SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Internet & PC safety Alternative titles for this chat PC common-sense… because we need to be reminded Some tricks to trick the tricksters De-Geeking geek stuff Being consistent in your real-world and e-world By: Paul Southern
Presentation Notes Paul Southern Speaker: Paul Southern Content Manager: Presentation date/time: 19 Jan 2010 Title of presentation: Internet Safety Length of presentation 30 (including Q&A) Name of Event: PTA General Meeting Location of Event: CIS (Canadian International School, Singapore) , Toh Tuck campus Audience: Public, non NDA http://www.cis.edu.sg/cis/newsletter/week_newsletter_1011/TT%20WAG%20-%2017%20DECEMBER%202010.pdf Press Announcement:
NOTE This version of my presentation is for distribution on the CIS website. This is not necessarily authoritative nor instructional nor prescriptive as this is a deck that assisted a talk. You are free to use and distribute this. Any use is at your risk.  I’m happy to help and can be contacted via the CIS PTA.
Paul Southern PTA, member at large Ex-Microsoft Communications and Media sector and TV solutions… not Windows or Internet Security Child Exploitation and Tracking System (CETS) A little bit, 2007  Reader's Digest, Canadian edition, Mar 2006 http://www.microsoft.com/industry/publicsector/government/programs/CETsabout.mspx
What’s happening today Online presence – 92% of US toddlers Social engineering, befriending, 419, cyber-bully Privacy pendulum Patriot Act (and others) Syndication of cyber-crime, corps to users Smartphones and apps Choice fatigue on online-safety !
Today’s topics Physical protection Backups Virus protection Passwords Social Networks Privacy Your child’s PC
Physical Security
Physical security Always Screen saver with password-resume At home Laptop: external monitor, keyboard, closed, on shelf While out Good case, case in bag Keyboard protector Cable lock (deterrent) Privacy filter on screen Who’s behind you?
Aalok – PC + USB HDD Thesis on burnt PC Donny and keyboard Backups
Backups What to backup Product key for Windows, Office, etc… (photo) Recovery Disk – OS + drivers Data, eg: My Documents, etc... Where USB harddrive, offsite, safe YouTube, Flickr, SkyDrive, etc… Backup the backup Protecting the backup
Virus protection
Virus protection Use it or lose it ! Program & definitions Rogue versus real Mac/PC, Licensed/pirate, XP/Vista/Win7 Microsoft Security Essentials Not Microsoft Security Essentials 2011
Passwords
Passwords We’re drowning in passwords ! Categories High: breach impactful, eg: banking, PayPal, email, FB, tax Medium, eg: airlines/hotels, eBay, Amazon, etc… Low, eg: OttawaSenators.com, etc… Secret questions, eg: mother’s maiden name, car, pet How remember Codes, eg: 6N, 4N4L UC/lc, a1, $&#, abc/hmq, EN/other, length Forced expiry Windows LiveID, GoogleID, etc… Password locker app, PW protected XLS/DOC file
Social Networks
Social Networks Move from not-trusted to trusted to pragmatic Mix of cyber ghettos to professional Mobile app, location based
Social Networks Main social networks LinkedIn – professional Facebook – personal YouTube, Flickr, Picasa, etc… Multiple FB personas ?
Privacy
Privacy The internet makes the same old threats easier: Accessible Collect, historical Search Correlation Across your profiles, with others
Facebook privacy settings Facebook recommends My settings
Facebook privacy settings (in Customize) Set to “Only me” My settings Set to “Disable”
Facebook Connect
Foursquare
Privacy - phone apps Two separate class-action lawsuits filed last week in federal court allege that Apple and as many as eight makers of popular applications for the iPhone facilitated the sharing of private information about their customers to advertisers. "their personal, private information was obtained without their knowledge or consent ... their personal property -- their computer -- was hijacked by Defendants and turned into a device capable of spying on their every online move."
Your children’s PC
Your children’s PC Where is it ? Can you see it ALL the time ? Can you see what they are doing ? Passwords Email, chat, etc.. Chat online only with real-world friends IE8, family settings
Internet Explorer 8
Windows Live Family Safety
Top Takeaways Antivirus – use it or lose it Backups – do it or lose it Physical protection – have it or lose it Social Networks – FB privacy settings Passwords Your child’s PC – Family settings, location
Links Microsoft Security Essentials: http://www.microsoft.com/Security_Essentials/ 2 Interesting articles on privacy: WSJ – What They Know: http://blogs.wsj.com/wtk/ CNN – The End of Privacy: http://edition.cnn.com/SPECIALS/2010/end.of.privacy/ Online safety ITU Child Online Protection: http://www.itu.int/osg/csd/cybersecurity/gca/cop/children.html Microsoft: http://www.microsoft.com/protect/ Yahoo : http://safely.yahoo.com/ Kidsmart: http://www.kidsmart.org.uk/ GetNetWise: http://www.getnetwise.com/ Singapore NCPC: http://www.ncpc.gov.sg/ (go to publications) CEOP: http://www.thinkuknow.com/ Disney: http://www.disney.co.uk/DisneyOnline/Safesurfing/
Dec 2008 PTA meeting Mr. Julian Lim, from www.asknlearn.com, spoke at the December PTA general meeting. He told parentsthat they have a responsibility to become part of the cyber/virtual reality world so that they can speak intelligently with their children about using the Internet. Parents should be actively involved in their children’s computer time as early as possible. Computers in the home should be in a family zone so that it is easy to see who is doing what on line (not in child’s bedroom). Children should be given limits as to the time of day and length of time on the computer (only effective if parents enforce the rules). It is important that our children understand that they should never give personal information– full name, age, address, etc. on websites. They must CHAT online only with people they know OFF LINE. Cyber bullying is a real problem today. Monitor you children’s emails for rude or hurtful communication. Counsel your own children on what is appropriate language for emails. They should report abusive emails to parents, school or even authorities if necessary. Playing online games has become a social aspect of computer use for our children. Parents must be careful that children do not avoid real friend time for virtual friend time. Gaming addiction is a real danger.

Weitere ähnliche Inhalte

Was ist angesagt?

Do you really want to be my friend? Abbreviated version, Helsinki 2008.
Do you really want to be my friend? Abbreviated version, Helsinki 2008.Do you really want to be my friend? Abbreviated version, Helsinki 2008.
Do you really want to be my friend? Abbreviated version, Helsinki 2008.Pär Lannerö
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Web 2.0: the Top 10 Technologies
Web 2.0: the Top 10 TechnologiesWeb 2.0: the Top 10 Technologies
Web 2.0: the Top 10 Technologies2thinknow & Co.
 
VSCPA Richmond Chapter: Social Media Presentation
VSCPA Richmond Chapter: Social Media PresentationVSCPA Richmond Chapter: Social Media Presentation
VSCPA Richmond Chapter: Social Media PresentationTina Lambert
 
The Power of Social Media: Taking Your Networking Online
The Power of Social Media: Taking Your Networking OnlineThe Power of Social Media: Taking Your Networking Online
The Power of Social Media: Taking Your Networking OnlineTina Lambert
 
Social Media Webinar Handouts June 2010
Social Media Webinar Handouts June 2010Social Media Webinar Handouts June 2010
Social Media Webinar Handouts June 2010Tina Lambert
 
Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social MediaZain Abid
 
Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010megan.fitzgibbons
 
L3 Emerging Technologies
L3 Emerging TechnologiesL3 Emerging Technologies
L3 Emerging TechnologiesFrances Bell
 
Social Media Is My Business Spring 2010 Class One
Social Media Is My Business   Spring 2010   Class OneSocial Media Is My Business   Spring 2010   Class One
Social Media Is My Business Spring 2010 Class OneJeff Yaniga
 
Sami Ben Gharbia - State of free speech in world blogosphere
Sami Ben Gharbia - State of free speech in world blogosphereSami Ben Gharbia - State of free speech in world blogosphere
Sami Ben Gharbia - State of free speech in world blogosphereKrystian Cieślak
 
VSCPA Board Retreat: Social Media Presentation
VSCPA Board Retreat: Social Media PresentationVSCPA Board Retreat: Social Media Presentation
VSCPA Board Retreat: Social Media PresentationTina Lambert
 
Dit Present 2
Dit Present 2Dit Present 2
Dit Present 2Jar566
 
Week 4 digital overload and privacy
Week 4 digital overload and privacyWeek 4 digital overload and privacy
Week 4 digital overload and privacyRay Brannon
 
Understanding Kids in the Digital World
Understanding Kids in the Digital WorldUnderstanding Kids in the Digital World
Understanding Kids in the Digital Worldkschermerhorn
 

Was ist angesagt? (19)

Do you really want to be my friend? Abbreviated version, Helsinki 2008.
Do you really want to be my friend? Abbreviated version, Helsinki 2008.Do you really want to be my friend? Abbreviated version, Helsinki 2008.
Do you really want to be my friend? Abbreviated version, Helsinki 2008.
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Web 2.0: the Top 10 Technologies
Web 2.0: the Top 10 TechnologiesWeb 2.0: the Top 10 Technologies
Web 2.0: the Top 10 Technologies
 
VSCPA Richmond Chapter: Social Media Presentation
VSCPA Richmond Chapter: Social Media PresentationVSCPA Richmond Chapter: Social Media Presentation
VSCPA Richmond Chapter: Social Media Presentation
 
The Power of Social Media: Taking Your Networking Online
The Power of Social Media: Taking Your Networking OnlineThe Power of Social Media: Taking Your Networking Online
The Power of Social Media: Taking Your Networking Online
 
Social Media Webinar Handouts June 2010
Social Media Webinar Handouts June 2010Social Media Webinar Handouts June 2010
Social Media Webinar Handouts June 2010
 
La Pecera 4
La Pecera 4La Pecera 4
La Pecera 4
 
Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social Media
 
Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010
 
L3 Emerging Technologies
L3 Emerging TechnologiesL3 Emerging Technologies
L3 Emerging Technologies
 
My Space
My SpaceMy Space
My Space
 
Social Media Is My Business Spring 2010 Class One
Social Media Is My Business   Spring 2010   Class OneSocial Media Is My Business   Spring 2010   Class One
Social Media Is My Business Spring 2010 Class One
 
Social networking
Social networkingSocial networking
Social networking
 
Sami Ben Gharbia - State of free speech in world blogosphere
Sami Ben Gharbia - State of free speech in world blogosphereSami Ben Gharbia - State of free speech in world blogosphere
Sami Ben Gharbia - State of free speech in world blogosphere
 
VSCPA Board Retreat: Social Media Presentation
VSCPA Board Retreat: Social Media PresentationVSCPA Board Retreat: Social Media Presentation
VSCPA Board Retreat: Social Media Presentation
 
Dit Present 2
Dit Present 2Dit Present 2
Dit Present 2
 
Web 2 At Nwtc Final
Web 2 At Nwtc FinalWeb 2 At Nwtc Final
Web 2 At Nwtc Final
 
Week 4 digital overload and privacy
Week 4 digital overload and privacyWeek 4 digital overload and privacy
Week 4 digital overload and privacy
 
Understanding Kids in the Digital World
Understanding Kids in the Digital WorldUnderstanding Kids in the Digital World
Understanding Kids in the Digital World
 

Andere mochten auch

Response to the Media Development Authority of Singapore’s Public Consultatio...
Response to the Media Development Authority of Singapore’s Public Consultatio...Response to the Media Development Authority of Singapore’s Public Consultatio...
Response to the Media Development Authority of Singapore’s Public Consultatio...PasocoPteLtd
 
Sitf 1006xx-can publish
Sitf 1006xx-can publishSitf 1006xx-can publish
Sitf 1006xx-can publishPasocoPteLtd
 
Evolution Of Search And Its Impact On Marketing
Evolution Of Search And Its Impact On MarketingEvolution Of Search And Its Impact On Marketing
Evolution Of Search And Its Impact On Marketingmahdaviani
 
Evolution Of Search And Its Impact On Marketing
Evolution Of Search And Its Impact On MarketingEvolution Of Search And Its Impact On Marketing
Evolution Of Search And Its Impact On Marketingmahdaviani
 
Tecnologia no Brasil
Tecnologia no BrasilTecnologia no Brasil
Tecnologia no Brasilmaurcmont
 
Pasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-publicPasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-publicPasocoPteLtd
 
Ch. 9 generating and testing hypotheses
Ch. 9 generating and testing hypothesesCh. 9 generating and testing hypotheses
Ch. 9 generating and testing hypotheseshgrubbs
 

Andere mochten auch (7)

Response to the Media Development Authority of Singapore’s Public Consultatio...
Response to the Media Development Authority of Singapore’s Public Consultatio...Response to the Media Development Authority of Singapore’s Public Consultatio...
Response to the Media Development Authority of Singapore’s Public Consultatio...
 
Sitf 1006xx-can publish
Sitf 1006xx-can publishSitf 1006xx-can publish
Sitf 1006xx-can publish
 
Evolution Of Search And Its Impact On Marketing
Evolution Of Search And Its Impact On MarketingEvolution Of Search And Its Impact On Marketing
Evolution Of Search And Its Impact On Marketing
 
Evolution Of Search And Its Impact On Marketing
Evolution Of Search And Its Impact On MarketingEvolution Of Search And Its Impact On Marketing
Evolution Of Search And Its Impact On Marketing
 
Tecnologia no Brasil
Tecnologia no BrasilTecnologia no Brasil
Tecnologia no Brasil
 
Pasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-publicPasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-public
 
Ch. 9 generating and testing hypotheses
Ch. 9 generating and testing hypothesesCh. 9 generating and testing hypotheses
Ch. 9 generating and testing hypotheses
 

Ähnlich wie Internet safety tips for families

Social networks and professionalism
Social networks and professionalismSocial networks and professionalism
Social networks and professionalismKaren Brooks
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Remote Working in a 2.0 World
Remote Working in a 2.0 WorldRemote Working in a 2.0 World
Remote Working in a 2.0 WorldMarieke Guy
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersBrian Sharland
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jayjstaker
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jayjstaker
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
CIO and Social Media ITS10
CIO and Social Media ITS10CIO and Social Media ITS10
CIO and Social Media ITS10Thomas Danford
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsErnest Staats
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Connecting And Sharing Online Pres
Connecting And Sharing Online   PresConnecting And Sharing Online   Pres
Connecting And Sharing Online PresBryan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 

Ähnlich wie Internet safety tips for families (20)

Social networks and professionalism
Social networks and professionalismSocial networks and professionalism
Social networks and professionalism
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Remote Working in a 2.0 World
Remote Working in a 2.0 WorldRemote Working in a 2.0 World
Remote Working in a 2.0 World
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
CIO and Social Media ITS10
CIO and Social Media ITS10CIO and Social Media ITS10
CIO and Social Media ITS10
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Connecting And Sharing Online Pres
Connecting And Sharing Online   PresConnecting And Sharing Online   Pres
Connecting And Sharing Online Pres
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

Internet safety tips for families

  • 1. Internet & PC safety Alternative titles for this chat PC common-sense… because we need to be reminded Some tricks to trick the tricksters De-Geeking geek stuff Being consistent in your real-world and e-world By: Paul Southern
  • 2. Presentation Notes Paul Southern Speaker: Paul Southern Content Manager: Presentation date/time: 19 Jan 2010 Title of presentation: Internet Safety Length of presentation 30 (including Q&A) Name of Event: PTA General Meeting Location of Event: CIS (Canadian International School, Singapore) , Toh Tuck campus Audience: Public, non NDA http://www.cis.edu.sg/cis/newsletter/week_newsletter_1011/TT%20WAG%20-%2017%20DECEMBER%202010.pdf Press Announcement:
  • 3. NOTE This version of my presentation is for distribution on the CIS website. This is not necessarily authoritative nor instructional nor prescriptive as this is a deck that assisted a talk. You are free to use and distribute this. Any use is at your risk. I’m happy to help and can be contacted via the CIS PTA.
  • 4. Paul Southern PTA, member at large Ex-Microsoft Communications and Media sector and TV solutions… not Windows or Internet Security Child Exploitation and Tracking System (CETS) A little bit, 2007 Reader's Digest, Canadian edition, Mar 2006 http://www.microsoft.com/industry/publicsector/government/programs/CETsabout.mspx
  • 5. What’s happening today Online presence – 92% of US toddlers Social engineering, befriending, 419, cyber-bully Privacy pendulum Patriot Act (and others) Syndication of cyber-crime, corps to users Smartphones and apps Choice fatigue on online-safety !
  • 6.
  • 7. Today’s topics Physical protection Backups Virus protection Passwords Social Networks Privacy Your child’s PC
  • 9. Physical security Always Screen saver with password-resume At home Laptop: external monitor, keyboard, closed, on shelf While out Good case, case in bag Keyboard protector Cable lock (deterrent) Privacy filter on screen Who’s behind you?
  • 10. Aalok – PC + USB HDD Thesis on burnt PC Donny and keyboard Backups
  • 11. Backups What to backup Product key for Windows, Office, etc… (photo) Recovery Disk – OS + drivers Data, eg: My Documents, etc... Where USB harddrive, offsite, safe YouTube, Flickr, SkyDrive, etc… Backup the backup Protecting the backup
  • 13. Virus protection Use it or lose it ! Program & definitions Rogue versus real Mac/PC, Licensed/pirate, XP/Vista/Win7 Microsoft Security Essentials Not Microsoft Security Essentials 2011
  • 14.
  • 16. Passwords We’re drowning in passwords ! Categories High: breach impactful, eg: banking, PayPal, email, FB, tax Medium, eg: airlines/hotels, eBay, Amazon, etc… Low, eg: OttawaSenators.com, etc… Secret questions, eg: mother’s maiden name, car, pet How remember Codes, eg: 6N, 4N4L UC/lc, a1, $&#, abc/hmq, EN/other, length Forced expiry Windows LiveID, GoogleID, etc… Password locker app, PW protected XLS/DOC file
  • 18. Social Networks Move from not-trusted to trusted to pragmatic Mix of cyber ghettos to professional Mobile app, location based
  • 19. Social Networks Main social networks LinkedIn – professional Facebook – personal YouTube, Flickr, Picasa, etc… Multiple FB personas ?
  • 21. Privacy The internet makes the same old threats easier: Accessible Collect, historical Search Correlation Across your profiles, with others
  • 22. Facebook privacy settings Facebook recommends My settings
  • 23. Facebook privacy settings (in Customize) Set to “Only me” My settings Set to “Disable”
  • 26. Privacy - phone apps Two separate class-action lawsuits filed last week in federal court allege that Apple and as many as eight makers of popular applications for the iPhone facilitated the sharing of private information about their customers to advertisers. "their personal, private information was obtained without their knowledge or consent ... their personal property -- their computer -- was hijacked by Defendants and turned into a device capable of spying on their every online move."
  • 28. Your children’s PC Where is it ? Can you see it ALL the time ? Can you see what they are doing ? Passwords Email, chat, etc.. Chat online only with real-world friends IE8, family settings
  • 31.
  • 32. Top Takeaways Antivirus – use it or lose it Backups – do it or lose it Physical protection – have it or lose it Social Networks – FB privacy settings Passwords Your child’s PC – Family settings, location
  • 33. Links Microsoft Security Essentials: http://www.microsoft.com/Security_Essentials/ 2 Interesting articles on privacy: WSJ – What They Know: http://blogs.wsj.com/wtk/ CNN – The End of Privacy: http://edition.cnn.com/SPECIALS/2010/end.of.privacy/ Online safety ITU Child Online Protection: http://www.itu.int/osg/csd/cybersecurity/gca/cop/children.html Microsoft: http://www.microsoft.com/protect/ Yahoo : http://safely.yahoo.com/ Kidsmart: http://www.kidsmart.org.uk/ GetNetWise: http://www.getnetwise.com/ Singapore NCPC: http://www.ncpc.gov.sg/ (go to publications) CEOP: http://www.thinkuknow.com/ Disney: http://www.disney.co.uk/DisneyOnline/Safesurfing/
  • 34. Dec 2008 PTA meeting Mr. Julian Lim, from www.asknlearn.com, spoke at the December PTA general meeting. He told parentsthat they have a responsibility to become part of the cyber/virtual reality world so that they can speak intelligently with their children about using the Internet. Parents should be actively involved in their children’s computer time as early as possible. Computers in the home should be in a family zone so that it is easy to see who is doing what on line (not in child’s bedroom). Children should be given limits as to the time of day and length of time on the computer (only effective if parents enforce the rules). It is important that our children understand that they should never give personal information– full name, age, address, etc. on websites. They must CHAT online only with people they know OFF LINE. Cyber bullying is a real problem today. Monitor you children’s emails for rude or hurtful communication. Counsel your own children on what is appropriate language for emails. They should report abusive emails to parents, school or even authorities if necessary. Playing online games has become a social aspect of computer use for our children. Parents must be careful that children do not avoid real friend time for virtual friend time. Gaming addiction is a real danger.