Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Family Online Safety: Truth and Consequences


Published on

Updated! Full speaker notes (just download the deck), lots of data points and citations. This is a presentation for a general family audience. Lots of new info and an expanded section on cyber bullying! Free copies of our booklet, "Family Online Safety Guide" if you email me at marian @

Published in: Technology
  • Be the first to comment

Family Online Safety: Truth and Consequences

  1. 1. Family Online Safety: Truth andConsequencesMarian MerrittNorton Internet Safety Advocate, Symantec Corporation
  2. 2. Is technology changingus?
  3. 3. Today’s Digital Native (born in 1990’s or later)• Our children have never stood to change a TV channel• Internet always existed• They don’t go “online”; they are always connected• Definitions of privacy getting tweaked• Expect devices to just turn on, connect and work• More collaborative, get help from networks, not just a Google search or in a book• Kids (8-18) view 53 hours of media per week1• By age 21, will have sent an average of 250,000 emails, instant messages and texts• By age 21, more than 10,000 hours on their cell phone• By age 21, more than 14,500 hours online, mostly in social networks1 Kaiser study 2010
  4. 4. Parents worry about many different online issues “I’m worried my By 11 “Will my child be cyber bullied?” child will be Children have usually or bullycontacted encountered adult material others? by Social “My kidstrangers networks won’t put the cell Online” phone down, are “Are they safe?” each yearthey addicted?” 4
  5. 5. What is real, what is a myth• Low risk of stranger danger• Cyber bullying not common• Sexting is rare for young kids• Kids are better at privacy settings than adults• Social networks can be safe, can be dangerous• Media attention to issues blows them out of proportion 5
  6. 6. There is good news• Research shows risk isn’t growing, just awareness• Less real difference between online and offline worlds• Parents play big role; partner with schools• Technology empowers kids• Shift in focus from panic about internet danger to fostering digital citizenship 6
  7. 7. Potential problems at any age 7
  8. 8. Younger Children’s Online Troubles • Visit the wrong websites (adult material, violent material, stuff that might scare them) • Be exposed to advertising online and in apps • Make purchases without permission • Get their first email account and get spam, chain letters, adult material 8
  9. 9. Middle School Children’s Online Troubles • Social drama and Cyber Bullying • Cell phones and misuse (spam, sexting, using late at night instead of sleeping) • Join social networks when underage 9
  10. 10. Older School Children’s Online Troubles • Reputation problems • Privacy failures • Online scams and fraud • Social network issues 10
  11. 11. All ages need to be concerned about• Malware and cybercrime• Digital reputation stuff 11
  12. 12. Cybercrime is a massive global problemCybercrime costs 2/3 31% of us have received consumers of online adults phishing text on have been hit mobile phone$110 by cybercrime $1 million +billion 1 in 6 new pieces each year social network of malware each year are created users have been hacked every day 12
  13. 13. Privacy and Reputation 13
  14. 14. Facebook safety concerns 14
  15. 15. Facebook click jacking attack types 15
  16. 16. OMG! Videos get people to click Bad Guys Want to Get Us to Click to: Infect us with malware Make us take bogus surveys to: Gain information or Sign us up for premium SMS services Send spam to us and our friends 16
  17. 17. Bad guys know that people want to know who viewed their Facebook page 17
  18. 18. Bad guys know that people want a dislike button 18
  19. 19. Mobile Computing
  20. 20. What’s really going on?Kids are using technology in ways far beyond what parents are prepared to deal with 20
  21. 21. Permissions in mobile apps 21
  22. 22. What you think you didvs what actually happened in the background TIME SPENT PLAYING IP ADDRESS PREVIOUS SCORES LOCATION GENDER & AGEUSER NAME SCORE FACEBOOK FRIEND LIST 22
  23. 23. What are the chances ofgetting your lost phone back? 50% 23
  24. 24. What are the chances of your work andpersonal information being looked at? 100% 24
  25. 25. Cyber Bullying 25
  26. 26. Relation of Offline and Online Bullying Offline Online 26
  27. 27. Vulnerable Populations•LGBTQ•Minorities, disabled, gifted, evensocio-economic differences YOU, YOUR FRIENDS AND•Heavy cell phone users more likely bully; be bullied
  28. 28. Cyberbullying – the things we say; things we do• “Sticks and stones”• “It’s just part of growing up”• “It will make you tougher”• “Stand up for yourself” 28
  29. 29. And the response?Parent School Legal 29
  30. 30. And the response? •Teach kids not to bully or be a silentParent bystander •Don’t respond to attacks online •Keep a copy of everything •Report it to website, service, school •Ask for plan of action •Seek advice from experts 30
  31. 31. And the response? •Create anti bullying policySchool •Review current laws in your state •Training for all (even volunteers) •(CyberALLY – great example!) •Work on school environment •Social norming 31
  32. 32. And the response? •Almost all 50 states have anti cyberbullyingLegal laws •Content varies dramatically •California : •AB 9 “Seth’s Law” 2011 •AB1156 2011 •AB746 2011 Resources: 32
  33. 33. What are theremedies?
  34. 34. House Rules and conversationSetting House Rules and havingthe Talk
  35. 35. Technology • Speed limits, fences and coaches • Not spies nannies or policeThe Role of Technology 35
  36. 36. Turn off Jimmy’slaptop at -----9:00 PM 36
  37. 37. Norton Family (parental control) Screenshot from Norton Family
  38. 38. Why passwords matter: data breaches •Payment System – 130 million accounts •Gaming site 1 – 77 million accounts •Social site – 30 million accounts •Military site - 26 million accounts •Career site – 6.4 million accounts •Dating site – 1.5 million accounts
  39. 39. What are the most popular passwords?12345 Abc123 Michael123456 Monkey Football1234567 Trustn01 Ashley12345678 Dragon Bailey123123 Baseball Shadow111111 Iloveyou LetmeinPassword Master Blink182Passw0rdPassword1 Sunshine Admin1Welcome QazwsxWelcome1 Superman
  40. 40. Password Tips1. Think unique for each account2. No dictionary words, pet names or school mascots3. Focus on most important accounts: email and social networks4. Create a pass phrase and turn it into a password5. Use a password manager and security software6. Secure mobile devices with a password7. Never share or show passwords8. If notified about data breach, take action!
  41. 41. Email TipsEmail safety tipsEmail 44
  42. 42. Cell Phone Tips• Set a password on the phone to lock the keypad and screen when not in use• Tape a recovery phone number to phone If found, please call 310 555 8925 45
  43. 43. Cell phone tips• Set up emergency contacts• Set up remote locate/lock/wipe software• Install Security Software• Turn Off Geo-Tagging• Review School Cell Phone and Mobile Device Policy• Review Your Contract Together
  44. 44. Cell phone tips • Review Your Contract • Set up nightly charging station in kitchen or den • Teach Kids Not to Reply To Unknown Senders or Callers • Set rules for new apps and games • Discuss Cyber Bullying, Sexting and Other Risks if You Don’t Guard Your Phone
  45. 45. Change your Behavior
  46. 46. What will you do?
  47. 47. Wrap up
  48. 48. Questions
  49. 49. THANK YOU!Marian Merrittmarian@norton.comCopyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates inthe U.S. and other countries. Other names may be trademarks of their respective owners.This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express orimplied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. TM