SlideShare a Scribd company logo
1 of 11
Download to read offline
INTERNET SAFETY
Marjorie Renfrow
Marjorie.Renfrow@eagles.usm.edu
6/19/2014Internet Safety
2
GETTING STARTED
§ Look for a Lock for secure browsing
§ Use easy to remember passwords containing letters and numbers
§ Log out of websites completely when using shared computers
§ Assist children with internet searches and browsing
§ Use free or paid anti-virus software on a regular basis
6/19/2014
3
Internet Safety
LOOK FOR A LOCK
Secure browsing websites will place a
picture of a lock beside the URL in
addition to beginning with “https”
rather than “http.”
Never submit personal information to a
website that does not utilize these
devices as it can be easily interfered
with from outside forces.
Never submit credit card information,
social security numbers, usernames and
passwords to other accounts, or other
personal, private information to
websites without a lock!
6/19/2014Internet Safety
4
6/19/2014
5
Internet Safety
Passwords should contain both letters
and numbers.
Good passwords will have one or two
letters capitalized.
NEVER use the following words as
passwords as they are easily guessed by
hackers and internet intruders:
• Love
• God
• Password
• your name
• your birthdate
6/19/2014Internet Safety
6
Always remember to
completely sign out of any
and all applications you may
be using such as email, social
media websites, or any bill
paying sites you may visit to
avoid misuse of personal
information.
6/19/2014Internet Safety
7
Children should always be supervised
when using computers and accessing
the internet.
Some internet searches can produce
material or images no appropriate for
young children.
Many websites exist specifically for
children, but it can be very easy to
mistakenly click on an advertisement
which can take them away from the
approved website they were enjoying.
SEARCH ENGINES FOR KIDS
6/19/2014Internet Safety
8
INTERNET SECURITY
FREE PAID
6/19/2014Internet Safety
9
ANTI-VIRUS SOFTWARE
Anti-virus software can be free or paid subscription
There are many companies which produce and sell anti-virus software
Which ever product you choose, should be implemented monthly
Many products protect web browsers as well as whole computer
6/19/2014Internet Safety
10
THANK YOU FOR
VIEWING!
If you have any questions, please feel free to ask!
6/19/2014Internet Safety
11

More Related Content

What's hot

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMENNaval OPSEC
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Digital literacy & online safety
Digital literacy & online safety Digital literacy & online safety
Digital literacy & online safety hannahstrevig
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safetyreidcollins42
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety AisaElsa Freire
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETcpsoncanals
 

What's hot (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Cyber security
Cyber securityCyber security
Cyber security
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Internet security
Internet securityInternet security
Internet security
 
Digital literacy & online safety
Digital literacy & online safety Digital literacy & online safety
Digital literacy & online safety
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety Aisa
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
 

Viewers also liked

Qualitative technologies
Qualitative technologiesQualitative technologies
Qualitative technologiesCarla Piper
 
4 ways to prevent running injuries
4 ways to prevent running injuries4 ways to prevent running injuries
4 ways to prevent running injuriesrunbud
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016Andrew Chen
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Viewers also liked (7)

Avc
AvcAvc
Avc
 
Qualitative technologies
Qualitative technologiesQualitative technologies
Qualitative technologies
 
552udl
552udl552udl
552udl
 
4 ways to prevent running injuries
4 ways to prevent running injuries4 ways to prevent running injuries
4 ways to prevent running injuries
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to Renfrow Internet Safety

Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 

Similar to Renfrow Internet Safety (20)

Securityguide
SecurityguideSecurityguide
Securityguide
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Internet safety
Internet safetyInternet safety
Internet safety
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Renfrow Internet Safety

  • 3. GETTING STARTED § Look for a Lock for secure browsing § Use easy to remember passwords containing letters and numbers § Log out of websites completely when using shared computers § Assist children with internet searches and browsing § Use free or paid anti-virus software on a regular basis 6/19/2014 3 Internet Safety
  • 4. LOOK FOR A LOCK Secure browsing websites will place a picture of a lock beside the URL in addition to beginning with “https” rather than “http.” Never submit personal information to a website that does not utilize these devices as it can be easily interfered with from outside forces. Never submit credit card information, social security numbers, usernames and passwords to other accounts, or other personal, private information to websites without a lock! 6/19/2014Internet Safety 4
  • 5. 6/19/2014 5 Internet Safety Passwords should contain both letters and numbers. Good passwords will have one or two letters capitalized. NEVER use the following words as passwords as they are easily guessed by hackers and internet intruders: • Love • God • Password • your name • your birthdate
  • 6. 6/19/2014Internet Safety 6 Always remember to completely sign out of any and all applications you may be using such as email, social media websites, or any bill paying sites you may visit to avoid misuse of personal information.
  • 7. 6/19/2014Internet Safety 7 Children should always be supervised when using computers and accessing the internet. Some internet searches can produce material or images no appropriate for young children. Many websites exist specifically for children, but it can be very easy to mistakenly click on an advertisement which can take them away from the approved website they were enjoying.
  • 8. SEARCH ENGINES FOR KIDS 6/19/2014Internet Safety 8
  • 10. ANTI-VIRUS SOFTWARE Anti-virus software can be free or paid subscription There are many companies which produce and sell anti-virus software Which ever product you choose, should be implemented monthly Many products protect web browsers as well as whole computer 6/19/2014Internet Safety 10
  • 11. THANK YOU FOR VIEWING! If you have any questions, please feel free to ask! 6/19/2014Internet Safety 11