SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Keep Your Family Safe
Online
Michael Kaiser
Executive Director
Twitter: @MKaiserNCSA
Core Initiatives
The Family
• For families being connected is a given
• Keeping children and families’ assets safe is a
priority
• Raising young people who can use the
Internet safely securely, ethically and
productively benefits everyone
• There aren’t many bright-line rules; children
age differently and we are teaching them to
use technology as a lifelong endeavor
The NCSA/
ESET Study
• Conducted for National Cyber Security
Awareness Month (NCSAM) (#CyberAware)
• Survey of 500 families with children under 18
Have The Talk(s)
• 75% of families surveyed have had
conversations with children in the home about
using the Internet safely and securely
• Communication is the key to safety and
security
• Make discussions about online safety and
security part of your everyday life:
– How was school today? What happened on the
playground? What are you up to online?
Parents’ Top Concerns
• Cyber bullying or harassment is the top
concern for parents (41%), followed by:
– Viewing pornography (38%)
– Contact by strangers (38%)
– Viewing objectionable or age-inappropriate
content (37%)
• Other significant risks for children:
– Identity theft
– Reputational harm
Are we
overconfident
as parents?
• American parents seem to be very confident
that their children are protected from online
dangers
– Almost 60% are confident that they know
everything their children are doing online
– 61% are confident that their kids can use the
Internet and devices safely and securely
• Is this how we we really feel?
Rules, or
Lack Thereof
• 59% of parents don’t require their kids get
permission before downloading new apps, or
games or joining social networks
• Only 40% don’t allow password sharing with
friends
• Only 34% require that children provide all
passwords to online accounts
• Only 23% have device-free dinnertime rules
• Only 25% have rules about allowing devices in
the bedroom after a certain time
Rules, or Lack
Thereof Continued
• 70% of parents don’t limit the kind of personal
information allowed for posting on social
networks
• Only 31% do not allow download pirated
content from the Internet such as illegal
games, movies or songs
• 60% don’t limit screen time use per day
• 63% don’t limit hours during the day during
which devices can be used
• 10% have no rules at all
Consequences
• When cyber rules are broken, parents report
digital timeouts as a common consequence
– Take away devices for a period of time (63%)
– Put stricter time limits on the use of devices (12%)
– Limit device use to specific things (e.g., doing
homework or other productive work) (14%)
– Don't have consequences related to tech usage for
violating tech rules (6%)
– Have tried making rules and enforcing them but
find it is not an effective strategy (2%)
Your Home
as an Enterprise
• 67% of the households surveyed each have
between 1 and 5 devices at home connected
to the Internet, while 30% have 6 or more
devices and 5% have 11 or more devices.
• 30% of those surveyed have 2-3 more
Interned connected devices at home today
than they did last year
Doing a Lot
From Home
• Banking and finances:
– Banking (66%)
– Taxes (30%)
• Entertainment:
– Music streaming (39%)
– Social networks (74%)
– Gaming (43%)
– Streaming TV/movies (45%)
• Fitness and health: 16%
Doing a Lot From
Home Continued
• Shopping and e-commerce:
– Travel (31%)
– Shopping (61%)
– Selling merchandise (20%
• Storing personal information:
– Videos/photos (38%)
– Music (36%)
– Streaming TV/movies (45%)
• Work and homework:
– Homework (21%)
– Work (28%)
Router as the
Keys to the Kingdom
• 2 in 5 households – more than 40% – did not
change the factory set default passwords on
their wireless routers
• Close to 60% did not (48%) or are not sure
(8%) if they changed their router usernames
or passwords in the last year
• 60% set up their wireless routers on their own
Risks are Real
• 1 in 5 American households has received
notification that their information has been
lost in a data breach
• Of those affected, 56% have received multiple
notifications of being data breach victims
• 1 in 5 households has received notification
from children’s schools that their children’s
information has been lost in a data breach
Who’s your family CSO?
• Every family needs a family online safety
officer
– Could be you. Could be a child.
– Establishing this role makes sure that someone in
the family is keeping up and thinking about
security issues and checking in that family
members are doing things safely and securely
online.
Assign Digital Chores
• Responsibilities include:
– Device management (patches, passwords)
– Inventory of all devices connected to the Internet
– Backup of data
– Data cleanups
– Review of social media feeds
– Account security (creating long, strong and unique
passwords and updating them regularly,
implementing multifactor authentication)
For Everyone
• Keep a clean machine
• Get two steps ahead
• When in doubt, throw it out
• Share with care
• Post only about others as you would have
them post about you
• Personal information is money: value it and
protect it
For Parents
• Help your kids own their online presence.
– When available, set their privacy and security settings
on websites to your comfort level for information
sharing. Remind them that it’s OK to limit how and
with whom they share information.
• Support their good choices.
– Expand your children’s online experience and their
autonomy when developmentally appropriate, as they
demonstrate competence in safe and secure online
behavior and good decision making.
For Parents
Continued
• Explain the implications.
– Help your children understand the public nature
of the Internet and its risks as well as benefits.
– Be sure they know that any digital info they share,
such as emails, photos or videos, can easily be
copied and pasted elsewhere, and is almost
impossible to take back.
– Things that could damage their reputation,
friendships or future prospects should not be
shared electronically.
.
For Parents Continued
• Just saying “no” rarely works.
– Teach your children how to interact safely with people they
"meet" online. Though it's preferable they make no in-person
contact with online-only acquaintances, young people may
not always follow this rule. So talk about maximizing safe
conditions: meeting only in well-lit public places, always
taking at least one friend and telling a trusted adult about
any plans they make – including the time, place and
acquaintance’s contact information (at least a name and cell
phone number).
• Empower kids to handle problems, such as
bullying, unwanted contact or hurtful comments.
– Work with them on strategies for when problems arise, such
as talking to a trusted adult, not retaliating, blocking the
person or filing a complaint. Agree on steps to take if a
strategy fails.
.

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Larry Magid
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014bellla33
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
YOUNG ADULTS: How social media today impacts you tomorrow (and what to do abo...
YOUNG ADULTS: How social media today impacts you tomorrow (and what to do abo...YOUNG ADULTS: How social media today impacts you tomorrow (and what to do abo...
YOUNG ADULTS: How social media today impacts you tomorrow (and what to do abo...Sevans Strategy
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.Your eKavach
 
Internet Safety Infographic
Internet Safety InfographicInternet Safety Infographic
Internet Safety InfographicuKnow.com
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generationdlevin
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from VodaphoneKatherine Lyddon
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Larry Magid
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 

Was ist angesagt? (20)

Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Online Safety Index for Parents
Online Safety Index for ParentsOnline Safety Index for Parents
Online Safety Index for Parents
 
Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...Everything I know about protecting children I learned from a visit to Nairobi...
Everything I know about protecting children I learned from a visit to Nairobi...
 
Esafety in the curriculum October 2014
Esafety in the curriculum October 2014Esafety in the curriculum October 2014
Esafety in the curriculum October 2014
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
YOUNG ADULTS: How social media today impacts you tomorrow (and what to do abo...
YOUNG ADULTS: How social media today impacts you tomorrow (and what to do abo...YOUNG ADULTS: How social media today impacts you tomorrow (and what to do abo...
YOUNG ADULTS: How social media today impacts you tomorrow (and what to do abo...
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.
 
Privacy and safety
Privacy and safetyPrivacy and safety
Privacy and safety
 
Internet Safety Infographic
Internet Safety InfographicInternet Safety Infographic
Internet Safety Infographic
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?Do fear and exaggeration increase risk?
Do fear and exaggeration increase risk?
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 

Andere mochten auch

Cv in short form
Cv in short formCv in short form
Cv in short formDwight Vick
 
Вступ урок 1
Вступ урок 1Вступ урок 1
Вступ урок 1Nila Luchkova
 
Короткий нарис
Короткий нарисКороткий нарис
Короткий нарисNila Luchkova
 
ใบงานสำรวจตนเอง 611
ใบงานสำรวจตนเอง 611ใบงานสำรวจตนเอง 611
ใบงานสำรวจตนเอง 611rawinchu
 
Додаток 3 - 8
Додаток 3 - 8Додаток 3 - 8
Додаток 3 - 8270479
 
Livret ESS 2015 2016
Livret ESS 2015 2016Livret ESS 2015 2016
Livret ESS 2015 2016Ghislain YGER
 
мяка Iграшки у сучасному декоративно ужитковому мистецтвi
мяка Iграшки у сучасному декоративно ужитковому мистецтвiмяка Iграшки у сучасному декоративно ужитковому мистецтвi
мяка Iграшки у сучасному декоративно ужитковому мистецтвiAndy Levkovich
 
Мелецька С.А.
Мелецька С.А.Мелецька С.А.
Мелецька С.А.school-2
 
презентация дихання рослин
презентация дихання рослинпрезентация дихання рослин
презентация дихання рослинElena Nazarova
 
CSR Comparative Study on ITC and TATA STEEL
CSR Comparative Study on ITC and TATA STEEL CSR Comparative Study on ITC and TATA STEEL
CSR Comparative Study on ITC and TATA STEEL Aditi Angel Patro
 
Servjit Aulak CV 2016.msg
Servjit Aulak CV 2016.msgServjit Aulak CV 2016.msg
Servjit Aulak CV 2016.msgServjit Aulak
 
กิจกรรมที่ 1
กิจกรรมที่ 1กิจกรรมที่ 1
กิจกรรมที่ 1Parida Rakraj
 
Resumen sobre la Fascia
Resumen sobre la FasciaResumen sobre la Fascia
Resumen sobre la FasciaBorn Institute
 
з досвіду роботи дидактична гра ,як засіб всебічного розвитку дитини.
з досвіду роботи дидактична гра ,як засіб всебічного розвитку дитини.з досвіду роботи дидактична гра ,як засіб всебічного розвитку дитини.
з досвіду роботи дидактична гра ,як засіб всебічного розвитку дитини.Елена Кен
 

Andere mochten auch (18)

2558 project (1)
2558 project  (1)2558 project  (1)
2558 project (1)
 
Cv in short form
Cv in short formCv in short form
Cv in short form
 
Урок 9
Урок 9Урок 9
Урок 9
 
Вступ урок 1
Вступ урок 1Вступ урок 1
Вступ урок 1
 
9-1-15 lab 1 resume Final Draft
9-1-15 lab 1 resume Final Draft9-1-15 lab 1 resume Final Draft
9-1-15 lab 1 resume Final Draft
 
Короткий нарис
Короткий нарисКороткий нарис
Короткий нарис
 
ใบงานสำรวจตนเอง 611
ใบงานสำรวจตนเอง 611ใบงานสำรวจตนเอง 611
ใบงานสำรวจตนเอง 611
 
Додаток 3 - 8
Додаток 3 - 8Додаток 3 - 8
Додаток 3 - 8
 
Livret ESS 2015 2016
Livret ESS 2015 2016Livret ESS 2015 2016
Livret ESS 2015 2016
 
TIP-Demand_Side
TIP-Demand_SideTIP-Demand_Side
TIP-Demand_Side
 
мяка Iграшки у сучасному декоративно ужитковому мистецтвi
мяка Iграшки у сучасному декоративно ужитковому мистецтвiмяка Iграшки у сучасному декоративно ужитковому мистецтвi
мяка Iграшки у сучасному декоративно ужитковому мистецтвi
 
Мелецька С.А.
Мелецька С.А.Мелецька С.А.
Мелецька С.А.
 
презентация дихання рослин
презентация дихання рослинпрезентация дихання рослин
презентация дихання рослин
 
CSR Comparative Study on ITC and TATA STEEL
CSR Comparative Study on ITC and TATA STEEL CSR Comparative Study on ITC and TATA STEEL
CSR Comparative Study on ITC and TATA STEEL
 
Servjit Aulak CV 2016.msg
Servjit Aulak CV 2016.msgServjit Aulak CV 2016.msg
Servjit Aulak CV 2016.msg
 
กิจกรรมที่ 1
กิจกรรมที่ 1กิจกรรมที่ 1
กิจกรรมที่ 1
 
Resumen sobre la Fascia
Resumen sobre la FasciaResumen sobre la Fascia
Resumen sobre la Fascia
 
з досвіду роботи дидактична гра ,як засіб всебічного розвитку дитини.
з досвіду роботи дидактична гра ,як засіб всебічного розвитку дитини.з досвіду роботи дидактична гра ,як засіб всебічного розвитку дитини.
з досвіду роботи дидактична гра ,як засіб всебічного розвитку дитини.
 

Ähnlich wie Keep Your Family Safe Online - Michael Kaiser

Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptlival1
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teenscontactcareergyani
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptYadetaHailu
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptchellakaruppasamy
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartJorge Borges
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Media & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewMedia & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewHans Rasmussen
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Technology Influence
Technology Influence Technology Influence
Technology Influence Ilaxi Patel
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety PresentationMr_Elliott
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016Kathryn White
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 

Ähnlich wie Keep Your Family Safe Online - Michael Kaiser (20)

Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda Lenhart
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Media & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewMedia & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s View
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
 
Online Safety for Learners
Online Safety for LearnersOnline Safety for Learners
Online Safety for Learners
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 

Mehr von IT-oLogy

Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockLow Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockIT-oLogy
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...IT-oLogy
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserIT-oLogy
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisIT-oLogy
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoIT-oLogy
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerIT-oLogy
 
Open Security - Chad Cravens
Open Security - Chad CravensOpen Security - Chad Cravens
Open Security - Chad CravensIT-oLogy
 
Live Exploit - Chad Cravens
Live Exploit - Chad CravensLive Exploit - Chad Cravens
Live Exploit - Chad CravensIT-oLogy
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsIT-oLogy
 
In the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim SalterIn the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim SalterIT-oLogy
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterIT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy
 

Mehr von IT-oLogy (20)

Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockLow Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De Block
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett Coco
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
 
Open Security - Chad Cravens
Open Security - Chad CravensOpen Security - Chad Cravens
Open Security - Chad Cravens
 
Live Exploit - Chad Cravens
Live Exploit - Chad CravensLive Exploit - Chad Cravens
Live Exploit - Chad Cravens
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce Jenkins
 
In the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim SalterIn the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim Salter
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Keep Your Family Safe Online - Michael Kaiser

  • 1. Keep Your Family Safe Online Michael Kaiser Executive Director Twitter: @MKaiserNCSA
  • 3. The Family • For families being connected is a given • Keeping children and families’ assets safe is a priority • Raising young people who can use the Internet safely securely, ethically and productively benefits everyone • There aren’t many bright-line rules; children age differently and we are teaching them to use technology as a lifelong endeavor
  • 4. The NCSA/ ESET Study • Conducted for National Cyber Security Awareness Month (NCSAM) (#CyberAware) • Survey of 500 families with children under 18
  • 5. Have The Talk(s) • 75% of families surveyed have had conversations with children in the home about using the Internet safely and securely • Communication is the key to safety and security • Make discussions about online safety and security part of your everyday life: – How was school today? What happened on the playground? What are you up to online?
  • 6. Parents’ Top Concerns • Cyber bullying or harassment is the top concern for parents (41%), followed by: – Viewing pornography (38%) – Contact by strangers (38%) – Viewing objectionable or age-inappropriate content (37%) • Other significant risks for children: – Identity theft – Reputational harm
  • 7. Are we overconfident as parents? • American parents seem to be very confident that their children are protected from online dangers – Almost 60% are confident that they know everything their children are doing online – 61% are confident that their kids can use the Internet and devices safely and securely • Is this how we we really feel?
  • 8. Rules, or Lack Thereof • 59% of parents don’t require their kids get permission before downloading new apps, or games or joining social networks • Only 40% don’t allow password sharing with friends • Only 34% require that children provide all passwords to online accounts • Only 23% have device-free dinnertime rules • Only 25% have rules about allowing devices in the bedroom after a certain time
  • 9. Rules, or Lack Thereof Continued • 70% of parents don’t limit the kind of personal information allowed for posting on social networks • Only 31% do not allow download pirated content from the Internet such as illegal games, movies or songs • 60% don’t limit screen time use per day • 63% don’t limit hours during the day during which devices can be used • 10% have no rules at all
  • 10. Consequences • When cyber rules are broken, parents report digital timeouts as a common consequence – Take away devices for a period of time (63%) – Put stricter time limits on the use of devices (12%) – Limit device use to specific things (e.g., doing homework or other productive work) (14%) – Don't have consequences related to tech usage for violating tech rules (6%) – Have tried making rules and enforcing them but find it is not an effective strategy (2%)
  • 11. Your Home as an Enterprise • 67% of the households surveyed each have between 1 and 5 devices at home connected to the Internet, while 30% have 6 or more devices and 5% have 11 or more devices. • 30% of those surveyed have 2-3 more Interned connected devices at home today than they did last year
  • 12. Doing a Lot From Home • Banking and finances: – Banking (66%) – Taxes (30%) • Entertainment: – Music streaming (39%) – Social networks (74%) – Gaming (43%) – Streaming TV/movies (45%) • Fitness and health: 16%
  • 13. Doing a Lot From Home Continued • Shopping and e-commerce: – Travel (31%) – Shopping (61%) – Selling merchandise (20% • Storing personal information: – Videos/photos (38%) – Music (36%) – Streaming TV/movies (45%) • Work and homework: – Homework (21%) – Work (28%)
  • 14. Router as the Keys to the Kingdom • 2 in 5 households – more than 40% – did not change the factory set default passwords on their wireless routers • Close to 60% did not (48%) or are not sure (8%) if they changed their router usernames or passwords in the last year • 60% set up their wireless routers on their own
  • 15. Risks are Real • 1 in 5 American households has received notification that their information has been lost in a data breach • Of those affected, 56% have received multiple notifications of being data breach victims • 1 in 5 households has received notification from children’s schools that their children’s information has been lost in a data breach
  • 16. Who’s your family CSO? • Every family needs a family online safety officer – Could be you. Could be a child. – Establishing this role makes sure that someone in the family is keeping up and thinking about security issues and checking in that family members are doing things safely and securely online.
  • 17. Assign Digital Chores • Responsibilities include: – Device management (patches, passwords) – Inventory of all devices connected to the Internet – Backup of data – Data cleanups – Review of social media feeds – Account security (creating long, strong and unique passwords and updating them regularly, implementing multifactor authentication)
  • 18. For Everyone • Keep a clean machine • Get two steps ahead • When in doubt, throw it out • Share with care • Post only about others as you would have them post about you • Personal information is money: value it and protect it
  • 19. For Parents • Help your kids own their online presence. – When available, set their privacy and security settings on websites to your comfort level for information sharing. Remind them that it’s OK to limit how and with whom they share information. • Support their good choices. – Expand your children’s online experience and their autonomy when developmentally appropriate, as they demonstrate competence in safe and secure online behavior and good decision making.
  • 20. For Parents Continued • Explain the implications. – Help your children understand the public nature of the Internet and its risks as well as benefits. – Be sure they know that any digital info they share, such as emails, photos or videos, can easily be copied and pasted elsewhere, and is almost impossible to take back. – Things that could damage their reputation, friendships or future prospects should not be shared electronically. .
  • 21. For Parents Continued • Just saying “no” rarely works. – Teach your children how to interact safely with people they "meet" online. Though it's preferable they make no in-person contact with online-only acquaintances, young people may not always follow this rule. So talk about maximizing safe conditions: meeting only in well-lit public places, always taking at least one friend and telling a trusted adult about any plans they make – including the time, place and acquaintance’s contact information (at least a name and cell phone number). • Empower kids to handle problems, such as bullying, unwanted contact or hurtful comments. – Work with them on strategies for when problems arise, such as talking to a trusted adult, not retaliating, blocking the person or filing a complaint. Agree on steps to take if a strategy fails. .