SlideShare ist ein Scribd-Unternehmen logo
1 von 22
How To Keep Your
Kids Safe Online?
Presenter:
Soumya Patnaik
Head of Content Marketing
Quick Heal Technologies
Hello!
Our children are born and raised
with the Internet as a part of their
daily lives
And they know more about the
Internet than we do!
for
Today To understand what our kids are doing online
 To keep them safe when they’re online
 To teach them to make smart choices when they’re online
 To continue the discussion about Internet safety with our families and others
beyond this webinar
GG OO AA LL SS
Ways In
Which Kids
Access The
Internet
 Mobile Devices including
smartphones and tablets
 Laptops and personal computers
(PCs)
 Video Game Consoles
What Do Kids Do Online?
 Play multiuser games
 Text or instant message one another
 Post profiles and interact with others
 on social networking sites
 View and post videos
 Download music, movies, and more
 Create and upload art
 Do research
Online Troubles
 Exposure to unwanted, disturbing, violent or
adult content
 Cyberbullying
 Viruses, Spyware, Phishing or Other Online
Scams
 Sexual Predators
Inappropriate
Content
Kids who misspell a website
address or click on the wrong link
might stumble on pornographic
images and text, hate speech, or
other inappropriate content.
Cyberbullyin
g
Spreading rumors online or
through text
Spreading rumors online or
through text
Posting hurtful or threatening
messages on social networking
sites
Posting hurtful or threatening
messages on social networking
sites
Taking unflattering pictures of a
person and spreading them
through mobile phones or the
Internet
Taking unflattering pictures of a
person and spreading them
through mobile phones or the
Internet
Stealing a person’s email
account information and using it
to send damaging messages
Stealing a person’s email
account information and using it
to send damaging messages
Pretending to be someone else
online to hurt another person
Pretending to be someone else
online to hurt another person
Sexting or circulating sexually
suggestive pictures or
messages about a person
Sexting or circulating sexually
suggestive pictures or
messages about a person
Malicious
files
Your computer may become infected with viruses and spyware through:
 downloads
 emails
 peer-to-peer networking
 infected websites
Sexual
Predators
These individuals:
 Cover-up as other children or kindly adults
 Trick children into revealing personal information
 Lure children and teenagers into meeting them in person
What Can You Do?
As a parent, model proper behavior for
your kids and instruct them in how they
should behave.
Let them know when they're allowed to
use the computer and where they're
allowed to go on the Internet.
Tell them you want to know right away if
anyone mistreats or insults them. It's only
common sense.
Additionally you can use parental Control.
Types of Parental Control
Hardware Based Protection:
This solution can apply Web content filtering and
Internet time scheduling to all the household's
Internet-aware devices.
However, it can't offer the detailed level of control
and monitoring that a software solution can, and
per-user configuration is also difficult.
Types of Parental Control
Traditional Parental Control:
This simple utility prevents access to inappropriate website. Parents can
decide which websites are inappropriate.
It allows to limit the amount of time spent online, set a schedule for what
time of day Internet use is permitted, or both.
Good Parental Control software should be full-proof against hacking, so a
clever teen can't disable it.
Quick Heal’s Inbuilt Parental Control
Quick Heal’s Inbuilt Parental Control
Quick Heal’s Inbuilt Parental Control
Types of Parental Control
Mobile Parental Control:
These apps can give parents a higher level of control
and monitoring than obtained by filtering at the router
level.
Geo-location based apps can alert parents if the
child leaves designated safety zones.
Some apps have the ability to block texting while
driving.
Have the PC kept in the living room.
Set some ground rules – What sites they can visit, who they can talk to, and how
much time they can spend online.
Research before you buy – understand what technology you are bringing home.
Don’t just sit there – REPORT! – to the website, cell phone service, law
enforcement.
Talk to your kids; they’re not as mysterious as you think – get involved so you’re
not the last to know.
Challenge them to a duel – When you respect their interests, they’re more likely to
respect your rules.
Don’t pull the plug – taking away their Internet access because they’ve done
something wrong doesn’t solve the problem.
Supervise Internet use – if you can see what your kids are doing they are less
likely to get into trouble.
Safeguards = Safe Kids – Technology cannot replace your time and attention as a
parent or guardian.
Don’t go overboard – while it is smart to keep an eye, it’s not cool to post
embarrassing messages or pictures to their page.
Decide on what kind of controls to enable and have a mix of parental controls to
ensure your kid’s safety.
Quick Heal Solutions with Inbuilt Parental
Control
Quick Heal Desktop and Mobile Solutions such as Quick Heal Total Security, Internet
Security, Total Security for Mac, Tablet Security and Total Security for Android come with a
powerful parental control feature.
All these solutions are available at http://www.quickheal.co.in/home-users
You can also purchase from your local Quick Heal Dealer
Locate your nearest Dealer at http://www.quickheal.co.in/quick-heal-dealer
Or Call us on +91 927-22-33-000
Thank You!
corporatecommunications@quickheal.co.in

Weitere ähnliche Inhalte

Mehr von Quick Heal Technologies Ltd.

Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 
7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android PhoneQuick Heal Technologies Ltd.
 

Mehr von Quick Heal Technologies Ltd. (20)

Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 
Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016
 
Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016
 
25th Japan IT Week 2016
25th Japan IT Week 201625th Japan IT Week 2016
25th Japan IT Week 2016
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 
6 Tips to Protect Your Kids from Cyberbullying
6 Tips to Protect Your Kids from Cyberbullying6 Tips to Protect Your Kids from Cyberbullying
6 Tips to Protect Your Kids from Cyberbullying
 
7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 

How to Keep your Kids Safe Online

  • 1. How To Keep Your Kids Safe Online? Presenter: Soumya Patnaik Head of Content Marketing Quick Heal Technologies
  • 2. Hello! Our children are born and raised with the Internet as a part of their daily lives And they know more about the Internet than we do!
  • 3. for Today To understand what our kids are doing online  To keep them safe when they’re online  To teach them to make smart choices when they’re online  To continue the discussion about Internet safety with our families and others beyond this webinar GG OO AA LL SS
  • 4. Ways In Which Kids Access The Internet  Mobile Devices including smartphones and tablets  Laptops and personal computers (PCs)  Video Game Consoles
  • 5. What Do Kids Do Online?  Play multiuser games  Text or instant message one another  Post profiles and interact with others  on social networking sites  View and post videos  Download music, movies, and more  Create and upload art  Do research
  • 6. Online Troubles  Exposure to unwanted, disturbing, violent or adult content  Cyberbullying  Viruses, Spyware, Phishing or Other Online Scams  Sexual Predators
  • 7. Inappropriate Content Kids who misspell a website address or click on the wrong link might stumble on pornographic images and text, hate speech, or other inappropriate content.
  • 8. Cyberbullyin g Spreading rumors online or through text Spreading rumors online or through text Posting hurtful or threatening messages on social networking sites Posting hurtful or threatening messages on social networking sites Taking unflattering pictures of a person and spreading them through mobile phones or the Internet Taking unflattering pictures of a person and spreading them through mobile phones or the Internet Stealing a person’s email account information and using it to send damaging messages Stealing a person’s email account information and using it to send damaging messages Pretending to be someone else online to hurt another person Pretending to be someone else online to hurt another person Sexting or circulating sexually suggestive pictures or messages about a person Sexting or circulating sexually suggestive pictures or messages about a person
  • 9. Malicious files Your computer may become infected with viruses and spyware through:  downloads  emails  peer-to-peer networking  infected websites
  • 10. Sexual Predators These individuals:  Cover-up as other children or kindly adults  Trick children into revealing personal information  Lure children and teenagers into meeting them in person
  • 11. What Can You Do? As a parent, model proper behavior for your kids and instruct them in how they should behave. Let them know when they're allowed to use the computer and where they're allowed to go on the Internet. Tell them you want to know right away if anyone mistreats or insults them. It's only common sense. Additionally you can use parental Control.
  • 12. Types of Parental Control Hardware Based Protection: This solution can apply Web content filtering and Internet time scheduling to all the household's Internet-aware devices. However, it can't offer the detailed level of control and monitoring that a software solution can, and per-user configuration is also difficult.
  • 13. Types of Parental Control Traditional Parental Control: This simple utility prevents access to inappropriate website. Parents can decide which websites are inappropriate. It allows to limit the amount of time spent online, set a schedule for what time of day Internet use is permitted, or both. Good Parental Control software should be full-proof against hacking, so a clever teen can't disable it.
  • 14. Quick Heal’s Inbuilt Parental Control
  • 15. Quick Heal’s Inbuilt Parental Control
  • 16. Quick Heal’s Inbuilt Parental Control
  • 17. Types of Parental Control Mobile Parental Control: These apps can give parents a higher level of control and monitoring than obtained by filtering at the router level. Geo-location based apps can alert parents if the child leaves designated safety zones. Some apps have the ability to block texting while driving.
  • 18. Have the PC kept in the living room. Set some ground rules – What sites they can visit, who they can talk to, and how much time they can spend online. Research before you buy – understand what technology you are bringing home. Don’t just sit there – REPORT! – to the website, cell phone service, law enforcement.
  • 19. Talk to your kids; they’re not as mysterious as you think – get involved so you’re not the last to know. Challenge them to a duel – When you respect their interests, they’re more likely to respect your rules. Don’t pull the plug – taking away their Internet access because they’ve done something wrong doesn’t solve the problem. Supervise Internet use – if you can see what your kids are doing they are less likely to get into trouble.
  • 20. Safeguards = Safe Kids – Technology cannot replace your time and attention as a parent or guardian. Don’t go overboard – while it is smart to keep an eye, it’s not cool to post embarrassing messages or pictures to their page. Decide on what kind of controls to enable and have a mix of parental controls to ensure your kid’s safety.
  • 21. Quick Heal Solutions with Inbuilt Parental Control Quick Heal Desktop and Mobile Solutions such as Quick Heal Total Security, Internet Security, Total Security for Mac, Tablet Security and Total Security for Android come with a powerful parental control feature. All these solutions are available at http://www.quickheal.co.in/home-users You can also purchase from your local Quick Heal Dealer Locate your nearest Dealer at http://www.quickheal.co.in/quick-heal-dealer Or Call us on +91 927-22-33-000

Hinweis der Redaktion

  1. Parental Control is a powerful feature of most of Quick Heal Desktop and Mobile Products. The feature allows user-based restrictions, website and website category based restrictions. It also allows you to schedule access.