SlideShare ist ein Scribd-Unternehmen logo
1 von 13
PAGE 1

Internet Safety and Security
Presented January 13, 2014

Company Proprietary and Confidential
Company Proprietary and Confidential
Introductions

PAGE 2

Me:
• Austin Stroud – Instructional Designer at
the Monroe County Public Library
• Heavy Internet user since the mid-1990s

You:
• Do you use the Internet regularly?
• If so, what do you use the Internet for?
• What questions about Internet safety and
security do you hope to have answered
today?

Company Proprietary and Confidential
Company Proprietary and Confidential
Needs Assessment

PAGE 3

Let’s all take a short, multiple-choice
assessment to test your current
knowledge about Internet safety and
security: http://tinyurl.com/kkuxas8
No pressure, this is just for fun so no
worries if you don’t know a lot of the
answers. That’s what this program is
for!

This assessment is adapted from
www.getsafeonline.org.

Company Proprietary and Confidential
Company Proprietary and Confidential
Passwords

PAGE 4

Tips For Creating Strong Passwords (from www.gcflearnfree.org):
•
•
•
•
•
•
•

Never use personal information such as your name, birthday, or spouse's name. Personal
information is often publicly available, which makes it much easier for someone to guess your
password.
Use a longer password. Your password should be at least six characters long, and for extra
security it should ideally be at least twelve characters (if the site allows it).
If you need to write down your passwords, keep them in a secure place. It's even better if you
"encrypt" your passwords or just write down hints for them that others won't be able to understand.
Don't use the same password for each account. If someone does discover your password for one
account, all of your other accounts will be vulnerable.
Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it).
Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very
weak password.
Random passwords are the strongest. Use a password generator
(www.strongpasswordgenerator.com instead of trying to think of your own. Random
passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be
remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of
practice it becomes relatively easy to memorize.

The infographic (http://tinyurl.com/k9cqnj7) I handed out (also from www.gcflearnfree.org) gives
more password advice.

Company Proprietary and Confidential
Company Proprietary and Confidential
Online Security – Phishing Scams

PAGE 5

We are going to watch this short video about
phishing scams from the AARP:
http://www.youtube.com/watch?v=H5QMjLRI24E
Let’s also take a look at this interactive email to see
how deceptive phishing scams can be:
http://www.gcflearnfree.org/internetsafety/4.3

Company Proprietary and Confidential
Company Proprietary and Confidential
Securing Financial Transactions

PAGE 6

Let’s learn more about ensuring a website is
secure before you complete any financial
transactions on the Internet:
http://www.gcflearnfree.org/internetsafety/6.2
We also can take a look at this interactive tool to
see what you should be looking for in a website
before inputting any of your sensitive, private
information:
http://www.gcflearnfree.org/internetsafety/6.5

Company Proprietary and Confidential
Company Proprietary and Confidential
Protecting Your Computer

PAGE 7

Now, we’ll take a look at how to protect your
computer from Internet threats by ensuring your
computer is protected by anti-virus software and
receives regular updates:
http://www.gcflearnfree.org/internetsafety/3

Company Proprietary and Confidential
Company Proprietary and Confidential
Safe Social Networking

PAGE 8

Stay safe on websites like Facebook, Twitter, LinkedIn, YouTube, and
more: http://www.gcflearnfree.org/internetsafety/7
The Privacy Rights Clearinghouse provides a full list of resources for
learning about your privacy rights in the online environment:
https://www.privacyrights.org/Online-Privacy-and-Technology

Company Proprietary and Confidential
Company Proprietary and Confidential
How Secure is Your Information?

PAGE 9

Let’s all go to www.google.com on the Internet and
search for your own name. Example: My name is
Austin Stroud so I will type in Austin Stroud into the
search box and click search. Search for your own
name instead of mine.
•

What kinds of things did you find (if you feel
comfortable sharing)?

•

Were you surprised by what you were able to
find about yourself openly on the Internet?

Company Proprietary and Confidential
Company Proprietary and Confidential
Children
•

PAGE 10

Some resources to protect your children on the Internet:
–
–
–
–

www.gcflearnfree.org/internetsafetyforkids (Internet safety for kids online course)
www.commonsensemedia.org/advice-for-parents/internet-safety-and-privacy (Several
videos targeted at parents and children for Internet safety and security)
www.att.com/Common/images/safety/game.html (A game you can play with your
children to help them learn about Internet safety and security)
www.mcpl.info/childrens/internet-safety-tips-kids (Internet safety tips for kids from
the library)

Company Proprietary and Confidential
Company Proprietary and Confidential
Additional Resources

PAGE 11

•

http://www.gcflearnfree.org/internetsafety (A full course on Internet
safety and security – we viewed portions of it today)

•

http://tinyurl.com/7hgkkrm (Microsoft’s family safety website with
tips, articles, and tutorials)

•

http://www.library.kent.edu/files/webevalform.pdf (A form to help you
evaluate websites on the Internet to ensure they are credible/safe)

Company Proprietary and Confidential
Company Proprietary and Confidential
Questions?

PAGE 12

Company Proprietary and Confidential
Company Proprietary and Confidential
Contact Information

PAGE 13

Austin Stroud
Instructional Designer
812-349-3050 ext. 1666
astroud@mcpl.info

The library also offers free, 1-hour, 1-on-1
sessions to help with basic technology
questions. If interested in scheduling one
of these sessions with a reference staff
member, call 812-349-3228 or fill out a
form on the library website:
http://tinyurl.com/kxzdfxz

Company Proprietary and Confidential
Company Proprietary and Confidential

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (20)

Uof t symposium competencies
Uof t symposium   competenciesUof t symposium   competencies
Uof t symposium competencies
 
STEAM in Youth Programming
STEAM in Youth ProgrammingSTEAM in Youth Programming
STEAM in Youth Programming
 
Meaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matterMeaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matter
 
Build an Event Calendar in Drupal
Build an Event Calendar in DrupalBuild an Event Calendar in Drupal
Build an Event Calendar in Drupal
 
Programming ideas
Programming ideasProgramming ideas
Programming ideas
 
Harvard March 2014 transformation future library
Harvard March 2014 transformation   future libraryHarvard March 2014 transformation   future library
Harvard March 2014 transformation future library
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
 
Beyond the Gig Economy
Beyond the Gig EconomyBeyond the Gig Economy
Beyond the Gig Economy
 
Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020
 
3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior
 
African Americans: College Majors and Earnings
African Americans: College Majors and Earnings African Americans: College Majors and Earnings
African Americans: College Majors and Earnings
 
The Online College Labor Market
The Online College Labor MarketThe Online College Labor Market
The Online College Labor Market
 
Game Based Learning for Language Learners
Game Based Learning for Language LearnersGame Based Learning for Language Learners
Game Based Learning for Language Learners
 
What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?
 
SXSW 2016 takeaways
SXSW 2016 takeawaysSXSW 2016 takeaways
SXSW 2016 takeaways
 
SXSW 2016: The Need To Knows
SXSW 2016: The Need To KnowsSXSW 2016: The Need To Knows
SXSW 2016: The Need To Knows
 
The French Revolution of 1789
The French Revolution of 1789The French Revolution of 1789
The French Revolution of 1789
 
Digitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityDigitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and Identity
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom
 

Ähnlich wie Internet Safety & Security

Friend is Not A Verb
Friend is Not A VerbFriend is Not A Verb
Friend is Not A Verb
Andy Smith
 
Week 4 digital overload and privacy
Week 4 digital overload and privacyWeek 4 digital overload and privacy
Week 4 digital overload and privacy
Ray Brannon
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
Steve Sokoloski
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
Joy Dugayo
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
safetyseminar
 

Ähnlich wie Internet Safety & Security (20)

Friend is Not A Verb
Friend is Not A VerbFriend is Not A Verb
Friend is Not A Verb
 
Week 4 digital overload and privacy
Week 4 digital overload and privacyWeek 4 digital overload and privacy
Week 4 digital overload and privacy
 
Content is ux
Content is uxContent is ux
Content is ux
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Users guide
Users guideUsers guide
Users guide
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 

Mehr von Austin Stroud

Marketing through Social Media
Marketing through Social MediaMarketing through Social Media
Marketing through Social Media
Austin Stroud
 
Public Library Services: My Path & Experiences
Public Library Services:  My Path & ExperiencesPublic Library Services:  My Path & Experiences
Public Library Services: My Path & Experiences
Austin Stroud
 
The Life of an Instructional Librarian
The Life of an Instructional LibrarianThe Life of an Instructional Librarian
The Life of an Instructional Librarian
Austin Stroud
 
Presenting with PowerPoint
Presenting with PowerPointPresenting with PowerPoint
Presenting with PowerPoint
Austin Stroud
 

Mehr von Austin Stroud (16)

Rotary Classification Talk
Rotary Classification TalkRotary Classification Talk
Rotary Classification Talk
 
Assistive Technologies @ Your Library
Assistive Technologies @ Your Library Assistive Technologies @ Your Library
Assistive Technologies @ Your Library
 
Battle FUD* at Your Library
Battle FUD* at Your LibraryBattle FUD* at Your Library
Battle FUD* at Your Library
 
Marketing through Social Media
Marketing through Social MediaMarketing through Social Media
Marketing through Social Media
 
Organizing and Editing Your Photos
Organizing and Editing Your PhotosOrganizing and Editing Your Photos
Organizing and Editing Your Photos
 
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
 
Public Library Services: My Path & Experiences
Public Library Services:  My Path & ExperiencesPublic Library Services:  My Path & Experiences
Public Library Services: My Path & Experiences
 
The Life of an Instructional Librarian
The Life of an Instructional LibrarianThe Life of an Instructional Librarian
The Life of an Instructional Librarian
 
Presenting with PowerPoint
Presenting with PowerPointPresenting with PowerPoint
Presenting with PowerPoint
 
Facebook101
Facebook101Facebook101
Facebook101
 
Typing 3
Typing 3Typing 3
Typing 3
 
Typing 2
Typing 2Typing 2
Typing 2
 
Typing 1
Typing 1Typing 1
Typing 1
 
Basic computing
Basic computingBasic computing
Basic computing
 
Email101
Email101Email101
Email101
 
Facebook virality
Facebook viralityFacebook virality
Facebook virality
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Internet Safety & Security

  • 1. PAGE 1 Internet Safety and Security Presented January 13, 2014 Company Proprietary and Confidential Company Proprietary and Confidential
  • 2. Introductions PAGE 2 Me: • Austin Stroud – Instructional Designer at the Monroe County Public Library • Heavy Internet user since the mid-1990s You: • Do you use the Internet regularly? • If so, what do you use the Internet for? • What questions about Internet safety and security do you hope to have answered today? Company Proprietary and Confidential Company Proprietary and Confidential
  • 3. Needs Assessment PAGE 3 Let’s all take a short, multiple-choice assessment to test your current knowledge about Internet safety and security: http://tinyurl.com/kkuxas8 No pressure, this is just for fun so no worries if you don’t know a lot of the answers. That’s what this program is for! This assessment is adapted from www.getsafeonline.org. Company Proprietary and Confidential Company Proprietary and Confidential
  • 4. Passwords PAGE 4 Tips For Creating Strong Passwords (from www.gcflearnfree.org): • • • • • • • Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it much easier for someone to guess your password. Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least twelve characters (if the site allows it). If you need to write down your passwords, keep them in a secure place. It's even better if you "encrypt" your passwords or just write down hints for them that others won't be able to understand. Don't use the same password for each account. If someone does discover your password for one account, all of your other accounts will be vulnerable. Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it). Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very weak password. Random passwords are the strongest. Use a password generator (www.strongpasswordgenerator.com instead of trying to think of your own. Random passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize. The infographic (http://tinyurl.com/k9cqnj7) I handed out (also from www.gcflearnfree.org) gives more password advice. Company Proprietary and Confidential Company Proprietary and Confidential
  • 5. Online Security – Phishing Scams PAGE 5 We are going to watch this short video about phishing scams from the AARP: http://www.youtube.com/watch?v=H5QMjLRI24E Let’s also take a look at this interactive email to see how deceptive phishing scams can be: http://www.gcflearnfree.org/internetsafety/4.3 Company Proprietary and Confidential Company Proprietary and Confidential
  • 6. Securing Financial Transactions PAGE 6 Let’s learn more about ensuring a website is secure before you complete any financial transactions on the Internet: http://www.gcflearnfree.org/internetsafety/6.2 We also can take a look at this interactive tool to see what you should be looking for in a website before inputting any of your sensitive, private information: http://www.gcflearnfree.org/internetsafety/6.5 Company Proprietary and Confidential Company Proprietary and Confidential
  • 7. Protecting Your Computer PAGE 7 Now, we’ll take a look at how to protect your computer from Internet threats by ensuring your computer is protected by anti-virus software and receives regular updates: http://www.gcflearnfree.org/internetsafety/3 Company Proprietary and Confidential Company Proprietary and Confidential
  • 8. Safe Social Networking PAGE 8 Stay safe on websites like Facebook, Twitter, LinkedIn, YouTube, and more: http://www.gcflearnfree.org/internetsafety/7 The Privacy Rights Clearinghouse provides a full list of resources for learning about your privacy rights in the online environment: https://www.privacyrights.org/Online-Privacy-and-Technology Company Proprietary and Confidential Company Proprietary and Confidential
  • 9. How Secure is Your Information? PAGE 9 Let’s all go to www.google.com on the Internet and search for your own name. Example: My name is Austin Stroud so I will type in Austin Stroud into the search box and click search. Search for your own name instead of mine. • What kinds of things did you find (if you feel comfortable sharing)? • Were you surprised by what you were able to find about yourself openly on the Internet? Company Proprietary and Confidential Company Proprietary and Confidential
  • 10. Children • PAGE 10 Some resources to protect your children on the Internet: – – – – www.gcflearnfree.org/internetsafetyforkids (Internet safety for kids online course) www.commonsensemedia.org/advice-for-parents/internet-safety-and-privacy (Several videos targeted at parents and children for Internet safety and security) www.att.com/Common/images/safety/game.html (A game you can play with your children to help them learn about Internet safety and security) www.mcpl.info/childrens/internet-safety-tips-kids (Internet safety tips for kids from the library) Company Proprietary and Confidential Company Proprietary and Confidential
  • 11. Additional Resources PAGE 11 • http://www.gcflearnfree.org/internetsafety (A full course on Internet safety and security – we viewed portions of it today) • http://tinyurl.com/7hgkkrm (Microsoft’s family safety website with tips, articles, and tutorials) • http://www.library.kent.edu/files/webevalform.pdf (A form to help you evaluate websites on the Internet to ensure they are credible/safe) Company Proprietary and Confidential Company Proprietary and Confidential
  • 12. Questions? PAGE 12 Company Proprietary and Confidential Company Proprietary and Confidential
  • 13. Contact Information PAGE 13 Austin Stroud Instructional Designer 812-349-3050 ext. 1666 astroud@mcpl.info The library also offers free, 1-hour, 1-on-1 sessions to help with basic technology questions. If interested in scheduling one of these sessions with a reference staff member, call 812-349-3228 or fill out a form on the library website: http://tinyurl.com/kxzdfxz Company Proprietary and Confidential Company Proprietary and Confidential