Parent Presentation                                      Marian Merritt,                      Norton Internet Safety Advoc...
Today’s Digital Native (born in 1990’s or later)• Our children have never stood up to change a TV channel• Internet always...
Tonight’s discussion• Typical top concerns among parents• Parental controls• Social networks• Cell phones• Viruses and Mal...
• Currently over 750 million users on Facebook• Consumer Reports estimates 7.5 million U.S. users on Facebook  are under 1...
Typical parental concerns• How to limit video sites• Should I report cyber bullying to the school?• What parental control ...
User Accounts• Easiest way to limit what kids do; and prevent  malware getting on computer – Create standard (limited) acc...
Blocking or Filtering YouTube videos •Create account and login  •Bottom of screen you see option for Safety to be set “ON”...
Another way to monitor/block– use parental controlssuch as Norton Online Family (seen here)                     Screenshot...
Cell phone smarts for younger children• Get limited phones: no apps, no web, to start• Talk with your child about safe cel...
(Image courtesy of IkeepSafe.org)
Can you block devices after hours?• Computers – yes, with parental controls or at router• Mobile devices:  – Music players...
Everything can be more secure and more private• Social networks – you can limit account access, require more  secure pages...
Passwords• Unique, complex, try a code that can be customized  – “I Went to Spain in 2010” > Iw2Si10  – For Amazon, add an...
Online Reputation and Privacy                                14
Other Private information• Social network posts  – Reveal location,  – Travel plans,  – Just embarrassing• More common, po...
Reputation and Privacy Risks•   “Digital Reputation” -    everything you put on the    internet is permanent•   It can be ...
Real story of Alison Chang of Dallas, TX                            http://www.nytimes.com/2007/10/01/techno              ...
Real story of Smith family of St. Louis, MO They take a lovely Christmas card        That turns up as a Czech grocery phot...
Using Social Networks appropriately                           Privacy                                                     ...
Pew study of Facebook Users and Privacy Settingshttp://www.pewinternet.org/~/media/Files/Reports/2012/PIP_Privacy_manageme...
Pew Study: Teens versus Adults
Helping Kids Use Email Safely
Email Issues• Training wheels first (parents should review emails for trouble)• Filter/block spam and unwanted senders• Sp...
What is Spam?•Unwanted emails•Up to 80% of the world’s email is spam•Some is dangerous:   •Chain letters with virus or mai...
Spam examples
Avoiding Spam and Staying Safe• Never click unknown links or reply to these emails• Check sender’s email or web address. L...
Avoiding Viruses and Malware
⅔ OF ADULTSGLOBALLY HAVE BEENVICTIMS OF CYBERCRIMEOnly 1 in 10 people feel “very safe” online                             ...
Old school view of a virus writer as harmless nerd   and a virus as more annoyance than threat                            ...
How Do Computers Get Infected•   Dangerous downloads•   Clicking on ads, links•   Visiting infected websites•   Buying int...
How Do Computers Get Infected•   Peer-to-peer file sharing networks•  Through “holes” left by web browser   vulnerabilitie...
Spotting Virus or Malware Infection• Your computer might run more slowly or have trouble starting• Some programs might not...
YOU, YOUR FRIENDS ANDCYBERBULLYING.                        33
Cyberbullying is serious and mean•   Electronic harassment,    teasing, cruelty, usually                                  ...
Tips for Dealing with CyberbullyingTalk about it   Set rules          Don’t reply,     Don’t letbefore          and       ...
Cyber bullying Resources• From the US Government: stopbullying.gov• From top researchers: cyberbullying.us• ADL has CyberA...
Review and Wrapping up• Key parent issues• Video site management• User Accounts• Using Phones, Email, Social Networks• Pas...
Free Resources from Norton   •Family Online Safety Guide, in English and Spanish –   email me at marian@norton.com for fre...
Upcoming SlideShare
Loading in...5
×

Internet Safety Presentation for Parents

3,543

Published on

Learn about the top issues in online safety. I have several great tips for regaining control over tech in your home. Free Norton tools too!

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
3,543
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
124
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • From Gawker hack; 13 most common passwords used (of millions of accounts): 123456Password 12345678Lifehack Qwertyabc123111111MonkeyConsumer123450LetmeinTrustno1Most common Iphone passwords: 0000, 1234, 2580 (straight shot down keypad)Most important two passwords are your email and social network? Because with email I can hit “forgotmy password” at almost any account and get the code to reset yours. With your social network I can spread a scam to all your friends and make money or spread malware. Or just embarrass you by using your account and posting silly or embarassing stuff. Sharing – lots of girls will test their friendships by saying you’re not “BFF” until you share a FB password. Or boyfriend/girlfriends will post for each other or share an account, then whenthey break up it’s a disaster.
  • So what about the dumb stuff we do to hurt ourselves online? Those are things that can damage our online reputation and privacy.
  • Internet Safety Presentation for Parents

    1. 1. Parent Presentation Marian Merritt, Norton Internet Safety Advocate
    2. 2. Today’s Digital Native (born in 1990’s or later)• Our children have never stood up to change a TV channel• Internet always existed• They don’t go “online”; they are always connected• Definitions of privacy getting tweaked• They expect devices to just turn on, connect and work• They are more collaborative, get help from social networks, not just a web search or in a book• By age 21, will have sent an average of 250,000 emails, instant messages and texts• By age 21, more than 10,000 hours on their cell phone• By age 21, more than 14,500 hours online, mostly in social networks
    3. 3. Tonight’s discussion• Typical top concerns among parents• Parental controls• Social networks• Cell phones• Viruses and Malware• Cyberbullying and more
    4. 4. • Currently over 750 million users on Facebook• Consumer Reports estimates 7.5 million U.S. users on Facebook are under 13 years old• Norton study found 77% of households around the world use household internet rules• 32% of households use parental controls
    5. 5. Typical parental concerns• How to limit video sites• Should I report cyber bullying to the school?• What parental control software do I recommend?• Can I stop my child using mobile devices to browse or at night?• Using filters, especially on mobile devices• Blocking purchases of apps• Keeping kids off of inappropriate sites or searching for things they shouldn’t• Social drama created because so many kids <13 are on social networks
    6. 6. User Accounts• Easiest way to limit what kids do; and prevent malware getting on computer – Create standard (limited) accounts for you and your kids to use •If you want to track what your kids do, create one account for each child – Administrator account for when you need to do maintenance or add or remove software, hardware, etc.
    7. 7. Blocking or Filtering YouTube videos •Create account and login •Bottom of screen you see option for Safety to be set “ON” or “OFF”
    8. 8. Another way to monitor/block– use parental controlssuch as Norton Online Family (seen here) Screenshot from Norton Online Family
    9. 9. Cell phone smarts for younger children• Get limited phones: no apps, no web, to start• Talk with your child about safe cell use• Set a password on phone - can stop “Munching” – when an image or message is sent out via BBM to wide group (cyberbullying ) and stop kids looking at private messages or photos• Charge phone in the kitchen or other public room at night – Keeps kids from texting late at night; They get more sleep• Use time limits to stop calls and texting after hours (via cell provider site)• There are mean, inappropriate apps and games. Monitor what is installed and uninstalled.
    10. 10. (Image courtesy of IkeepSafe.org)
    11. 11. Can you block devices after hours?• Computers – yes, with parental controls or at router• Mobile devices: – Music players with web access – Smart phones – Tablets – Gaming systems• At the router level you can block and filter web• Some parents just turn off the house router at night and/or take it into their bedroom
    12. 12. Everything can be more secure and more private• Social networks – you can limit account access, require more secure pages, limit who can see your page, your posts and photos. – Visit your account security and privacy settings to learn more• Don’t share your user name and password with others• Logout from computers when you are done• Protect mobile devices with passwords• Protect laptops and mobile devices with anti-theft software – Track their location – Wipe the data – Help police with photos and location info
    13. 13. Passwords• Unique, complex, try a code that can be customized – “I Went to Spain in 2010” > Iw2Si10 – For Amazon, add an “a” and an “n”> aiw2Si10n – For ESPN, add an “e” and an “n”>eiw2Si10n• Not a dictionary word or name• Not a phrase• Nothing a good friend might guess (like an address, pet’s name, birthday, nickname)• Most important passwords are for email and social network• NEVER SHARE A PASSWORD! Not with a spouse, partner, roommate, BFF, or from one website to another. 13
    14. 14. Online Reputation and Privacy 14
    15. 15. Other Private information• Social network posts – Reveal location, – Travel plans, – Just embarrassing• More common, posting information about ourselves we later regret – “Bored at work” – girl posted while at a UK job and was later fired – Posting photos of underage drinking – lost college scholarships; school teacher lost job;
    16. 16. Reputation and Privacy Risks• “Digital Reputation” - everything you put on the internet is permanent• It can be difficult to maintain control over even your own content 16
    17. 17. Real story of Alison Chang of Dallas, TX http://www.nytimes.com/2007/10/01/techno logy/01link.htmlPhoto taken at church BBQ Posted to Ends up on Australian bus ad
    18. 18. Real story of Smith family of St. Louis, MO They take a lovely Christmas card That turns up as a Czech grocery photo ad! http://www.npr.org/templates/story/story.ph p?storyId=105318456 18
    19. 19. Using Social Networks appropriately Privacy settings’ use• Use privacy settings and safety settings is higher than• Use unique password and don’t share it ever!• Log out when you are done – “frape” – term used to describe having your Facebook hacked by a friend• 1 in 10 social network accounts is hacked (Norton study)• Users can temporarily de-activate their account• FBParents.org has a free guide to using Facebook safely
    20. 20. Pew study of Facebook Users and Privacy Settingshttp://www.pewinternet.org/~/media/Files/Reports/2012/PIP_Privacy_management_on_social_media_sites_022412.pdf
    21. 21. Pew Study: Teens versus Adults
    22. 22. Helping Kids Use Email Safely
    23. 23. Email Issues• Training wheels first (parents should review emails for trouble)• Filter/block spam and unwanted senders• Spam• Viruses/Malware• Dangerous links/scams• Kids being mean to each other
    24. 24. What is Spam?•Unwanted emails•Up to 80% of the world’s email is spam•Some is dangerous: •Chain letters with virus or mail hoaxes •links to websites with malware •attachments that have viruses in them •Phishing emails – offers that are dangerous or fake
    25. 25. Spam examples
    26. 26. Avoiding Spam and Staying Safe• Never click unknown links or reply to these emails• Check sender’s email or web address. Look at the part that is “.com” or “.gov”. Whatever is just to the left is the website.• i.e. onlinefamily.norton.com = a norton website• Never respond to “urgent” or “emergency” emails• Never give out your private information like passwords, account number, social security numbers, etc.• Just because it looks legit, or has the right logos doesn’t mean it is• When in doubt, visit the website and login as normal to see if your account needs attention
    27. 27. Avoiding Viruses and Malware
    28. 28. ⅔ OF ADULTSGLOBALLY HAVE BEENVICTIMS OF CYBERCRIMEOnly 1 in 10 people feel “very safe” online 28
    29. 29. Old school view of a virus writer as harmless nerd and a virus as more annoyance than threat 29
    30. 30. How Do Computers Get Infected• Dangerous downloads• Clicking on ads, links• Visiting infected websites• Buying into “security” alerts & scare tactics by unknown companies 30
    31. 31. How Do Computers Get Infected• Peer-to-peer file sharing networks• Through “holes” left by web browser vulnerabilities• Poisoned search results 31
    32. 32. Spotting Virus or Malware Infection• Your computer might run more slowly or have trouble starting• Some programs might not start, especially your security software• You might see flickering hard drive light when you aren’t using computer• When you look at your computer’s list of programs you might spot odd listings• OFTEN YOU CAN’T EVEN TELL!!!• Best bet: run security software at all times, regularly scan the computer and let your parents know if something weird happens when you are online.
    33. 33. YOU, YOUR FRIENDS ANDCYBERBULLYING. 33
    34. 34. Cyberbullying is serious and mean• Electronic harassment, teasing, cruelty, usually Megan repetitive Meier• Email, digital phones, cell phones, instant messaging, Phoebe Prince and texting• Only 10% of kids report• Many who report to Tyler school staff say it made Clementi matters worse 34
    35. 35. Tips for Dealing with CyberbullyingTalk about it Set rules Don’t reply, Don’t letbefore and Keep copies bystander offit happens consequences the hookMost kids don’t cyberbully!• Work together as a community• If you see cyberbullying, don’t be a silent bystander. Do something!• Involve the school, (law enforcement if necessary)• Don’t dismiss threats of violence or self-harm: report!• Teach kids coping mechanisms when there’s “drama”. 35
    36. 36. Cyber bullying Resources• From the US Government: stopbullying.gov• From top researchers: cyberbullying.us• ADL has CyberAlly: a whole school education program• CommonSenseMedia.org• IkeepSafe.org• Review your school’s bullying policy (include cyber bullying)
    37. 37. Review and Wrapping up• Key parent issues• Video site management• User Accounts• Using Phones, Email, Social Networks• Passwords• Privacy and reputation issues• Spam and Malware• Cyber bullying
    38. 38. Free Resources from Norton •Family Online Safety Guide, in English and Spanish – email me at marian@norton.com for free copies •Norton Online Family – parental control software for PC, Mac and Android www.onlinefamily.norton.com
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×