SlideShare una empresa de Scribd logo
1 de 32
Internet Safety & Security
          Event
 By Jason Weaver of Idaho Web Marketing Meetup
4 Ways to Learn Internet
          Marketing
•   Internships
•   Local Education Meetings
•   Online Tools & Training
•   IWMM Blog
Devices Used at Home or Away

                          Computers




  Mobile   Game Systems       TV’s
Services Used at Home or Away

                          Computers




  Mobile   Game Systems       TV’s
Protecting Your Family,
   Employees & Yourself
1. Wasting time
Protecting Your Family,
   Employees & Yourself
1. Wasting time
2. Becoming addicted or unbalanced
Protecting Your Family,
   Employees & Yourself
1. Wasting time
2. Becoming addicted or unbalanced
3. Being take advantage of
Boundaries
Every Device or Service
1.   Anti Virus
2.   Parental Controls
3.   Usage Monitoring
4.   Filters
5.   Users
Teach
Prevent: Filter/Setup


          Watch
Teach
Stats
93% of kids are Online

60% or less of work time is actually spent productively

Age 11 – Is the average age a child first views Internet pornography
and those kids don't look away.

Approximately 15 million United States residents have their identities
used fraudulently each year with financial losses totaling upwards of
$50 billion.
Recommendations
  “Keep the computer in a public place. Set up the computer in a place
  where the family regularly can see what is happening on the screen.”
                                                        - LDS Church

         “Children and employees should not own their devices, have
administrator permission, or be uniformed about the dangers they face
                         while online” - Idaho Web Marketing Meetup




  Have a talk with them. Several
  Internet safety contracts are
  available online to help you
  know what to say.
Passwords
Passwords
Prevent:
Filter/Setup
Anti Virus




Get AVG Free Antivirus for PC’s   Get Avast Free Antivirus for Mac
Web Search




             k9 Web Protection
Web Search
What can you limit as a parent or employer?
•   Time Restrictions
•   View Internet Activity
•   Allow or Restrict Specific Websites
•   Filter by Category & Low to High Settings
Parental Controls




How to access Mac parental controls   How to access Windows parental controls
Parental Controls
What can you limit as a parent or employer?
•   User Logins & Passwords
•   Add or Remove Programs
•   What Hours of the day the Device can be on
•   Acceptable Game Ratings
•   Acceptable Programs
Parental Controls
Per User / Purpose of Parental Controls
1. Admin – Only parents or employers
   have password access
2. Homework – No installs, limit
   program access, no games, limit
   computer time
3. Game – No installs, limit game ratings,
   limit computer time
Watch
ActivTrak




            ActivTrak
ActivTrak
Per User / Purpose of Parental Controls

•   Screenshots – See exactly what they see
•   Alerts – Get an email if they trigger your rules




 Tip: Have someone else do this to
 your computer
ActivTrak
Life Lock




            Like Lock
Identity Theft
Identity Theft
Identity Theft
Get Help
Sources  Tons of Google Image Search
      http://www.commonsensemedia.org/advice-for-parents/internet-safety-tips-high-school-kids
                     https://www.lds.org/new-era/2001/06/mixed-signals?lang=eng
                               http://www.identitytheft.info/victims.aspx
             http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/all/
       http://www.forbes.com/2005/11/22/internet-pornography-children-cz_sl_1123internet.html
http://www.focusonthefamily.com/~/media/files/pdf/channels/parenting/internet-safety-contract.ashx
                      http://www.atlassian.com/time-wasting-at-work-infographic

Más contenido relacionado

La actualidad más candente

Internet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian ChildrenInternet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian Childrennickswebtsv
 
Effects of using I.C.T.
Effects of using I.C.T.Effects of using I.C.T.
Effects of using I.C.T.ABUBAKAR270
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
Malware Security
Malware SecurityMalware Security
Malware SecurityMike Ellis
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology reportMarq2014
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
Dairy Womens Network DDs 11/12
Dairy Womens Network DDs 11/12Dairy Womens Network DDs 11/12
Dairy Womens Network DDs 11/12Sue West
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 
Keeping kids safe online
Keeping kids safe onlineKeeping kids safe online
Keeping kids safe onlinetcald1991
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetystrifman
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014TonikJDK
 
Human Error- Data breaches/Cyber Security
Human Error- Data breaches/Cyber SecurityHuman Error- Data breaches/Cyber Security
Human Error- Data breaches/Cyber Securitykommieni divya
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesSlideTeam
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Protecting Children In The Classroom
Protecting Children In The ClassroomProtecting Children In The Classroom
Protecting Children In The ClassroomRussell Dyas
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 

La actualidad más candente (20)

Internet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian ChildrenInternet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian Children
 
Effects of using I.C.T.
Effects of using I.C.T.Effects of using I.C.T.
Effects of using I.C.T.
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Malware Security
Malware SecurityMalware Security
Malware Security
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
Dairy Womens Network DDs 11/12
Dairy Womens Network DDs 11/12Dairy Womens Network DDs 11/12
Dairy Womens Network DDs 11/12
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
Keeping kids safe online
Keeping kids safe onlineKeeping kids safe online
Keeping kids safe online
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Human Error- Data breaches/Cyber Security
Human Error- Data breaches/Cyber SecurityHuman Error- Data breaches/Cyber Security
Human Error- Data breaches/Cyber Security
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Protecting Children In The Classroom
Protecting Children In The ClassroomProtecting Children In The Classroom
Protecting Children In The Classroom
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 

Destacado

Cafe and restaurant risk mangaement guide
Cafe and restaurant risk mangaement guideCafe and restaurant risk mangaement guide
Cafe and restaurant risk mangaement guideJose Vertiz
 
EVENTS RISK MANAGEMENT SAFETY AND SECURITY
EVENTS RISK MANAGEMENT SAFETY AND SECURITYEVENTS RISK MANAGEMENT SAFETY AND SECURITY
EVENTS RISK MANAGEMENT SAFETY AND SECURITYYanne Evangelista
 
Cyber Cafe 2011
Cyber Cafe 2011Cyber Cafe 2011
Cyber Cafe 2011Cchea Ihap
 
Risk Management for events: an introduction
Risk Management for events:  an introductionRisk Management for events:  an introduction
Risk Management for events: an introductionWilliam O'Toole
 
Event Risk Management Case Study
Event Risk Management Case StudyEvent Risk Management Case Study
Event Risk Management Case StudyPrince Gregorio
 
4. event management risk management
4. event management   risk management4. event management   risk management
4. event management risk managementjuw123
 
Chapter 4 health, safety and security procedures
Chapter 4 health, safety and security proceduresChapter 4 health, safety and security procedures
Chapter 4 health, safety and security proceduresPat Cabangis
 
Events Management Chapter 2 Event Concepts
Events Management Chapter 2 Event ConceptsEvents Management Chapter 2 Event Concepts
Events Management Chapter 2 Event ConceptsDr. John V. Padua
 
Indian coffee cafe chains market overview
Indian coffee cafe chains market overviewIndian coffee cafe chains market overview
Indian coffee cafe chains market overviewChandni Sahgal
 
Safety & security in school
Safety & security in schoolSafety & security in school
Safety & security in schoolRoseline Ekeke
 
Introduction to events management
Introduction to events managementIntroduction to events management
Introduction to events managementM. C.
 
The Operation Plan Of Black Cafe
The Operation Plan Of Black CafeThe Operation Plan Of Black Cafe
The Operation Plan Of Black Cafedorami
 
Events management process
Events management processEvents management process
Events management processAshleighG
 
Event planning powerpoint
Event planning powerpointEvent planning powerpoint
Event planning powerpointkatelandturner
 
Event management
Event management Event management
Event management Amey Patil
 
Risk Management
Risk ManagementRisk Management
Risk Managementcgeorgeo
 

Destacado (20)

Cafe and restaurant risk mangaement guide
Cafe and restaurant risk mangaement guideCafe and restaurant risk mangaement guide
Cafe and restaurant risk mangaement guide
 
5 Ways To Promote Your Event
5 Ways To Promote Your Event5 Ways To Promote Your Event
5 Ways To Promote Your Event
 
EVENTS RISK MANAGEMENT SAFETY AND SECURITY
EVENTS RISK MANAGEMENT SAFETY AND SECURITYEVENTS RISK MANAGEMENT SAFETY AND SECURITY
EVENTS RISK MANAGEMENT SAFETY AND SECURITY
 
Cyber Cafe 2011
Cyber Cafe 2011Cyber Cafe 2011
Cyber Cafe 2011
 
Risk Management for events: an introduction
Risk Management for events:  an introductionRisk Management for events:  an introduction
Risk Management for events: an introduction
 
School Safety and Security
School Safety and SecuritySchool Safety and Security
School Safety and Security
 
Event Risk Management Case Study
Event Risk Management Case StudyEvent Risk Management Case Study
Event Risk Management Case Study
 
4. event management risk management
4. event management   risk management4. event management   risk management
4. event management risk management
 
Event Risk Management
Event Risk ManagementEvent Risk Management
Event Risk Management
 
Chapter 4 health, safety and security procedures
Chapter 4 health, safety and security proceduresChapter 4 health, safety and security procedures
Chapter 4 health, safety and security procedures
 
Coffee1 (2)
Coffee1 (2)Coffee1 (2)
Coffee1 (2)
 
Events Management Chapter 2 Event Concepts
Events Management Chapter 2 Event ConceptsEvents Management Chapter 2 Event Concepts
Events Management Chapter 2 Event Concepts
 
Indian coffee cafe chains market overview
Indian coffee cafe chains market overviewIndian coffee cafe chains market overview
Indian coffee cafe chains market overview
 
Safety & security in school
Safety & security in schoolSafety & security in school
Safety & security in school
 
Introduction to events management
Introduction to events managementIntroduction to events management
Introduction to events management
 
The Operation Plan Of Black Cafe
The Operation Plan Of Black CafeThe Operation Plan Of Black Cafe
The Operation Plan Of Black Cafe
 
Events management process
Events management processEvents management process
Events management process
 
Event planning powerpoint
Event planning powerpointEvent planning powerpoint
Event planning powerpoint
 
Event management
Event management Event management
Event management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 

Similar a Presentation internet safety & security by idaho web marketing meetup

empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Safe surfing
Safe surfingSafe surfing
Safe surfingbthat
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14Naval OPSEC
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Online safety
Online safetyOnline safety
Online safetyelioar8
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletprestamonster
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security PitfallsDaniel Rivas
 

Similar a Presentation internet safety & security by idaho web marketing meetup (20)

empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Safe surfing
Safe surfingSafe surfing
Safe surfing
 
Phish training final
Phish training finalPhish training final
Phish training final
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Keeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart CardKeeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart Card
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Online safety
Online safetyOnline safety
Online safety
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - booklet
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
 

Presentation internet safety & security by idaho web marketing meetup

  • 1. Internet Safety & Security Event By Jason Weaver of Idaho Web Marketing Meetup
  • 2. 4 Ways to Learn Internet Marketing • Internships • Local Education Meetings • Online Tools & Training • IWMM Blog
  • 3. Devices Used at Home or Away Computers Mobile Game Systems TV’s
  • 4. Services Used at Home or Away Computers Mobile Game Systems TV’s
  • 5. Protecting Your Family, Employees & Yourself 1. Wasting time
  • 6. Protecting Your Family, Employees & Yourself 1. Wasting time 2. Becoming addicted or unbalanced
  • 7. Protecting Your Family, Employees & Yourself 1. Wasting time 2. Becoming addicted or unbalanced 3. Being take advantage of
  • 9. Every Device or Service 1. Anti Virus 2. Parental Controls 3. Usage Monitoring 4. Filters 5. Users
  • 11. Teach
  • 12. Stats 93% of kids are Online 60% or less of work time is actually spent productively Age 11 – Is the average age a child first views Internet pornography and those kids don't look away. Approximately 15 million United States residents have their identities used fraudulently each year with financial losses totaling upwards of $50 billion.
  • 13. Recommendations “Keep the computer in a public place. Set up the computer in a place where the family regularly can see what is happening on the screen.” - LDS Church “Children and employees should not own their devices, have administrator permission, or be uniformed about the dangers they face while online” - Idaho Web Marketing Meetup Have a talk with them. Several Internet safety contracts are available online to help you know what to say.
  • 17. Anti Virus Get AVG Free Antivirus for PC’s Get Avast Free Antivirus for Mac
  • 18. Web Search k9 Web Protection
  • 19. Web Search What can you limit as a parent or employer? • Time Restrictions • View Internet Activity • Allow or Restrict Specific Websites • Filter by Category & Low to High Settings
  • 20. Parental Controls How to access Mac parental controls How to access Windows parental controls
  • 21. Parental Controls What can you limit as a parent or employer? • User Logins & Passwords • Add or Remove Programs • What Hours of the day the Device can be on • Acceptable Game Ratings • Acceptable Programs
  • 22. Parental Controls Per User / Purpose of Parental Controls 1. Admin – Only parents or employers have password access 2. Homework – No installs, limit program access, no games, limit computer time 3. Game – No installs, limit game ratings, limit computer time
  • 23. Watch
  • 24. ActivTrak ActivTrak
  • 25. ActivTrak Per User / Purpose of Parental Controls • Screenshots – See exactly what they see • Alerts – Get an email if they trigger your rules Tip: Have someone else do this to your computer
  • 27. Life Lock Like Lock
  • 32. Sources Tons of Google Image Search http://www.commonsensemedia.org/advice-for-parents/internet-safety-tips-high-school-kids https://www.lds.org/new-era/2001/06/mixed-signals?lang=eng http://www.identitytheft.info/victims.aspx http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/all/ http://www.forbes.com/2005/11/22/internet-pornography-children-cz_sl_1123internet.html http://www.focusonthefamily.com/~/media/files/pdf/channels/parenting/internet-safety-contract.ashx http://www.atlassian.com/time-wasting-at-work-infographic

Notas del editor

  1. Citi Identity Theft Solutions Commercial: http://youtu.be/rnN17uJQUbc
  2. Citi Identity Theft Solutions Commercial: http://youtu.be/rnN17uJQUbc
  3. Citi Identity Theft Solutions Commercial: http://youtu.be/rnN17uJQUbc
  4. http://www.focusonthefamily.com/~/media/files/pdf/channels/parenting/internet-safety-contract.ashx
  5. Top Rated on Cnet.com
  6. Prevent Pornography
  7. Kill the Password: Why a String of Characters Can’t Protect Us Anymore: http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/all/