SlideShare a Scribd company logo
Online Safety for Seniors
A talk by Larry Magid
CEO, ConnectSafely.org
Larry@ConnectSafely.org
Reasons seniors go online
● Participating in social and cultural activities
● Keeping in touch with loved ones
● Meeting new friends or romantic partners
● Online banking, shopping and investing
● Making travel arrangements
● Getting medical advice and information including doctor reports and test results
● Sharing and viewing pictures
● Exploring and sharing political views
● And much more
Basic safety & privacy tips
● Use strong, unique & long passwords
● Use privacy settings
● Think before your post
● Think before your click
● Report abuse
Common scams
● Personal emergency scam
● You owe money scam
● Online dating scam
● Infected computer scam
Online dating safety
● Have the first meeting in a public place
● Be suspicious if the person is a lot younger or their picture seems to good to
be true
● Be careful if they say they’re from the U.S. but traveling or living overseas
● Avoid communicating outside the dating site
● Look for abnormalities in writing, grammar and spelling
● Never send money
Sharing your views
● Keep it civil
● Don’t spread false information -- do a little research before sharing a link or
an unverified “fact.”
○ Use fact-checking sites like Snopes.com
Safe shopping & banking tips
● Beware of ‘phishing’ and don’t click on links in email unless you’re 100% sure
they’re legitimate
● Be wary of any offer that’s ‘too good to be true,’ including a very low price on
an item
● Only shop at reputable merchants (do a little research if you don’t know them)
● Look for secure websites
● Use credit cards if possible -- otherwise debit cards or reputable online
payment systems
● Read the fine print, including return policies and restocking fees
● Go online to monitor your financial accounts & credit reports
Health and wellness
● Be careful about Googling symptoms -- that cough could be lung cancer but
it’s probably the common cold
● Only rely on reputable health sites -- be wary of ones that you haven’t heard
of or aren’t affiliated with the government or a reputable medical facility
● Check with a doctor before following advice you get on the web
The IRS and Medicare
● Beware of any calls or emails from someone claiming to be with the Internal Revenue
Service
● Only use legitimate sites or software to file taxes
● Be suspicious of anyone posing as a doctor, healthcare provider, or insurance
company that asks for your Medicare number, or who claims to represent Medicare
● Don’t send personal information in response to emails from Social Security or Medicare
● The Social Security Administration will not use email to ask for personal information,
such as your Social Security number or date of birth.
○ When in doubt, call your local Social Security office or 800-772-1213
■ Medicare is 800 633-4227 (800 MEDICARE)
Be smartphone savvy
● Only download reputable apps
● Be careful about permissions you give to apps
● Know how to turn off location
● Despite what you might think, Google is probably not listening to your
conversations
Passwords & Beyond
● Make them unique, long and strong
○ Consider a phrase like I met Sally Smith at Lincoln High School in 1979”
to produce “ImSSaLHSi#69”
○ Change them around, perhaps with the initials of the service inside the
password
● Use two-factor authentication
● Consider a password manager
● Use biometrics when possible
More at ConnectSafely.org/Passwords
More security tips
● Secure your router
● Only buy IoT devices from reputable manufacturers
● Keep your device’s software up-to-date
Media Literacy & Fake News
“Real” Fake News:
Fake news is any information that is deliberately meant to be wholly or largely
false or misleading. Motivations for creating fake news include financial gain—by
getting people to click on sites so they’re exposed to advertising—or to persuade
others to take an action, purchase a product, or support or oppose a cause or
political candidate.
Fake Fake News: Lies by politicians claiming that media is lying, even if they’re
not.
More at ConnectSafely.org/FakeNews
Spotting & Responding to Fake News
● Consider the source and other stories coming from that source. Do they ring
true? Is the URL legitimate?
● Does the “news story” seem one-sided or biased toward a particular point of
view?
● Also, consider the article’s author. Is there evidence that it’s a real person?
Search for the source and author to see what else they’ve published and what
others are saying about them.
● While it's never OK to spread fake news, it is OK to comment on links to fake
stories with your own correction, to help set the record straight
More at ConnectSafely.org/FakeNews
What is Hate Speech
● Hate speech is more than just harsh words. It can be any form of expression
intended to vilify, humiliate, or incite hatred against a group or class of people.
It can occur offline or online or both.
● It can be communicated using words, symbols, images, memes, emojis, and
video.
● In general, online hate speech targets a person or group because of
characteristics tied closely to their identity, like race, color, religion, ethnicity,
gender, sexual orientation, disability status, or sexual identity.
More at ConnectSafely,org/Hatespeech
What to do about Hate Speech
● Upstanders can start by taking preventative action, by dealing with situations
before they reach the hate speech level. Encourage empathy in children and
remind them that, when engaging with others online, there is another person
on the other side of the screen.
● Look for terms that might creep into a child’s vocabulary. Sometimes kids
(and adults) use derogatory terms without realizing their impact.
● Don’t overreact to these situations. Lots of kids use derogatory terms without
realizing it.
More at ConnectSafely,org/Hatespeech

More Related Content

What's hot

Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Data breach
Data breachData breach
Data breach
Burhan Ahmed
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
lisluandaprimary
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
xlilmermaidx
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
Rohit Srivastwa
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
ProjectsByJen.com
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
Ian Krieger
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
Kristin Briney
 

What's hot (20)

Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Data breach
Data breachData breach
Data breach
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 

Similar to Online Safety for Seniors

Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
adblue2017
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
Samir Deutsch
 
Scams
ScamsScams
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
Staci Trekles
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
San Diego Continuing Education
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future
- Mark - Fullbright
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
kanika sharma
 
Fake id review.pdf
Fake id review.pdfFake id review.pdf
Fake id review.pdf
jhon A3fakeid
 
Informed Investor: Social Media
Informed Investor: Social Media Informed Investor: Social Media
Informed Investor: Social Media
INInvestWatch
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
KR_Barker
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
Andri Priyatna
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
Yumonomics
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
hewie
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
- Mark - Fullbright
 
Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)
KR_Barker
 

Similar to Online Safety for Seniors (20)

Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
Scams
ScamsScams
Scams
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future
 
7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks7 tips to prevent yourself from becoming a victim of Cyber Attacks
7 tips to prevent yourself from becoming a victim of Cyber Attacks
 
Fake id review.pdf
Fake id review.pdfFake id review.pdf
Fake id review.pdf
 
Informed Investor: Social Media
Informed Investor: Social Media Informed Investor: Social Media
Informed Investor: Social Media
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)
 

More from ConnectSafely

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
ConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
ConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
ConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
ConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
ConnectSafely
 
App Privacy
App PrivacyApp Privacy
App Privacy
ConnectSafely
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
ConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
ConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
ConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
ConnectSafely
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
ConnectSafely
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
ConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
ConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
ConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
ConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

More from ConnectSafely (18)

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 

Recently uploaded (20)

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 

Online Safety for Seniors

  • 1. Online Safety for Seniors A talk by Larry Magid CEO, ConnectSafely.org Larry@ConnectSafely.org
  • 2. Reasons seniors go online ● Participating in social and cultural activities ● Keeping in touch with loved ones ● Meeting new friends or romantic partners ● Online banking, shopping and investing ● Making travel arrangements ● Getting medical advice and information including doctor reports and test results ● Sharing and viewing pictures ● Exploring and sharing political views ● And much more
  • 3. Basic safety & privacy tips ● Use strong, unique & long passwords ● Use privacy settings ● Think before your post ● Think before your click ● Report abuse
  • 4. Common scams ● Personal emergency scam ● You owe money scam ● Online dating scam ● Infected computer scam
  • 5. Online dating safety ● Have the first meeting in a public place ● Be suspicious if the person is a lot younger or their picture seems to good to be true ● Be careful if they say they’re from the U.S. but traveling or living overseas ● Avoid communicating outside the dating site ● Look for abnormalities in writing, grammar and spelling ● Never send money
  • 6. Sharing your views ● Keep it civil ● Don’t spread false information -- do a little research before sharing a link or an unverified “fact.” ○ Use fact-checking sites like Snopes.com
  • 7. Safe shopping & banking tips ● Beware of ‘phishing’ and don’t click on links in email unless you’re 100% sure they’re legitimate ● Be wary of any offer that’s ‘too good to be true,’ including a very low price on an item ● Only shop at reputable merchants (do a little research if you don’t know them) ● Look for secure websites ● Use credit cards if possible -- otherwise debit cards or reputable online payment systems ● Read the fine print, including return policies and restocking fees ● Go online to monitor your financial accounts & credit reports
  • 8. Health and wellness ● Be careful about Googling symptoms -- that cough could be lung cancer but it’s probably the common cold ● Only rely on reputable health sites -- be wary of ones that you haven’t heard of or aren’t affiliated with the government or a reputable medical facility ● Check with a doctor before following advice you get on the web
  • 9. The IRS and Medicare ● Beware of any calls or emails from someone claiming to be with the Internal Revenue Service ● Only use legitimate sites or software to file taxes ● Be suspicious of anyone posing as a doctor, healthcare provider, or insurance company that asks for your Medicare number, or who claims to represent Medicare ● Don’t send personal information in response to emails from Social Security or Medicare ● The Social Security Administration will not use email to ask for personal information, such as your Social Security number or date of birth. ○ When in doubt, call your local Social Security office or 800-772-1213 ■ Medicare is 800 633-4227 (800 MEDICARE)
  • 10. Be smartphone savvy ● Only download reputable apps ● Be careful about permissions you give to apps ● Know how to turn off location ● Despite what you might think, Google is probably not listening to your conversations
  • 11. Passwords & Beyond ● Make them unique, long and strong ○ Consider a phrase like I met Sally Smith at Lincoln High School in 1979” to produce “ImSSaLHSi#69” ○ Change them around, perhaps with the initials of the service inside the password ● Use two-factor authentication ● Consider a password manager ● Use biometrics when possible More at ConnectSafely.org/Passwords
  • 12. More security tips ● Secure your router ● Only buy IoT devices from reputable manufacturers ● Keep your device’s software up-to-date
  • 13. Media Literacy & Fake News “Real” Fake News: Fake news is any information that is deliberately meant to be wholly or largely false or misleading. Motivations for creating fake news include financial gain—by getting people to click on sites so they’re exposed to advertising—or to persuade others to take an action, purchase a product, or support or oppose a cause or political candidate. Fake Fake News: Lies by politicians claiming that media is lying, even if they’re not. More at ConnectSafely.org/FakeNews
  • 14. Spotting & Responding to Fake News ● Consider the source and other stories coming from that source. Do they ring true? Is the URL legitimate? ● Does the “news story” seem one-sided or biased toward a particular point of view? ● Also, consider the article’s author. Is there evidence that it’s a real person? Search for the source and author to see what else they’ve published and what others are saying about them. ● While it's never OK to spread fake news, it is OK to comment on links to fake stories with your own correction, to help set the record straight More at ConnectSafely.org/FakeNews
  • 15. What is Hate Speech ● Hate speech is more than just harsh words. It can be any form of expression intended to vilify, humiliate, or incite hatred against a group or class of people. It can occur offline or online or both. ● It can be communicated using words, symbols, images, memes, emojis, and video. ● In general, online hate speech targets a person or group because of characteristics tied closely to their identity, like race, color, religion, ethnicity, gender, sexual orientation, disability status, or sexual identity. More at ConnectSafely,org/Hatespeech
  • 16. What to do about Hate Speech ● Upstanders can start by taking preventative action, by dealing with situations before they reach the hate speech level. Encourage empathy in children and remind them that, when engaging with others online, there is another person on the other side of the screen. ● Look for terms that might creep into a child’s vocabulary. Sometimes kids (and adults) use derogatory terms without realizing their impact. ● Don’t overreact to these situations. Lots of kids use derogatory terms without realizing it. More at ConnectSafely,org/Hatespeech