Cyber Safety for Middle School Students and Parents

Ben Woelk, CISSP, CPTC
Ben Woelk, CISSP, CPTCSecurity awareness expert | Content strategist | Professor | Introverted leadership mentor, coach | Speaker | Writer
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Social Networks
Social Networking is a social structure made
of individuals who are tied by specific types of
relationships.
• Facebook
• Twitter
• Flickr
• YouTube
• Snapchat
• Instagram
• Pinterest
• Craigslist
Revised from Technological Awareness for Teens and Young Adults,
UNM presentation http://ow.ly/PWvU6
Awareness is
the key
Everyone is a target
Organized crime
funds the
attacks
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Text
Messaging
 Sexting is sending nude pictures via text
message
 50% of teenagers admit to engaging in sexting
http://www.cnn.com/2014/11/18/living/teens-sexting-what-parents-can-do/
 Messages can be forwarded to unintended recipients
 Could be embarrassing if pictures were seen by unintended
parties
 Sexting can be considered child pornography
http://www.nbcwashington.com/news/local/Va-Teen-Could-be-Jailed-for-Sexting-Girlfriend-
265770831.html
Technological Awareness for Teens and Young Adults, UNM presentation
http://ow.ly/PWvU6
Cyber Safety for Middle School Students and Parents
You will not be able to shelter your students
from the Internet and social networking
Focus instead on preparing
them for the dangers they will
face
They can (and will)
defeat every technical
control you put in place
What you already know
Use strong
passwords, aka
passphrases
Length > complexity
TIP
It was a dark and
stormy night
becomes
ItwasaDark215andStormyNight
Keep Your Software (and Hardware
up to date!
TIP
TIP
Use
protection
Recognize
phishing &
scams
TIP
Use social
networks
safely
TIP
Remember
who else
is there
• Employers
• Admissions Offices
• Identity thieves
• Online predators
• 1 in 7 10-17 year olds are approached by an online predator
(http://www.rsaconference.com/media/cyber-safety-kids-the-true-story-of-alicia)
TIP
Don’t post
inappropriate
photos!
TIP
Be
wary
of
others
Is this really your friend..?
TIP
TIP
Monitor
Your
Child’s
Name
Onlinehttps://www.google.com/settings/dashboard
Guard
personal
information
TIP
Never
assume
privacy
TIP
Who’s
following
you?
TIP
Cyber Safety for Middle School Students and Parents
Questions (and maybe some
answers)
Ben Woelk
Ben.woelk@gmail.com
Benwoelk.com
@benwoelk
www.linkedin.com/in/benwoelk/
http://www.slideshare.net/bwoelk
Resource List
• National Cyber Security Alliance (for parents section)
https://www.staysafeonline.org/stay-safe-online/
• OnGuardOnline.gov
https://www.onguardonline.gov/topics/protect-kids-online
• Darkness to Light: End Child Sexual Abuse Internet Safety
http://ow.ly/PVavb
• Bivonia Child Advocacy Center
https://www.facebook.com/BivonaCAC
• Shockproofing Your Use of Social Media eBook, Woelk
http://amzn.com/B00OJMK4T2
• Parenting in the Cyber Age: A Parents’ Guide to Safer Social Networking
http://benwoelk.com/parenting-in-the-cyber-age/
• National Center for Missing and Exploited Children
http://missingkids.org/Home
• Cyber Bullying: Protecting Kids and Adults from Online Bullies
McQuade III, Colt, Meyer
https://books.google.com/books/about/Cyber_Bullying.html
• Technological Awareness for Teens and Young Adults, UNM presentation
http://bit.ly/1fDAe0l
1 of 25

Recommended

Cyber safety: internet safety presentation for middle school students by
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
27.9K views16 slides
Staying Safe Online For Kids by
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For KidsDepartment of Defense
21.6K views19 slides
Cyber Safety by
Cyber SafetyCyber Safety
Cyber SafetyMaria Stathi
63 views13 slides
Internet safety ppt by
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
8.3K views31 slides
Internet Safety Presentation by
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
18.9K views26 slides
Internet Safety Presentation by
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
3.3K views21 slides

More Related Content

What's hot

Internet Safety by
Internet SafetyInternet Safety
Internet SafetyWilliam Breitsprecher
59.2K views14 slides
Internet Safety by
Internet SafetyInternet Safety
Internet Safetymcgeet
7.7K views66 slides
Internet safety and cyber bulling final by
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
9.2K views43 slides
Cyber safety tips by
Cyber safety tipsCyber safety tips
Cyber safety tipsArunmozhi Ramesh
583 views37 slides
Cyberbullying by
CyberbullyingCyberbullying
CyberbullyingDonikaLici
125 views15 slides
Cyber Safety by
Cyber SafetyCyber Safety
Cyber SafetyNiti Arora
9.8K views25 slides

What's hot(20)

Internet Safety by mcgeet
Internet SafetyInternet Safety
Internet Safety
mcgeet7.7K views
Internet safety and cyber bulling final by Karen Brooks
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks9.2K views
Cyberbullying by DonikaLici
CyberbullyingCyberbullying
Cyberbullying
DonikaLici125 views
Cyber Safety by Niti Arora
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora9.8K views
5 Donts, Why and How - Internet Safety by Kigose
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose 3.8K views
Internet Safety Elementary by jaimejoyh
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh24K views
Internet do's and don'ts. Kids safety on the Internet by Queens Library
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
Queens Library11.6K views
Internet Safety Presentation for Parents by Marian Merritt
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt6.7K views
How to stay safe online by Dizeo
How to stay safe onlineHow to stay safe online
How to stay safe online
Dizeo1.6K views
Internet safety presentation 2019 by KanelandSvihlik
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
KanelandSvihlik1.1K views
Cyber bullying by pscl
Cyber bullyingCyber bullying
Cyber bullying
pscl4.6K views
Cyber safety by Yash Jain
Cyber safetyCyber safety
Cyber safety
Yash Jain929 views
Cyberwellness talk by mdm saedah 2011 160211 by Saedah
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211
Saedah1.2K views

Similar to Cyber Safety for Middle School Students and Parents

Bullying in social media presentation by
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentationmitchell_shannon
3.3K views12 slides
Digital health and safety by
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
764 views48 slides
Internet Safety 2.0 by
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
962 views33 slides
WISE KIDS Leaflet: Cyberbullying by
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS
1K views1 slide
Family Internet Safety by
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
369 views29 slides
Digital Citizenship by Mann Rentoy by
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
361 views227 slides

Similar to Cyber Safety for Middle School Students and Parents(20)

Bullying in social media presentation by mitchell_shannon
Bullying in social media presentationBullying in social media presentation
Bullying in social media presentation
mitchell_shannon3.3K views
Digital health and safety by Ray Brannon
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon764 views
Internet Safety 2.0 by Larry Magid
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
Larry Magid962 views
WISE KIDS Leaflet: Cyberbullying by WISE KIDS
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: Cyberbullying
WISE KIDS1K views
Family Internet Safety by Sage Lewis
Family Internet SafetyFamily Internet Safety
Family Internet Safety
Sage Lewis369 views
Digital Citizenship by Mann Rentoy by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
Mann Rentoy361 views
Digital literacy skills for social workers - North West London ASYE Programme by Claudia Megele
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE Programme
Claudia Megele2.5K views
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage by Trost, Micki
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Trost, Micki1.2K views
Children as target of cyber crimes by Nilendra Kumar
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
Nilendra Kumar2.5K views
How Safe Are Our Kids Online? by Anne Collier
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
Anne Collier4.6K views
6 23-15 Social Media Etiquette for Professionals by Nikki Sunstrum
6 23-15 Social Media Etiquette for Professionals6 23-15 Social Media Etiquette for Professionals
6 23-15 Social Media Etiquette for Professionals
Nikki Sunstrum763 views
Updated Online Safety 3.0 Talk for Mediterranean Association of International... by Larry Magid
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Larry Magid3.4K views
Media power point 3 by kelsietune
Media power point 3Media power point 3
Media power point 3
kelsietune392 views
Social Media for Youth Leaders, May 2014, for @c_of_e by Bex Lewis
Social Media for Youth Leaders, May 2014, for @c_of_eSocial Media for Youth Leaders, May 2014, for @c_of_e
Social Media for Youth Leaders, May 2014, for @c_of_e
Bex Lewis1.1K views

More from Ben Woelk, CISSP, CPTC

Creating a Sense of Belonging--Engaging the Virtual Workforce by
Creating a Sense of Belonging--Engaging the Virtual WorkforceCreating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceBen Woelk, CISSP, CPTC
6 views40 slides
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx by
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxBen Woelk, CISSP, CPTC
108 views39 slides
Saying "Yes, and...?" to Leadership Opportunities by
Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesBen Woelk, CISSP, CPTC
158 views29 slides
Perspectives on Mentoring: Selected Stories by
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesBen Woelk, CISSP, CPTC
141 views14 slides
We're All Winners--Gamification and Security Awareness by
We're All Winners--Gamification and Security AwarenessWe're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessBen Woelk, CISSP, CPTC
295 views35 slides
The Introvert in the Workplace--Strategies for Success by
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessBen Woelk, CISSP, CPTC
343 views39 slides

More from Ben Woelk, CISSP, CPTC(20)

Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx by Ben Woelk, CISSP, CPTC
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18 by Ben Woelk, CISSP, CPTC
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
Follow the yellow brick road: A Leadership Journey to the Emerald City by Ben Woelk, CISSP, CPTC
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
Collaborating securely: Protecting Your Community and Yourself by Ben Woelk, CISSP, CPTC
Collaborating securely: Protecting Your Community and YourselfCollaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself

Recently uploaded

Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf by
 Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdfTechSoup
62 views28 slides
OOPs - JAVA Quick Reference.pdf by
OOPs - JAVA Quick Reference.pdfOOPs - JAVA Quick Reference.pdf
OOPs - JAVA Quick Reference.pdfArthyR3
64 views66 slides
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdf by
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdfSTRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdf
STRATEGIC MANAGEMENT MODULE 1_UNIT1 _UNIT2.pdfDr Vijay Vishwakarma
134 views68 slides
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37MysoreMuleSoftMeetup
54 views17 slides
Pharmaceutical Analysis PPT (BP 102T) by
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T) yakshpharmacy009
116 views29 slides
Introduction to AERO Supply Chain - #BEAERO Trainning program by
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning programGuennoun Wajih
123 views78 slides

Recently uploaded(20)

Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf by TechSoup
 Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
TechSoup 62 views
OOPs - JAVA Quick Reference.pdf by ArthyR3
OOPs - JAVA Quick Reference.pdfOOPs - JAVA Quick Reference.pdf
OOPs - JAVA Quick Reference.pdf
ArthyR364 views
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Pharmaceutical Analysis PPT (BP 102T) by yakshpharmacy009
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T)
yakshpharmacy009116 views
Introduction to AERO Supply Chain - #BEAERO Trainning program by Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih123 views
INT-244 Topic 6b Confucianism by S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer49 views
11.30.23A Poverty and Inequality in America.pptx by mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239181 views
NodeJS and ExpressJS.pdf by ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR350 views
11.21.23 Economic Precarity and Global Economic Forces.pptx by mary850239
11.21.23 Economic Precarity and Global Economic Forces.pptx11.21.23 Economic Precarity and Global Economic Forces.pptx
11.21.23 Economic Precarity and Global Economic Forces.pptx
mary85023952 views
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx by Niranjan Chavan
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptxGuidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Niranjan Chavan42 views
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating... by Taste
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...
Taste38 views
Research Methodology (M. Pharm, IIIrd Sem.)_UNIT_IV_CPCSEA Guidelines for Lab... by RAHUL PAL
Research Methodology (M. Pharm, IIIrd Sem.)_UNIT_IV_CPCSEA Guidelines for Lab...Research Methodology (M. Pharm, IIIrd Sem.)_UNIT_IV_CPCSEA Guidelines for Lab...
Research Methodology (M. Pharm, IIIrd Sem.)_UNIT_IV_CPCSEA Guidelines for Lab...
RAHUL PAL43 views
GSoC 2024 .pdf by ShabNaz2
GSoC 2024 .pdfGSoC 2024 .pdf
GSoC 2024 .pdf
ShabNaz242 views
Peripheral artery diseases by Dr. Garvit.pptx by garvitnanecha
Peripheral artery diseases by Dr. Garvit.pptxPeripheral artery diseases by Dr. Garvit.pptx
Peripheral artery diseases by Dr. Garvit.pptx
garvitnanecha124 views

Cyber Safety for Middle School Students and Parents

  • 4. Social Networks Social Networking is a social structure made of individuals who are tied by specific types of relationships. • Facebook • Twitter • Flickr • YouTube • Snapchat • Instagram • Pinterest • Craigslist Revised from Technological Awareness for Teens and Young Adults, UNM presentation http://ow.ly/PWvU6
  • 5. Awareness is the key Everyone is a target Organized crime funds the attacks
  • 8. Text Messaging  Sexting is sending nude pictures via text message  50% of teenagers admit to engaging in sexting http://www.cnn.com/2014/11/18/living/teens-sexting-what-parents-can-do/  Messages can be forwarded to unintended recipients  Could be embarrassing if pictures were seen by unintended parties  Sexting can be considered child pornography http://www.nbcwashington.com/news/local/Va-Teen-Could-be-Jailed-for-Sexting-Girlfriend- 265770831.html Technological Awareness for Teens and Young Adults, UNM presentation http://ow.ly/PWvU6
  • 10. You will not be able to shelter your students from the Internet and social networking Focus instead on preparing them for the dangers they will face They can (and will) defeat every technical control you put in place What you already know
  • 11. Use strong passwords, aka passphrases Length > complexity TIP It was a dark and stormy night becomes ItwasaDark215andStormyNight
  • 12. Keep Your Software (and Hardware up to date! TIP
  • 16. Remember who else is there • Employers • Admissions Offices • Identity thieves • Online predators • 1 in 7 10-17 year olds are approached by an online predator (http://www.rsaconference.com/media/cyber-safety-kids-the-true-story-of-alicia) TIP
  • 18. Be wary of others Is this really your friend..? TIP
  • 24. Questions (and maybe some answers) Ben Woelk Ben.woelk@gmail.com Benwoelk.com @benwoelk www.linkedin.com/in/benwoelk/ http://www.slideshare.net/bwoelk
  • 25. Resource List • National Cyber Security Alliance (for parents section) https://www.staysafeonline.org/stay-safe-online/ • OnGuardOnline.gov https://www.onguardonline.gov/topics/protect-kids-online • Darkness to Light: End Child Sexual Abuse Internet Safety http://ow.ly/PVavb • Bivonia Child Advocacy Center https://www.facebook.com/BivonaCAC • Shockproofing Your Use of Social Media eBook, Woelk http://amzn.com/B00OJMK4T2 • Parenting in the Cyber Age: A Parents’ Guide to Safer Social Networking http://benwoelk.com/parenting-in-the-cyber-age/ • National Center for Missing and Exploited Children http://missingkids.org/Home • Cyber Bullying: Protecting Kids and Adults from Online Bullies McQuade III, Colt, Meyer https://books.google.com/books/about/Cyber_Bullying.html • Technological Awareness for Teens and Young Adults, UNM presentation http://bit.ly/1fDAe0l

Editor's Notes

  1. Hi, I’m Ben Woelk. I’m the Policy and Awareness Analyst in the RIT information Security Office. Part of my role is to build a culture of security awareness. Today we’re going to learn about Shockproofing Your Use of Social Media. In other words, how to stay safe online.
  2. Does anybody see anything wrong with this picture? Here’s the problem, Everyone is a Target. Identity theft is big business. It’s not done by hackers sitting in their basements. Well maybe some of the people committing identity theft are hackers in their basements, but they’re funded by organized crime.
  3. Here’s the big problem: You can’t rely on others to protect you. You need to learn to protect yourself. That’s what this presentation is all about—giving you ten tips to stay safe online.
  4. Tip #1: Use a Passphrase. We’ve all heard about passwords. I want you to start using passphrases. Passphrases are long, but easier to remember than a password. Length is more important than complexity. Throw in some numbers and capital letters and the phrase on the screen becomes ItwasaDark215andStormyNight. Easy to remember.
  5. Tip # 2: Stay up to date. Attackers exploit vulnerabilities in software. Software vendors release patches to address these vulnerabilities. We all know that we need to keep our operating systems up to date. You also need to keep your applications up to date. Make sure you’ve turned on auto update.
  6. Tip #3: Use Protection. No, there’s no such thing as an iCondom. However, one of the best ways to protect your computer is to use layers of security. Use anti-virus, a firewall, and anti-spyware. Mac users need antivirus and need to make sure your firewall is enabled. And don’t forget about your mobile devices. They’re starting to become more and more of a target.
  7. Tip #4: Recognize Phishing and scams. Many of you met Phishy at move in. Phishy is here to help raise our awareness about phishing. It’s pretty basic. Never respond to email requests for your password. (Or over the phone)
  8. Tip #5: Use Social Networks Safely. Don’t post information about where you live or where you’re going to be on Facebook or Twitter. Yes, it’s rare, but if you have an open profile on Facebook or you’re using FourSquare and tweeting your whereabouts publicly, you’re putting yourself at risk.
  9. Tip #6: Remember who else is there. Employers will try to find out as much about you as they can online. They may try to access your social media profiles. There was a court case this month, where the court decided that what you post online is not protected. Think before you post about the image you’re portraying.
  10. Don’t post inappropriate photos. Untag inappropriate photos of you your friends post. Would you hire this guy? People WILL judge you by what you post online. Think before you post! Clean up your profiles now.
  11. Tip #7: Be wary of others. How do you know the person claiming to be 19 years old isn’t a 40 something who’s masquerading as someone else? How do you know he or she isn’t a wolf in sheep’s clothing? Be careful.
  12. Tip #8: Search for your name. Set up a Google Alert in Google Dashboard to let you know every day how your name is appearing online. You can set up a search for anything. So if there’s something you want to track online, set up the alert.
  13. Tip #9: Guard your personal information. Wouldn’t you like to have a guard dog like this protecting your information? Hmm. Maybe not. Protecting your personal information hasn’t been a big deal for you so far. It will be as you develop a credit history.
  14. Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do?
  15. Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do?