abuse – Attempts to misuse network, device or identity resources. Examples include sending spam from compromised devices or denial of service attacks using computing resources of compromised devices.

Web and Network-based Attacks – Launched by malicious websites or compromised legitimate sites, these target a device’s browser and attempt to install malware or steal confidential data that flows through it.


The above excerpt is from the “Cyber Security Planning Guide,” published by www.fcc.gov.