Internet Safety Presentation for Parents

  • 3,046 views
Uploaded on

Learn about the top issues in online safety. I have several great tips for regaining control over tech in your home. Free Norton tools too!

Learn about the top issues in online safety. I have several great tips for regaining control over tech in your home. Free Norton tools too!

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
3,046
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
90
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • From Gawker hack; 13 most common passwords used (of millions of accounts): 123456Password 12345678Lifehack Qwertyabc123111111MonkeyConsumer123450LetmeinTrustno1Most common Iphone passwords: 0000, 1234, 2580 (straight shot down keypad)Most important two passwords are your email and social network? Because with email I can hit “forgotmy password” at almost any account and get the code to reset yours. With your social network I can spread a scam to all your friends and make money or spread malware. Or just embarrass you by using your account and posting silly or embarassing stuff. Sharing – lots of girls will test their friendships by saying you’re not “BFF” until you share a FB password. Or boyfriend/girlfriends will post for each other or share an account, then whenthey break up it’s a disaster.
  • So what about the dumb stuff we do to hurt ourselves online? Those are things that can damage our online reputation and privacy.

Transcript

  • 1. Parent Presentation Marian Merritt, Norton Internet Safety Advocate
  • 2. Today’s Digital Native (born in 1990’s or later)• Our children have never stood up to change a TV channel• Internet always existed• They don’t go “online”; they are always connected• Definitions of privacy getting tweaked• They expect devices to just turn on, connect and work• They are more collaborative, get help from social networks, not just a web search or in a book• By age 21, will have sent an average of 250,000 emails, instant messages and texts• By age 21, more than 10,000 hours on their cell phone• By age 21, more than 14,500 hours online, mostly in social networks
  • 3. Tonight’s discussion• Typical top concerns among parents• Parental controls• Social networks• Cell phones• Viruses and Malware• Cyberbullying and more
  • 4. • Currently over 750 million users on Facebook• Consumer Reports estimates 7.5 million U.S. users on Facebook are under 13 years old• Norton study found 77% of households around the world use household internet rules• 32% of households use parental controls
  • 5. Typical parental concerns• How to limit video sites• Should I report cyber bullying to the school?• What parental control software do I recommend?• Can I stop my child using mobile devices to browse or at night?• Using filters, especially on mobile devices• Blocking purchases of apps• Keeping kids off of inappropriate sites or searching for things they shouldn’t• Social drama created because so many kids <13 are on social networks
  • 6. User Accounts• Easiest way to limit what kids do; and prevent malware getting on computer – Create standard (limited) accounts for you and your kids to use •If you want to track what your kids do, create one account for each child – Administrator account for when you need to do maintenance or add or remove software, hardware, etc.
  • 7. Blocking or Filtering YouTube videos •Create account and login •Bottom of screen you see option for Safety to be set “ON” or “OFF”
  • 8. Another way to monitor/block– use parental controlssuch as Norton Online Family (seen here) Screenshot from Norton Online Family
  • 9. Cell phone smarts for younger children• Get limited phones: no apps, no web, to start• Talk with your child about safe cell use• Set a password on phone - can stop “Munching” – when an image or message is sent out via BBM to wide group (cyberbullying ) and stop kids looking at private messages or photos• Charge phone in the kitchen or other public room at night – Keeps kids from texting late at night; They get more sleep• Use time limits to stop calls and texting after hours (via cell provider site)• There are mean, inappropriate apps and games. Monitor what is installed and uninstalled.
  • 10. (Image courtesy of IkeepSafe.org)
  • 11. Can you block devices after hours?• Computers – yes, with parental controls or at router• Mobile devices: – Music players with web access – Smart phones – Tablets – Gaming systems• At the router level you can block and filter web• Some parents just turn off the house router at night and/or take it into their bedroom
  • 12. Everything can be more secure and more private• Social networks – you can limit account access, require more secure pages, limit who can see your page, your posts and photos. – Visit your account security and privacy settings to learn more• Don’t share your user name and password with others• Logout from computers when you are done• Protect mobile devices with passwords• Protect laptops and mobile devices with anti-theft software – Track their location – Wipe the data – Help police with photos and location info
  • 13. Passwords• Unique, complex, try a code that can be customized – “I Went to Spain in 2010” > Iw2Si10 – For Amazon, add an “a” and an “n”> aiw2Si10n – For ESPN, add an “e” and an “n”>eiw2Si10n• Not a dictionary word or name• Not a phrase• Nothing a good friend might guess (like an address, pet’s name, birthday, nickname)• Most important passwords are for email and social network• NEVER SHARE A PASSWORD! Not with a spouse, partner, roommate, BFF, or from one website to another. 13
  • 14. Online Reputation and Privacy 14
  • 15. Other Private information• Social network posts – Reveal location, – Travel plans, – Just embarrassing• More common, posting information about ourselves we later regret – “Bored at work” – girl posted while at a UK job and was later fired – Posting photos of underage drinking – lost college scholarships; school teacher lost job;
  • 16. Reputation and Privacy Risks• “Digital Reputation” - everything you put on the internet is permanent• It can be difficult to maintain control over even your own content 16
  • 17. Real story of Alison Chang of Dallas, TX http://www.nytimes.com/2007/10/01/techno logy/01link.htmlPhoto taken at church BBQ Posted to Ends up on Australian bus ad
  • 18. Real story of Smith family of St. Louis, MO They take a lovely Christmas card That turns up as a Czech grocery photo ad! http://www.npr.org/templates/story/story.ph p?storyId=105318456 18
  • 19. Using Social Networks appropriately Privacy settings’ use• Use privacy settings and safety settings is higher than• Use unique password and don’t share it ever!• Log out when you are done – “frape” – term used to describe having your Facebook hacked by a friend• 1 in 10 social network accounts is hacked (Norton study)• Users can temporarily de-activate their account• FBParents.org has a free guide to using Facebook safely
  • 20. Pew study of Facebook Users and Privacy Settingshttp://www.pewinternet.org/~/media/Files/Reports/2012/PIP_Privacy_management_on_social_media_sites_022412.pdf
  • 21. Pew Study: Teens versus Adults
  • 22. Helping Kids Use Email Safely
  • 23. Email Issues• Training wheels first (parents should review emails for trouble)• Filter/block spam and unwanted senders• Spam• Viruses/Malware• Dangerous links/scams• Kids being mean to each other
  • 24. What is Spam?•Unwanted emails•Up to 80% of the world’s email is spam•Some is dangerous: •Chain letters with virus or mail hoaxes •links to websites with malware •attachments that have viruses in them •Phishing emails – offers that are dangerous or fake
  • 25. Spam examples
  • 26. Avoiding Spam and Staying Safe• Never click unknown links or reply to these emails• Check sender’s email or web address. Look at the part that is “.com” or “.gov”. Whatever is just to the left is the website.• i.e. onlinefamily.norton.com = a norton website• Never respond to “urgent” or “emergency” emails• Never give out your private information like passwords, account number, social security numbers, etc.• Just because it looks legit, or has the right logos doesn’t mean it is• When in doubt, visit the website and login as normal to see if your account needs attention
  • 27. Avoiding Viruses and Malware
  • 28. ⅔ OF ADULTSGLOBALLY HAVE BEENVICTIMS OF CYBERCRIMEOnly 1 in 10 people feel “very safe” online 28
  • 29. Old school view of a virus writer as harmless nerd and a virus as more annoyance than threat 29
  • 30. How Do Computers Get Infected• Dangerous downloads• Clicking on ads, links• Visiting infected websites• Buying into “security” alerts & scare tactics by unknown companies 30
  • 31. How Do Computers Get Infected• Peer-to-peer file sharing networks• Through “holes” left by web browser vulnerabilities• Poisoned search results 31
  • 32. Spotting Virus or Malware Infection• Your computer might run more slowly or have trouble starting• Some programs might not start, especially your security software• You might see flickering hard drive light when you aren’t using computer• When you look at your computer’s list of programs you might spot odd listings• OFTEN YOU CAN’T EVEN TELL!!!• Best bet: run security software at all times, regularly scan the computer and let your parents know if something weird happens when you are online.
  • 33. YOU, YOUR FRIENDS ANDCYBERBULLYING. 33
  • 34. Cyberbullying is serious and mean• Electronic harassment, teasing, cruelty, usually Megan repetitive Meier• Email, digital phones, cell phones, instant messaging, Phoebe Prince and texting• Only 10% of kids report• Many who report to Tyler school staff say it made Clementi matters worse 34
  • 35. Tips for Dealing with CyberbullyingTalk about it Set rules Don’t reply, Don’t letbefore and Keep copies bystander offit happens consequences the hookMost kids don’t cyberbully!• Work together as a community• If you see cyberbullying, don’t be a silent bystander. Do something!• Involve the school, (law enforcement if necessary)• Don’t dismiss threats of violence or self-harm: report!• Teach kids coping mechanisms when there’s “drama”. 35
  • 36. Cyber bullying Resources• From the US Government: stopbullying.gov• From top researchers: cyberbullying.us• ADL has CyberAlly: a whole school education program• CommonSenseMedia.org• IkeepSafe.org• Review your school’s bullying policy (include cyber bullying)
  • 37. Review and Wrapping up• Key parent issues• Video site management• User Accounts• Using Phones, Email, Social Networks• Passwords• Privacy and reputation issues• Spam and Malware• Cyber bullying
  • 38. Free Resources from Norton •Family Online Safety Guide, in English and Spanish – email me at marian@norton.com for free copies •Norton Online Family – parental control software for PC, Mac and Android www.onlinefamily.norton.com